Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11/11/2023, 12:21
Behavioral task
behavioral1
Sample
NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe
-
Size
345KB
-
MD5
c1ff2639497e82f6f0c250ccafad9f30
-
SHA1
d688efd0cf1fb07be5163dd4b13fc5e8ec3ae7c4
-
SHA256
35677917b89c72b435426018d2cb52d52f56959ba5df36a778404562f6ca3f16
-
SHA512
96d051a547613dae88b9ea987b347dc58038e5fb85aa05f6d8845b7a1df8e4e5a6549d4af5ea55f3cf1dc95f76137ec20ff6374f89c200334ef372ce1db1f283
-
SSDEEP
6144:65T3ubrIGXT2pMaB4muz14QaYgTt+scaHACw6Ykw/a8dWBtp27DpomqcPMwNFN6G:65jubrIGXTI1uznghoaHACwBkka8eGp7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcojjmea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Migbnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmbknddp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npagjpcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kconkibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knklagmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdgdempa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kconkibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcojjmea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcfqkl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Migbnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndemjoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfnnha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbalifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdgdempa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnpinc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcfqkl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkmhaj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbdonb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfbpag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfbpag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkmhaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndemjoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkbalifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikfmfi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbidgeci.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmbknddp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbidgeci.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngibaj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npagjpcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfnnha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbdonb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naimccpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaiqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knklagmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkaiqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naimccpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfmfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnpinc32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x00070000000120bd-5.dat family_berbew behavioral1/memory/2220-6-0x0000000000220000-0x000000000025D000-memory.dmp family_berbew behavioral1/files/0x00070000000120bd-8.dat family_berbew behavioral1/files/0x00070000000120bd-9.dat family_berbew behavioral1/files/0x00070000000120bd-12.dat family_berbew behavioral1/files/0x00070000000120bd-13.dat family_berbew behavioral1/files/0x0035000000015e30-18.dat family_berbew behavioral1/files/0x0035000000015e30-21.dat family_berbew behavioral1/files/0x0035000000015e30-25.dat family_berbew behavioral1/memory/2028-31-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0035000000015e30-26.dat family_berbew behavioral1/files/0x0035000000015e30-20.dat family_berbew behavioral1/files/0x000700000001627d-33.dat family_berbew behavioral1/files/0x000700000001627d-36.dat family_berbew behavioral1/memory/2028-35-0x00000000002B0000-0x00000000002ED000-memory.dmp family_berbew behavioral1/files/0x000700000001627d-37.dat family_berbew behavioral1/files/0x000700000001627d-40.dat family_berbew behavioral1/files/0x000700000001627d-41.dat family_berbew behavioral1/files/0x0009000000016466-48.dat family_berbew behavioral1/files/0x0009000000016466-52.dat family_berbew behavioral1/files/0x0009000000016466-54.dat family_berbew behavioral1/memory/2804-60-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0009000000016466-51.dat family_berbew behavioral1/files/0x0009000000016466-46.dat family_berbew behavioral1/memory/2220-63-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016ba8-61.dat family_berbew behavioral1/files/0x0006000000016ba8-71.dat family_berbew behavioral1/memory/2784-70-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016ba8-69.dat family_berbew behavioral1/files/0x0006000000016ba8-65.dat family_berbew behavioral1/files/0x0006000000016ba8-64.dat family_berbew behavioral1/files/0x0006000000016c2a-82.dat family_berbew behavioral1/files/0x0006000000016c2a-79.dat family_berbew behavioral1/files/0x0006000000016c2a-78.dat family_berbew behavioral1/files/0x0006000000016c2a-76.dat family_berbew behavioral1/memory/2784-83-0x0000000000440000-0x000000000047D000-memory.dmp family_berbew behavioral1/memory/3000-89-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/memory/2784-91-0x0000000000440000-0x000000000047D000-memory.dmp family_berbew behavioral1/memory/2828-90-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016c2a-84.dat family_berbew behavioral1/files/0x0034000000015e70-93.dat family_berbew behavioral1/files/0x0034000000015e70-96.dat family_berbew behavioral1/files/0x0034000000015e70-95.dat family_berbew behavioral1/files/0x0034000000015e70-99.dat family_berbew behavioral1/files/0x0034000000015e70-101.dat family_berbew behavioral1/memory/1600-100-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016cbd-106.dat family_berbew behavioral1/files/0x0006000000016cbd-108.dat family_berbew behavioral1/files/0x0006000000016cbd-112.dat family_berbew behavioral1/memory/2808-119-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016cbd-114.dat family_berbew behavioral1/memory/2876-120-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016cea-124.dat family_berbew behavioral1/files/0x0006000000016cea-129.dat family_berbew behavioral1/memory/2876-133-0x0000000000220000-0x000000000025D000-memory.dmp family_berbew behavioral1/files/0x0006000000016cea-128.dat family_berbew behavioral1/files/0x0006000000016cea-123.dat family_berbew behavioral1/files/0x0006000000016cea-121.dat family_berbew behavioral1/files/0x0006000000016cbd-109.dat family_berbew behavioral1/files/0x0006000000016cfd-137.dat family_berbew behavioral1/memory/2508-149-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral1/files/0x0006000000016cfd-143.dat family_berbew behavioral1/memory/2992-142-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew -
Executes dropped EXE 24 IoCs
pid Process 2828 Ikfmfi32.exe 2028 Jfnnha32.exe 2808 Jbdonb32.exe 2804 Jdgdempa.exe 2784 Jnpinc32.exe 3000 Kconkibf.exe 1600 Knklagmb.exe 2876 Kbidgeci.exe 2992 Kkaiqk32.exe 2508 Lcojjmea.exe 1984 Lmgocb32.exe 572 Lfbpag32.exe 1512 Lcfqkl32.exe 1416 Mponel32.exe 2936 Migbnb32.exe 2316 Mhloponc.exe 592 Mkmhaj32.exe 2400 Ndemjoae.exe 2428 Naimccpo.exe 1252 Nkbalifo.exe 1672 Ngibaj32.exe 700 Nmbknddp.exe 2520 Npagjpcd.exe 2632 Nlhgoqhh.exe -
Loads dropped DLL 52 IoCs
pid Process 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 2828 Ikfmfi32.exe 2828 Ikfmfi32.exe 2028 Jfnnha32.exe 2028 Jfnnha32.exe 2808 Jbdonb32.exe 2808 Jbdonb32.exe 2804 Jdgdempa.exe 2804 Jdgdempa.exe 2784 Jnpinc32.exe 2784 Jnpinc32.exe 3000 Kconkibf.exe 3000 Kconkibf.exe 1600 Knklagmb.exe 1600 Knklagmb.exe 2876 Kbidgeci.exe 2876 Kbidgeci.exe 2992 Kkaiqk32.exe 2992 Kkaiqk32.exe 2508 Lcojjmea.exe 2508 Lcojjmea.exe 1984 Lmgocb32.exe 1984 Lmgocb32.exe 572 Lfbpag32.exe 572 Lfbpag32.exe 1512 Lcfqkl32.exe 1512 Lcfqkl32.exe 1416 Mponel32.exe 1416 Mponel32.exe 2936 Migbnb32.exe 2936 Migbnb32.exe 2316 Mhloponc.exe 2316 Mhloponc.exe 592 Mkmhaj32.exe 592 Mkmhaj32.exe 2400 Ndemjoae.exe 2400 Ndemjoae.exe 2428 Naimccpo.exe 2428 Naimccpo.exe 1252 Nkbalifo.exe 1252 Nkbalifo.exe 1672 Ngibaj32.exe 1672 Ngibaj32.exe 700 Nmbknddp.exe 700 Nmbknddp.exe 2520 Npagjpcd.exe 2520 Npagjpcd.exe 2212 WerFault.exe 2212 WerFault.exe 2212 WerFault.exe 2212 WerFault.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mkmhaj32.exe Mhloponc.exe File created C:\Windows\SysWOW64\Lafcif32.dll NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe File created C:\Windows\SysWOW64\Kconkibf.exe Jnpinc32.exe File opened for modification C:\Windows\SysWOW64\Knklagmb.exe Kconkibf.exe File created C:\Windows\SysWOW64\Dlfdghbq.dll Lcojjmea.exe File created C:\Windows\SysWOW64\Negoebdd.dll Lfbpag32.exe File created C:\Windows\SysWOW64\Qjfhfnim.dll Kconkibf.exe File created C:\Windows\SysWOW64\Kkaiqk32.exe Kbidgeci.exe File opened for modification C:\Windows\SysWOW64\Mhloponc.exe Migbnb32.exe File created C:\Windows\SysWOW64\Ibcidp32.dll Jnpinc32.exe File created C:\Windows\SysWOW64\Effqclic.dll Lcfqkl32.exe File created C:\Windows\SysWOW64\Fnqkpajk.dll Migbnb32.exe File created C:\Windows\SysWOW64\Naimccpo.exe Ndemjoae.exe File opened for modification C:\Windows\SysWOW64\Nkbalifo.exe Naimccpo.exe File created C:\Windows\SysWOW64\Migbnb32.exe Mponel32.exe File opened for modification C:\Windows\SysWOW64\Mkmhaj32.exe Mhloponc.exe File created C:\Windows\SysWOW64\Mhdffl32.dll Jdgdempa.exe File opened for modification C:\Windows\SysWOW64\Ndemjoae.exe Mkmhaj32.exe File opened for modification C:\Windows\SysWOW64\Ngibaj32.exe Nkbalifo.exe File created C:\Windows\SysWOW64\Lcojjmea.exe Kkaiqk32.exe File opened for modification C:\Windows\SysWOW64\Lcojjmea.exe Kkaiqk32.exe File created C:\Windows\SysWOW64\Lcfqkl32.exe Lfbpag32.exe File created C:\Windows\SysWOW64\Noomnjpj.dll Mkmhaj32.exe File created C:\Windows\SysWOW64\Ngibaj32.exe Nkbalifo.exe File created C:\Windows\SysWOW64\Npagjpcd.exe Nmbknddp.exe File opened for modification C:\Windows\SysWOW64\Ikfmfi32.exe NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe File created C:\Windows\SysWOW64\Jbdonb32.exe Jfnnha32.exe File created C:\Windows\SysWOW64\Mponel32.exe Lcfqkl32.exe File created C:\Windows\SysWOW64\Eppddhlj.dll Ndemjoae.exe File created C:\Windows\SysWOW64\Nkbalifo.exe Naimccpo.exe File created C:\Windows\SysWOW64\Mahqjm32.dll Nmbknddp.exe File created C:\Windows\SysWOW64\Lamajm32.dll Npagjpcd.exe File created C:\Windows\SysWOW64\Eiiddiab.dll Jfnnha32.exe File created C:\Windows\SysWOW64\Knklagmb.exe Kconkibf.exe File opened for modification C:\Windows\SysWOW64\Kbidgeci.exe Knklagmb.exe File opened for modification C:\Windows\SysWOW64\Lmgocb32.exe Lcojjmea.exe File created C:\Windows\SysWOW64\Nmbknddp.exe Ngibaj32.exe File opened for modification C:\Windows\SysWOW64\Lfbpag32.exe Lmgocb32.exe File created C:\Windows\SysWOW64\Ikfmfi32.exe NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe File created C:\Windows\SysWOW64\Kigbna32.dll Ikfmfi32.exe File created C:\Windows\SysWOW64\Jdgdempa.exe Jbdonb32.exe File created C:\Windows\SysWOW64\Jnpinc32.exe Jdgdempa.exe File opened for modification C:\Windows\SysWOW64\Kkaiqk32.exe Kbidgeci.exe File created C:\Windows\SysWOW64\Lmgocb32.exe Lcojjmea.exe File opened for modification C:\Windows\SysWOW64\Lcfqkl32.exe Lfbpag32.exe File created C:\Windows\SysWOW64\Ndemjoae.exe Mkmhaj32.exe File created C:\Windows\SysWOW64\Jfnnha32.exe Ikfmfi32.exe File opened for modification C:\Windows\SysWOW64\Jfnnha32.exe Ikfmfi32.exe File opened for modification C:\Windows\SysWOW64\Jnpinc32.exe Jdgdempa.exe File created C:\Windows\SysWOW64\Kbidgeci.exe Knklagmb.exe File created C:\Windows\SysWOW64\Pelggd32.dll Knklagmb.exe File created C:\Windows\SysWOW64\Eeejnlhc.dll Naimccpo.exe File opened for modification C:\Windows\SysWOW64\Nmbknddp.exe Ngibaj32.exe File opened for modification C:\Windows\SysWOW64\Jbdonb32.exe Jfnnha32.exe File opened for modification C:\Windows\SysWOW64\Migbnb32.exe Mponel32.exe File created C:\Windows\SysWOW64\Jmbckb32.dll Nkbalifo.exe File opened for modification C:\Windows\SysWOW64\Npagjpcd.exe Nmbknddp.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Npagjpcd.exe File created C:\Windows\SysWOW64\Lfbpag32.exe Lmgocb32.exe File created C:\Windows\SysWOW64\Khqpfa32.dll Lmgocb32.exe File opened for modification C:\Windows\SysWOW64\Mponel32.exe Lcfqkl32.exe File opened for modification C:\Windows\SysWOW64\Jdgdempa.exe Jbdonb32.exe File created C:\Windows\SysWOW64\Indgjihl.dll Jbdonb32.exe File created C:\Windows\SysWOW64\Mhloponc.exe Migbnb32.exe -
Program crash 1 IoCs
pid pid_target Process 2212 2632 WerFault.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkbalifo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngoohnkj.dll" Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deeieqod.dll" Kbidgeci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibcidp32.dll" Jnpinc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Migbnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naimccpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkbalifo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmbknddp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knklagmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knklagmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcojjmea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Negoebdd.dll" Lfbpag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmbckb32.dll" Nkbalifo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiiddiab.dll" Jfnnha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfnnha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kconkibf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkaiqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikfmfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfbpag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngibaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikfmfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdgdempa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kconkibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjfhfnim.dll" Kconkibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndemjoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbidgeci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eppddhlj.dll" Ndemjoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Indgjihl.dll" Jbdonb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhloponc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Npagjpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnpinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pelggd32.dll" Knklagmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlfdghbq.dll" Lcojjmea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khqpfa32.dll" Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mponel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkmhaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmbknddp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcojjmea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Effqclic.dll" Lcfqkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaqkcf32.dll" Mhloponc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kigbna32.dll" Ikfmfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfnnha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbdonb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcfqkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcfqkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Naimccpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbdonb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdgdempa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnpinc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmgocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfbpag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhdffl32.dll" Jdgdempa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkaiqk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2828 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 28 PID 2220 wrote to memory of 2828 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 28 PID 2220 wrote to memory of 2828 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 28 PID 2220 wrote to memory of 2828 2220 NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe 28 PID 2828 wrote to memory of 2028 2828 Ikfmfi32.exe 29 PID 2828 wrote to memory of 2028 2828 Ikfmfi32.exe 29 PID 2828 wrote to memory of 2028 2828 Ikfmfi32.exe 29 PID 2828 wrote to memory of 2028 2828 Ikfmfi32.exe 29 PID 2028 wrote to memory of 2808 2028 Jfnnha32.exe 30 PID 2028 wrote to memory of 2808 2028 Jfnnha32.exe 30 PID 2028 wrote to memory of 2808 2028 Jfnnha32.exe 30 PID 2028 wrote to memory of 2808 2028 Jfnnha32.exe 30 PID 2808 wrote to memory of 2804 2808 Jbdonb32.exe 31 PID 2808 wrote to memory of 2804 2808 Jbdonb32.exe 31 PID 2808 wrote to memory of 2804 2808 Jbdonb32.exe 31 PID 2808 wrote to memory of 2804 2808 Jbdonb32.exe 31 PID 2804 wrote to memory of 2784 2804 Jdgdempa.exe 32 PID 2804 wrote to memory of 2784 2804 Jdgdempa.exe 32 PID 2804 wrote to memory of 2784 2804 Jdgdempa.exe 32 PID 2804 wrote to memory of 2784 2804 Jdgdempa.exe 32 PID 2784 wrote to memory of 3000 2784 Jnpinc32.exe 33 PID 2784 wrote to memory of 3000 2784 Jnpinc32.exe 33 PID 2784 wrote to memory of 3000 2784 Jnpinc32.exe 33 PID 2784 wrote to memory of 3000 2784 Jnpinc32.exe 33 PID 3000 wrote to memory of 1600 3000 Kconkibf.exe 34 PID 3000 wrote to memory of 1600 3000 Kconkibf.exe 34 PID 3000 wrote to memory of 1600 3000 Kconkibf.exe 34 PID 3000 wrote to memory of 1600 3000 Kconkibf.exe 34 PID 1600 wrote to memory of 2876 1600 Knklagmb.exe 37 PID 1600 wrote to memory of 2876 1600 Knklagmb.exe 37 PID 1600 wrote to memory of 2876 1600 Knklagmb.exe 37 PID 1600 wrote to memory of 2876 1600 Knklagmb.exe 37 PID 2876 wrote to memory of 2992 2876 Kbidgeci.exe 35 PID 2876 wrote to memory of 2992 2876 Kbidgeci.exe 35 PID 2876 wrote to memory of 2992 2876 Kbidgeci.exe 35 PID 2876 wrote to memory of 2992 2876 Kbidgeci.exe 35 PID 2992 wrote to memory of 2508 2992 Kkaiqk32.exe 36 PID 2992 wrote to memory of 2508 2992 Kkaiqk32.exe 36 PID 2992 wrote to memory of 2508 2992 Kkaiqk32.exe 36 PID 2992 wrote to memory of 2508 2992 Kkaiqk32.exe 36 PID 2508 wrote to memory of 1984 2508 Lcojjmea.exe 38 PID 2508 wrote to memory of 1984 2508 Lcojjmea.exe 38 PID 2508 wrote to memory of 1984 2508 Lcojjmea.exe 38 PID 2508 wrote to memory of 1984 2508 Lcojjmea.exe 38 PID 1984 wrote to memory of 572 1984 Lmgocb32.exe 39 PID 1984 wrote to memory of 572 1984 Lmgocb32.exe 39 PID 1984 wrote to memory of 572 1984 Lmgocb32.exe 39 PID 1984 wrote to memory of 572 1984 Lmgocb32.exe 39 PID 572 wrote to memory of 1512 572 Lfbpag32.exe 52 PID 572 wrote to memory of 1512 572 Lfbpag32.exe 52 PID 572 wrote to memory of 1512 572 Lfbpag32.exe 52 PID 572 wrote to memory of 1512 572 Lfbpag32.exe 52 PID 1512 wrote to memory of 1416 1512 Lcfqkl32.exe 51 PID 1512 wrote to memory of 1416 1512 Lcfqkl32.exe 51 PID 1512 wrote to memory of 1416 1512 Lcfqkl32.exe 51 PID 1512 wrote to memory of 1416 1512 Lcfqkl32.exe 51 PID 1416 wrote to memory of 2936 1416 Mponel32.exe 40 PID 1416 wrote to memory of 2936 1416 Mponel32.exe 40 PID 1416 wrote to memory of 2936 1416 Mponel32.exe 40 PID 1416 wrote to memory of 2936 1416 Mponel32.exe 40 PID 2936 wrote to memory of 2316 2936 Migbnb32.exe 50 PID 2936 wrote to memory of 2316 2936 Migbnb32.exe 50 PID 2936 wrote to memory of 2316 2936 Migbnb32.exe 50 PID 2936 wrote to memory of 2316 2936 Migbnb32.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c1ff2639497e82f6f0c250ccafad9f30.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Ikfmfi32.exeC:\Windows\system32\Ikfmfi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Jfnnha32.exeC:\Windows\system32\Jfnnha32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Jbdonb32.exeC:\Windows\system32\Jbdonb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Jdgdempa.exeC:\Windows\system32\Jdgdempa.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Jnpinc32.exeC:\Windows\system32\Jnpinc32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Kconkibf.exeC:\Windows\system32\Kconkibf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Knklagmb.exeC:\Windows\system32\Knklagmb.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\Kbidgeci.exeC:\Windows\system32\Kbidgeci.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kkaiqk32.exeC:\Windows\system32\Kkaiqk32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Lcojjmea.exeC:\Windows\system32\Lcojjmea.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Lmgocb32.exeC:\Windows\system32\Lmgocb32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Lfbpag32.exeC:\Windows\system32\Lfbpag32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\Lcfqkl32.exeC:\Windows\system32\Lcfqkl32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512
-
-
-
-
-
C:\Windows\SysWOW64\Migbnb32.exeC:\Windows\system32\Migbnb32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Mhloponc.exeC:\Windows\system32\Mhloponc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2316
-
-
C:\Windows\SysWOW64\Mkmhaj32.exeC:\Windows\system32\Mkmhaj32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:592 -
C:\Windows\SysWOW64\Ndemjoae.exeC:\Windows\system32\Ndemjoae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Naimccpo.exeC:\Windows\system32\Naimccpo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\Nkbalifo.exeC:\Windows\system32\Nkbalifo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1252
-
-
-
-
C:\Windows\SysWOW64\Ngibaj32.exeC:\Windows\system32\Ngibaj32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Nmbknddp.exeC:\Windows\system32\Nmbknddp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Npagjpcd.exeC:\Windows\system32\Npagjpcd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe4⤵
- Executes dropped EXE
PID:2632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1401⤵
- Loads dropped DLL
- Program crash
PID:2212
-
C:\Windows\SysWOW64\Mponel32.exeC:\Windows\system32\Mponel32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD56708a75d91bcb7137d9deb745c118033
SHA1110e208a1d25ad8db091d23101c426d53dfda99a
SHA256466c38f0fec2b4e239f0828788e5f8bd0ef3f29319258486ac516dae6a0dc695
SHA51210c9278c4765906f780a2a9e6010829d9dd3b7e2cf161094b67a930e2e04c6e96ff4e03da4f1c79fd12ddd40841547cbc4649408f337f1083f5ec15f4dcd5bef
-
Filesize
345KB
MD56708a75d91bcb7137d9deb745c118033
SHA1110e208a1d25ad8db091d23101c426d53dfda99a
SHA256466c38f0fec2b4e239f0828788e5f8bd0ef3f29319258486ac516dae6a0dc695
SHA51210c9278c4765906f780a2a9e6010829d9dd3b7e2cf161094b67a930e2e04c6e96ff4e03da4f1c79fd12ddd40841547cbc4649408f337f1083f5ec15f4dcd5bef
-
Filesize
345KB
MD56708a75d91bcb7137d9deb745c118033
SHA1110e208a1d25ad8db091d23101c426d53dfda99a
SHA256466c38f0fec2b4e239f0828788e5f8bd0ef3f29319258486ac516dae6a0dc695
SHA51210c9278c4765906f780a2a9e6010829d9dd3b7e2cf161094b67a930e2e04c6e96ff4e03da4f1c79fd12ddd40841547cbc4649408f337f1083f5ec15f4dcd5bef
-
Filesize
345KB
MD5f0ea27d7881e16cd4145aebdb55e673e
SHA1ca746b2317f158421a7398cf108ea446331cd28c
SHA256f779b466a179ba27bdfc385df701f05ed091bd1c1d0f25e00b9b3c2303167a36
SHA512f19484bf6156f18a340526499a4429e5f1ba76fd38441134a0aeb77b4eb29c2ca36b58ff12a4111a7f96a9a40fb4593a5aacf80ee351d1363282d1d5bf276b23
-
Filesize
345KB
MD5f0ea27d7881e16cd4145aebdb55e673e
SHA1ca746b2317f158421a7398cf108ea446331cd28c
SHA256f779b466a179ba27bdfc385df701f05ed091bd1c1d0f25e00b9b3c2303167a36
SHA512f19484bf6156f18a340526499a4429e5f1ba76fd38441134a0aeb77b4eb29c2ca36b58ff12a4111a7f96a9a40fb4593a5aacf80ee351d1363282d1d5bf276b23
-
Filesize
345KB
MD5f0ea27d7881e16cd4145aebdb55e673e
SHA1ca746b2317f158421a7398cf108ea446331cd28c
SHA256f779b466a179ba27bdfc385df701f05ed091bd1c1d0f25e00b9b3c2303167a36
SHA512f19484bf6156f18a340526499a4429e5f1ba76fd38441134a0aeb77b4eb29c2ca36b58ff12a4111a7f96a9a40fb4593a5aacf80ee351d1363282d1d5bf276b23
-
Filesize
345KB
MD5617a62cb4dca73859b383e72f1d72dce
SHA174b68de7d8d79af684174e60c0849fb7704445f6
SHA25698d63ee13779204037c689f4bd01341abf7020ec4664f567e020e31b6d4c8253
SHA512a036302639fea3701ab0599b986559686056c22e43d304b64e83c8dc49d05c390bc2a4e14ec1fbf53a176c7433c38337ec199ae07a5042d2c9294d0e93fe21d2
-
Filesize
345KB
MD5617a62cb4dca73859b383e72f1d72dce
SHA174b68de7d8d79af684174e60c0849fb7704445f6
SHA25698d63ee13779204037c689f4bd01341abf7020ec4664f567e020e31b6d4c8253
SHA512a036302639fea3701ab0599b986559686056c22e43d304b64e83c8dc49d05c390bc2a4e14ec1fbf53a176c7433c38337ec199ae07a5042d2c9294d0e93fe21d2
-
Filesize
345KB
MD5617a62cb4dca73859b383e72f1d72dce
SHA174b68de7d8d79af684174e60c0849fb7704445f6
SHA25698d63ee13779204037c689f4bd01341abf7020ec4664f567e020e31b6d4c8253
SHA512a036302639fea3701ab0599b986559686056c22e43d304b64e83c8dc49d05c390bc2a4e14ec1fbf53a176c7433c38337ec199ae07a5042d2c9294d0e93fe21d2
-
Filesize
345KB
MD5569f01a870851df9d3105667943d944c
SHA1e7dc8b238563b3ecb3076caeb40b9eb6cb4beb3e
SHA256a554bfaa8bfcc5ea7cc67d7fa27e42dced103bef5bcb7f392f75bff36e9eb779
SHA512089bc93b68a39f33aead2f23fd27a7fb44f71ef2c9e00896b85a1022f3afc9181e28a3ddf60d2d465c70d543ee93e17a483f11f9495122f4ffcfc0ad91cfa09d
-
Filesize
345KB
MD5569f01a870851df9d3105667943d944c
SHA1e7dc8b238563b3ecb3076caeb40b9eb6cb4beb3e
SHA256a554bfaa8bfcc5ea7cc67d7fa27e42dced103bef5bcb7f392f75bff36e9eb779
SHA512089bc93b68a39f33aead2f23fd27a7fb44f71ef2c9e00896b85a1022f3afc9181e28a3ddf60d2d465c70d543ee93e17a483f11f9495122f4ffcfc0ad91cfa09d
-
Filesize
345KB
MD5569f01a870851df9d3105667943d944c
SHA1e7dc8b238563b3ecb3076caeb40b9eb6cb4beb3e
SHA256a554bfaa8bfcc5ea7cc67d7fa27e42dced103bef5bcb7f392f75bff36e9eb779
SHA512089bc93b68a39f33aead2f23fd27a7fb44f71ef2c9e00896b85a1022f3afc9181e28a3ddf60d2d465c70d543ee93e17a483f11f9495122f4ffcfc0ad91cfa09d
-
Filesize
345KB
MD53e8efc402c14a4a7d40f44679d1aa968
SHA177680e0a9f3296e59692f89b647b061c24deb51f
SHA256ac287dc5a15c3ecae68c9a5186553d6b2c7b35fba7b52055f8a66b40720dbd1c
SHA512a5072f6b47165d1f3205557bfefd8a67d167eef7df7f67310f5f8aab87252fffda08aeabdfc0ece4e86eea32e670b6e3c4b03c644a3a0f3b4e6d615c04dc7f31
-
Filesize
345KB
MD53e8efc402c14a4a7d40f44679d1aa968
SHA177680e0a9f3296e59692f89b647b061c24deb51f
SHA256ac287dc5a15c3ecae68c9a5186553d6b2c7b35fba7b52055f8a66b40720dbd1c
SHA512a5072f6b47165d1f3205557bfefd8a67d167eef7df7f67310f5f8aab87252fffda08aeabdfc0ece4e86eea32e670b6e3c4b03c644a3a0f3b4e6d615c04dc7f31
-
Filesize
345KB
MD53e8efc402c14a4a7d40f44679d1aa968
SHA177680e0a9f3296e59692f89b647b061c24deb51f
SHA256ac287dc5a15c3ecae68c9a5186553d6b2c7b35fba7b52055f8a66b40720dbd1c
SHA512a5072f6b47165d1f3205557bfefd8a67d167eef7df7f67310f5f8aab87252fffda08aeabdfc0ece4e86eea32e670b6e3c4b03c644a3a0f3b4e6d615c04dc7f31
-
Filesize
345KB
MD5bfd0c13d7caa02f2b77f7dc85fc22278
SHA146cc09eaf534ef644d4cb10e0303a0b220f65dc0
SHA256d03b6841b803e855dd29279a80e4815ca7a4c3d20f7c31cd181349f8679e1edd
SHA51266db5167b9d258bbc7926cd4f76308816bd8a1ed55a795e8b64caefaf02dec41a3532543798e0ec1f8fcfffa4a3b850ba0b5531bf659744b840cbb217c5f3c0f
-
Filesize
345KB
MD5bfd0c13d7caa02f2b77f7dc85fc22278
SHA146cc09eaf534ef644d4cb10e0303a0b220f65dc0
SHA256d03b6841b803e855dd29279a80e4815ca7a4c3d20f7c31cd181349f8679e1edd
SHA51266db5167b9d258bbc7926cd4f76308816bd8a1ed55a795e8b64caefaf02dec41a3532543798e0ec1f8fcfffa4a3b850ba0b5531bf659744b840cbb217c5f3c0f
-
Filesize
345KB
MD5bfd0c13d7caa02f2b77f7dc85fc22278
SHA146cc09eaf534ef644d4cb10e0303a0b220f65dc0
SHA256d03b6841b803e855dd29279a80e4815ca7a4c3d20f7c31cd181349f8679e1edd
SHA51266db5167b9d258bbc7926cd4f76308816bd8a1ed55a795e8b64caefaf02dec41a3532543798e0ec1f8fcfffa4a3b850ba0b5531bf659744b840cbb217c5f3c0f
-
Filesize
345KB
MD5845023ec20fe69cbcbae753484ec1d19
SHA1601ecc99fcbc3b8f3c8a8532f37e123180b6d828
SHA256ac220a7d4332a67772f516f5fa3ce793d3e60cdb08ebd48066801e245acac6e7
SHA512e20a4b77f11b6f32411b862687bbad5e87684d7afe431d2068dcb99bbc928664d1badd24f31442099a381cd73aec5e2d29bca32f5905dea6753d27827766c07f
-
Filesize
345KB
MD5845023ec20fe69cbcbae753484ec1d19
SHA1601ecc99fcbc3b8f3c8a8532f37e123180b6d828
SHA256ac220a7d4332a67772f516f5fa3ce793d3e60cdb08ebd48066801e245acac6e7
SHA512e20a4b77f11b6f32411b862687bbad5e87684d7afe431d2068dcb99bbc928664d1badd24f31442099a381cd73aec5e2d29bca32f5905dea6753d27827766c07f
-
Filesize
345KB
MD5845023ec20fe69cbcbae753484ec1d19
SHA1601ecc99fcbc3b8f3c8a8532f37e123180b6d828
SHA256ac220a7d4332a67772f516f5fa3ce793d3e60cdb08ebd48066801e245acac6e7
SHA512e20a4b77f11b6f32411b862687bbad5e87684d7afe431d2068dcb99bbc928664d1badd24f31442099a381cd73aec5e2d29bca32f5905dea6753d27827766c07f
-
Filesize
345KB
MD5e8affd4c6e2f3483db7a55a7a86e0407
SHA152861e6d1d888d265e6baf588fed448ebb7c4069
SHA2563778f874e2b7cbfdd269f7ef85e85e981f6678897b366946cd1c9d0ba2128234
SHA512db67c3d08598f446549026e3ced552a6ae0735f0b37da95fa6ff597297b2649a7efe9405f7e996fb25b48a7df20aea406491b73ddee8070ef43112f19acbaab3
-
Filesize
345KB
MD5e8affd4c6e2f3483db7a55a7a86e0407
SHA152861e6d1d888d265e6baf588fed448ebb7c4069
SHA2563778f874e2b7cbfdd269f7ef85e85e981f6678897b366946cd1c9d0ba2128234
SHA512db67c3d08598f446549026e3ced552a6ae0735f0b37da95fa6ff597297b2649a7efe9405f7e996fb25b48a7df20aea406491b73ddee8070ef43112f19acbaab3
-
Filesize
345KB
MD5e8affd4c6e2f3483db7a55a7a86e0407
SHA152861e6d1d888d265e6baf588fed448ebb7c4069
SHA2563778f874e2b7cbfdd269f7ef85e85e981f6678897b366946cd1c9d0ba2128234
SHA512db67c3d08598f446549026e3ced552a6ae0735f0b37da95fa6ff597297b2649a7efe9405f7e996fb25b48a7df20aea406491b73ddee8070ef43112f19acbaab3
-
Filesize
345KB
MD5cf7f04fe40c7a9e5010563fad76e59fb
SHA1e7c4b9cf606d8337c177e63a3ac387eedb551749
SHA2563753ee8d5d9f8967ed4e379600adf8819bd8bb7c752459eea8ef0ba36c1bb487
SHA5125baab547119edfb391942b2a60605c70056b4f03dead2b93674d731666cc58b6f068bf50962cccfda2bbe7658d1d03de3dd38440be9ea60bb011205a34ff84db
-
Filesize
345KB
MD5cf7f04fe40c7a9e5010563fad76e59fb
SHA1e7c4b9cf606d8337c177e63a3ac387eedb551749
SHA2563753ee8d5d9f8967ed4e379600adf8819bd8bb7c752459eea8ef0ba36c1bb487
SHA5125baab547119edfb391942b2a60605c70056b4f03dead2b93674d731666cc58b6f068bf50962cccfda2bbe7658d1d03de3dd38440be9ea60bb011205a34ff84db
-
Filesize
345KB
MD5cf7f04fe40c7a9e5010563fad76e59fb
SHA1e7c4b9cf606d8337c177e63a3ac387eedb551749
SHA2563753ee8d5d9f8967ed4e379600adf8819bd8bb7c752459eea8ef0ba36c1bb487
SHA5125baab547119edfb391942b2a60605c70056b4f03dead2b93674d731666cc58b6f068bf50962cccfda2bbe7658d1d03de3dd38440be9ea60bb011205a34ff84db
-
Filesize
345KB
MD53a800f4ab1976d4a9a9f2ad184b9f7df
SHA1519c83e13d5a18bb12c29cfcef9187e4ec151a88
SHA25600d5dad9b56c313f7e30fcf94198f4329730d6b4fd7a2e6a9adde87d51b4cd1f
SHA51213069c0fc13f02ebc52e10a587c952e4a2e74201ae7936a0e4cb17dcb49027a98ff35b400e7e36a2070cf2d5e5d27f78cd80e8204cb6c82953655d5b6faac9de
-
Filesize
345KB
MD53a800f4ab1976d4a9a9f2ad184b9f7df
SHA1519c83e13d5a18bb12c29cfcef9187e4ec151a88
SHA25600d5dad9b56c313f7e30fcf94198f4329730d6b4fd7a2e6a9adde87d51b4cd1f
SHA51213069c0fc13f02ebc52e10a587c952e4a2e74201ae7936a0e4cb17dcb49027a98ff35b400e7e36a2070cf2d5e5d27f78cd80e8204cb6c82953655d5b6faac9de
-
Filesize
345KB
MD53a800f4ab1976d4a9a9f2ad184b9f7df
SHA1519c83e13d5a18bb12c29cfcef9187e4ec151a88
SHA25600d5dad9b56c313f7e30fcf94198f4329730d6b4fd7a2e6a9adde87d51b4cd1f
SHA51213069c0fc13f02ebc52e10a587c952e4a2e74201ae7936a0e4cb17dcb49027a98ff35b400e7e36a2070cf2d5e5d27f78cd80e8204cb6c82953655d5b6faac9de
-
Filesize
345KB
MD5c790aef90a8304602f4c4bab8424526f
SHA1e8945cdc5f3cd60f3e50b2c3ec7e7cdd09ca5852
SHA2562fc3455940567c412e7448db715bc98d1a29fd5e0c56b3202165bea4e4300057
SHA512a62f0b25d5c3edade719b8425933f23c5ed59ec50507feef66b3a6d0722b4a02158309e33994c21649f1a4a7adfb3974d1dbc5f1a6faa28f8101a35b6681179c
-
Filesize
345KB
MD5c790aef90a8304602f4c4bab8424526f
SHA1e8945cdc5f3cd60f3e50b2c3ec7e7cdd09ca5852
SHA2562fc3455940567c412e7448db715bc98d1a29fd5e0c56b3202165bea4e4300057
SHA512a62f0b25d5c3edade719b8425933f23c5ed59ec50507feef66b3a6d0722b4a02158309e33994c21649f1a4a7adfb3974d1dbc5f1a6faa28f8101a35b6681179c
-
Filesize
345KB
MD5c790aef90a8304602f4c4bab8424526f
SHA1e8945cdc5f3cd60f3e50b2c3ec7e7cdd09ca5852
SHA2562fc3455940567c412e7448db715bc98d1a29fd5e0c56b3202165bea4e4300057
SHA512a62f0b25d5c3edade719b8425933f23c5ed59ec50507feef66b3a6d0722b4a02158309e33994c21649f1a4a7adfb3974d1dbc5f1a6faa28f8101a35b6681179c
-
Filesize
345KB
MD5361faa0d42a4c43f2c108021ff6a215e
SHA13571322c078ccc5a56fcb913612a31da02b55bf8
SHA2564bcf09d83976d6b7c68940f35ce86f86023b93f4e9c8b9f99b95b7d7fd579efa
SHA512cd876c46ee67a13f192f9b00ee3398dd90156a2feac09334065858a9bc6164307d79df2367baa4baa150dffe2572403a0399ca465a7147e636e6301344704729
-
Filesize
345KB
MD5361faa0d42a4c43f2c108021ff6a215e
SHA13571322c078ccc5a56fcb913612a31da02b55bf8
SHA2564bcf09d83976d6b7c68940f35ce86f86023b93f4e9c8b9f99b95b7d7fd579efa
SHA512cd876c46ee67a13f192f9b00ee3398dd90156a2feac09334065858a9bc6164307d79df2367baa4baa150dffe2572403a0399ca465a7147e636e6301344704729
-
Filesize
345KB
MD5361faa0d42a4c43f2c108021ff6a215e
SHA13571322c078ccc5a56fcb913612a31da02b55bf8
SHA2564bcf09d83976d6b7c68940f35ce86f86023b93f4e9c8b9f99b95b7d7fd579efa
SHA512cd876c46ee67a13f192f9b00ee3398dd90156a2feac09334065858a9bc6164307d79df2367baa4baa150dffe2572403a0399ca465a7147e636e6301344704729
-
Filesize
345KB
MD5b839b265f197bdc62f593dc9f99c843a
SHA1d98d94fc6672b427e209e8d3a0b0bc221f39275a
SHA25656ea566bd0ca87845d4fabf24d36d90bea80dbe426df70f2365819348d2c943e
SHA51292187d9e466cabf75b5cbb1b59d29912ed26fb1ad55e0d1771f7e2fc3757ce43e7e740f7f9f5e11fd502d2c8e75c1c8ab2d0ccca9b66bfcc3c949344698cf5a3
-
Filesize
345KB
MD5b839b265f197bdc62f593dc9f99c843a
SHA1d98d94fc6672b427e209e8d3a0b0bc221f39275a
SHA25656ea566bd0ca87845d4fabf24d36d90bea80dbe426df70f2365819348d2c943e
SHA51292187d9e466cabf75b5cbb1b59d29912ed26fb1ad55e0d1771f7e2fc3757ce43e7e740f7f9f5e11fd502d2c8e75c1c8ab2d0ccca9b66bfcc3c949344698cf5a3
-
Filesize
345KB
MD5b839b265f197bdc62f593dc9f99c843a
SHA1d98d94fc6672b427e209e8d3a0b0bc221f39275a
SHA25656ea566bd0ca87845d4fabf24d36d90bea80dbe426df70f2365819348d2c943e
SHA51292187d9e466cabf75b5cbb1b59d29912ed26fb1ad55e0d1771f7e2fc3757ce43e7e740f7f9f5e11fd502d2c8e75c1c8ab2d0ccca9b66bfcc3c949344698cf5a3
-
Filesize
345KB
MD52cd4d778469477ab3bd52b96853c5eda
SHA14f95af885d0b56abe82b343835867232508e24aa
SHA2568cc4d56b9184764e4c8a97932d9698970cfe0ae1b1f62a170e11e0122d35b344
SHA5125528df854cf9a64b0571526555560420b526dc34aeefd7e85d05a3ad0081be543b86e74849a17a25b08bc910d39a6e2abe77978ede898d96309093ab07b5de9b
-
Filesize
345KB
MD52cd4d778469477ab3bd52b96853c5eda
SHA14f95af885d0b56abe82b343835867232508e24aa
SHA2568cc4d56b9184764e4c8a97932d9698970cfe0ae1b1f62a170e11e0122d35b344
SHA5125528df854cf9a64b0571526555560420b526dc34aeefd7e85d05a3ad0081be543b86e74849a17a25b08bc910d39a6e2abe77978ede898d96309093ab07b5de9b
-
Filesize
345KB
MD52cd4d778469477ab3bd52b96853c5eda
SHA14f95af885d0b56abe82b343835867232508e24aa
SHA2568cc4d56b9184764e4c8a97932d9698970cfe0ae1b1f62a170e11e0122d35b344
SHA5125528df854cf9a64b0571526555560420b526dc34aeefd7e85d05a3ad0081be543b86e74849a17a25b08bc910d39a6e2abe77978ede898d96309093ab07b5de9b
-
Filesize
345KB
MD557e70bcb3eefeb910444786e9b6bf0a9
SHA1f3c22bebf4e535f8f335e0c5e7ce1af11e595b57
SHA256cca387b2e968beaf5be951b9deb1a05801a7ae80f90142ed2a9d5a24a109bced
SHA51230b29b4a2b8565480fbe3d22ae87ed9bad29333e0491cc00c9f04690ba8660f739140c54950a24a42a07697284fa3d054210591b5e9143c9d1e3653deabeab17
-
Filesize
345KB
MD557e70bcb3eefeb910444786e9b6bf0a9
SHA1f3c22bebf4e535f8f335e0c5e7ce1af11e595b57
SHA256cca387b2e968beaf5be951b9deb1a05801a7ae80f90142ed2a9d5a24a109bced
SHA51230b29b4a2b8565480fbe3d22ae87ed9bad29333e0491cc00c9f04690ba8660f739140c54950a24a42a07697284fa3d054210591b5e9143c9d1e3653deabeab17
-
Filesize
345KB
MD557e70bcb3eefeb910444786e9b6bf0a9
SHA1f3c22bebf4e535f8f335e0c5e7ce1af11e595b57
SHA256cca387b2e968beaf5be951b9deb1a05801a7ae80f90142ed2a9d5a24a109bced
SHA51230b29b4a2b8565480fbe3d22ae87ed9bad29333e0491cc00c9f04690ba8660f739140c54950a24a42a07697284fa3d054210591b5e9143c9d1e3653deabeab17
-
Filesize
345KB
MD54ce5c7dd348b9f8a4fdcef5fd2754f08
SHA1b3a1a492a24b717276e664eb2461729fb2d3765e
SHA2562af4143c9ed558a5d86e3846af1d87c006a695a7cfb8267481d3c8dc339c8164
SHA512178cc05ca4f3085073af0bd312c50248ebefcd0353cab6c1ee8dae942637f92f418dfc9dd52ea7d968aff0436f4e3da24df32381e82948d9a9ac1a18824c78fe
-
Filesize
345KB
MD5be1b730e8074bcbb435ffbbb03292e90
SHA186b1f55f02e72e995a5bce0ba7c614c668cb5506
SHA256eb5711c2974959d7d00fd7ec4cba826a82c1316fe6d0aaa68513c938b10036a5
SHA5123a19342367ba6449eaa7998fc9fce05d38aeee1b516870ab834eaaed0090b471a44f6e50f696a40e85d739315539155147b7ba3e5074fbe49ca443455ad4a89a
-
Filesize
345KB
MD5be1b730e8074bcbb435ffbbb03292e90
SHA186b1f55f02e72e995a5bce0ba7c614c668cb5506
SHA256eb5711c2974959d7d00fd7ec4cba826a82c1316fe6d0aaa68513c938b10036a5
SHA5123a19342367ba6449eaa7998fc9fce05d38aeee1b516870ab834eaaed0090b471a44f6e50f696a40e85d739315539155147b7ba3e5074fbe49ca443455ad4a89a
-
Filesize
345KB
MD5be1b730e8074bcbb435ffbbb03292e90
SHA186b1f55f02e72e995a5bce0ba7c614c668cb5506
SHA256eb5711c2974959d7d00fd7ec4cba826a82c1316fe6d0aaa68513c938b10036a5
SHA5123a19342367ba6449eaa7998fc9fce05d38aeee1b516870ab834eaaed0090b471a44f6e50f696a40e85d739315539155147b7ba3e5074fbe49ca443455ad4a89a
-
Filesize
345KB
MD5b9e81f0afd1ad75978a49af26447ee0d
SHA1cbf80dab6127f68a3cb499dc077be9dd0c6baa9c
SHA256fe7cb5ee476526ecf1a8175fc3190775c3a826750770be52a48de5deda1d5e54
SHA512164a3f597f9df08ac3c4873398ca6090ca1a42ec6f3628733b9427b1a1746757581fdf152204c194736432b5cdd630851276dbd538e960adf98356bdeb40adee
-
Filesize
345KB
MD5740daa0938bcab15e79007187d5a90a8
SHA142187bc9ef2c89949ada8c2af4e97bb74649d00e
SHA2568170a74b1d81c5aa333e4a3686f42303741e42ffee7a4b55a5e9a179bb87241c
SHA5121feb045237e0b23990e01afa690a914508735ef1240794d9da75249b4ac05ecb04175438f2e56ef8cdd144ca0af5fd9af418b589e070e65c0b55dfde1fcc8260
-
Filesize
345KB
MD54569023293a95b749010a4c107c3b926
SHA1f3330fca9e31d13c2ec011ac6d2a9e376dc62887
SHA2566c934af0d857350f915fae56181263f3dea2fa0287c836cc668bd2b77107d5c6
SHA5126825205f43bfaf126d739d527f32f794a4ef823f8d6563d9dce525f6740a6212f29a127f80b40d2105e0c8c497a75e83b901bc77bdb0339cab170bf86957ddbf
-
Filesize
345KB
MD5d2c0a83e3f21c9dad9a94e094124de1f
SHA114eaf33b567b27264ae390979249683041387f29
SHA25620129904f236e96c92fc1319a60f853d4cd56a243fbd160f31b10f38f10c2837
SHA5127bb97b058f8fbde702da1ba82f09bed4245865aaf925fbaf93b620437e1f1cb258c2d00130e6bbf52bc12e811532c2f3361c8c58eaf6100f8e9c813bfaafaa52
-
Filesize
345KB
MD50daa862a9ccb9a6d4aef883f5d607ee1
SHA1dd6c4ee3fc11bfd91d35789b9dbe459dcdd708c8
SHA256dd07605079f6e2dd153bc0b5151bd1154c6d84a74cf3be62d635600b9c1c5452
SHA51276af791c5372929c86f9d261444085975da3a6d746bedb461009937ea130d30af2accd4bdd5861426bd718c66c770558735eb17ea3df61cd75fffb4b76d2d2a2
-
Filesize
345KB
MD5cb048ed79718fe96e84bee1f877433c6
SHA17d99d6b38ca27802a04526da0967370894b9bfcf
SHA25638d203dc60417993a5b498c49b4d12ed6c10846759b4b53d4cb032c9717ce117
SHA51244829c95d1b00eeaa254939f747941df9b2c72a751906f86ce024bfb7f80e715b244fac9374413d14aa0bfe6ae817ff32b42e2fbae5ee1d8c8ebf5b20646b5d7
-
Filesize
345KB
MD5a722c2acc7e22ba819d5d937e3b17775
SHA115cec237e65cb61fec644b57acb0e2bdb5a3a5d4
SHA25682ae570efce38f15cddf0ca71a81c9e2e3011656fc1977ced433506472746af3
SHA5123d6a2b8b536223a552e287a6d466eb48bed0f23a428212f0d34dfe8006c4bcfc1e8e9bc587f66fb7345908520947a651913ebbf50a11a50ef11fe161bfd89644
-
Filesize
345KB
MD56708a75d91bcb7137d9deb745c118033
SHA1110e208a1d25ad8db091d23101c426d53dfda99a
SHA256466c38f0fec2b4e239f0828788e5f8bd0ef3f29319258486ac516dae6a0dc695
SHA51210c9278c4765906f780a2a9e6010829d9dd3b7e2cf161094b67a930e2e04c6e96ff4e03da4f1c79fd12ddd40841547cbc4649408f337f1083f5ec15f4dcd5bef
-
Filesize
345KB
MD56708a75d91bcb7137d9deb745c118033
SHA1110e208a1d25ad8db091d23101c426d53dfda99a
SHA256466c38f0fec2b4e239f0828788e5f8bd0ef3f29319258486ac516dae6a0dc695
SHA51210c9278c4765906f780a2a9e6010829d9dd3b7e2cf161094b67a930e2e04c6e96ff4e03da4f1c79fd12ddd40841547cbc4649408f337f1083f5ec15f4dcd5bef
-
Filesize
345KB
MD5f0ea27d7881e16cd4145aebdb55e673e
SHA1ca746b2317f158421a7398cf108ea446331cd28c
SHA256f779b466a179ba27bdfc385df701f05ed091bd1c1d0f25e00b9b3c2303167a36
SHA512f19484bf6156f18a340526499a4429e5f1ba76fd38441134a0aeb77b4eb29c2ca36b58ff12a4111a7f96a9a40fb4593a5aacf80ee351d1363282d1d5bf276b23
-
Filesize
345KB
MD5f0ea27d7881e16cd4145aebdb55e673e
SHA1ca746b2317f158421a7398cf108ea446331cd28c
SHA256f779b466a179ba27bdfc385df701f05ed091bd1c1d0f25e00b9b3c2303167a36
SHA512f19484bf6156f18a340526499a4429e5f1ba76fd38441134a0aeb77b4eb29c2ca36b58ff12a4111a7f96a9a40fb4593a5aacf80ee351d1363282d1d5bf276b23
-
Filesize
345KB
MD5617a62cb4dca73859b383e72f1d72dce
SHA174b68de7d8d79af684174e60c0849fb7704445f6
SHA25698d63ee13779204037c689f4bd01341abf7020ec4664f567e020e31b6d4c8253
SHA512a036302639fea3701ab0599b986559686056c22e43d304b64e83c8dc49d05c390bc2a4e14ec1fbf53a176c7433c38337ec199ae07a5042d2c9294d0e93fe21d2
-
Filesize
345KB
MD5617a62cb4dca73859b383e72f1d72dce
SHA174b68de7d8d79af684174e60c0849fb7704445f6
SHA25698d63ee13779204037c689f4bd01341abf7020ec4664f567e020e31b6d4c8253
SHA512a036302639fea3701ab0599b986559686056c22e43d304b64e83c8dc49d05c390bc2a4e14ec1fbf53a176c7433c38337ec199ae07a5042d2c9294d0e93fe21d2
-
Filesize
345KB
MD5569f01a870851df9d3105667943d944c
SHA1e7dc8b238563b3ecb3076caeb40b9eb6cb4beb3e
SHA256a554bfaa8bfcc5ea7cc67d7fa27e42dced103bef5bcb7f392f75bff36e9eb779
SHA512089bc93b68a39f33aead2f23fd27a7fb44f71ef2c9e00896b85a1022f3afc9181e28a3ddf60d2d465c70d543ee93e17a483f11f9495122f4ffcfc0ad91cfa09d
-
Filesize
345KB
MD5569f01a870851df9d3105667943d944c
SHA1e7dc8b238563b3ecb3076caeb40b9eb6cb4beb3e
SHA256a554bfaa8bfcc5ea7cc67d7fa27e42dced103bef5bcb7f392f75bff36e9eb779
SHA512089bc93b68a39f33aead2f23fd27a7fb44f71ef2c9e00896b85a1022f3afc9181e28a3ddf60d2d465c70d543ee93e17a483f11f9495122f4ffcfc0ad91cfa09d
-
Filesize
345KB
MD53e8efc402c14a4a7d40f44679d1aa968
SHA177680e0a9f3296e59692f89b647b061c24deb51f
SHA256ac287dc5a15c3ecae68c9a5186553d6b2c7b35fba7b52055f8a66b40720dbd1c
SHA512a5072f6b47165d1f3205557bfefd8a67d167eef7df7f67310f5f8aab87252fffda08aeabdfc0ece4e86eea32e670b6e3c4b03c644a3a0f3b4e6d615c04dc7f31
-
Filesize
345KB
MD53e8efc402c14a4a7d40f44679d1aa968
SHA177680e0a9f3296e59692f89b647b061c24deb51f
SHA256ac287dc5a15c3ecae68c9a5186553d6b2c7b35fba7b52055f8a66b40720dbd1c
SHA512a5072f6b47165d1f3205557bfefd8a67d167eef7df7f67310f5f8aab87252fffda08aeabdfc0ece4e86eea32e670b6e3c4b03c644a3a0f3b4e6d615c04dc7f31
-
Filesize
345KB
MD5bfd0c13d7caa02f2b77f7dc85fc22278
SHA146cc09eaf534ef644d4cb10e0303a0b220f65dc0
SHA256d03b6841b803e855dd29279a80e4815ca7a4c3d20f7c31cd181349f8679e1edd
SHA51266db5167b9d258bbc7926cd4f76308816bd8a1ed55a795e8b64caefaf02dec41a3532543798e0ec1f8fcfffa4a3b850ba0b5531bf659744b840cbb217c5f3c0f
-
Filesize
345KB
MD5bfd0c13d7caa02f2b77f7dc85fc22278
SHA146cc09eaf534ef644d4cb10e0303a0b220f65dc0
SHA256d03b6841b803e855dd29279a80e4815ca7a4c3d20f7c31cd181349f8679e1edd
SHA51266db5167b9d258bbc7926cd4f76308816bd8a1ed55a795e8b64caefaf02dec41a3532543798e0ec1f8fcfffa4a3b850ba0b5531bf659744b840cbb217c5f3c0f
-
Filesize
345KB
MD5845023ec20fe69cbcbae753484ec1d19
SHA1601ecc99fcbc3b8f3c8a8532f37e123180b6d828
SHA256ac220a7d4332a67772f516f5fa3ce793d3e60cdb08ebd48066801e245acac6e7
SHA512e20a4b77f11b6f32411b862687bbad5e87684d7afe431d2068dcb99bbc928664d1badd24f31442099a381cd73aec5e2d29bca32f5905dea6753d27827766c07f
-
Filesize
345KB
MD5845023ec20fe69cbcbae753484ec1d19
SHA1601ecc99fcbc3b8f3c8a8532f37e123180b6d828
SHA256ac220a7d4332a67772f516f5fa3ce793d3e60cdb08ebd48066801e245acac6e7
SHA512e20a4b77f11b6f32411b862687bbad5e87684d7afe431d2068dcb99bbc928664d1badd24f31442099a381cd73aec5e2d29bca32f5905dea6753d27827766c07f
-
Filesize
345KB
MD5e8affd4c6e2f3483db7a55a7a86e0407
SHA152861e6d1d888d265e6baf588fed448ebb7c4069
SHA2563778f874e2b7cbfdd269f7ef85e85e981f6678897b366946cd1c9d0ba2128234
SHA512db67c3d08598f446549026e3ced552a6ae0735f0b37da95fa6ff597297b2649a7efe9405f7e996fb25b48a7df20aea406491b73ddee8070ef43112f19acbaab3
-
Filesize
345KB
MD5e8affd4c6e2f3483db7a55a7a86e0407
SHA152861e6d1d888d265e6baf588fed448ebb7c4069
SHA2563778f874e2b7cbfdd269f7ef85e85e981f6678897b366946cd1c9d0ba2128234
SHA512db67c3d08598f446549026e3ced552a6ae0735f0b37da95fa6ff597297b2649a7efe9405f7e996fb25b48a7df20aea406491b73ddee8070ef43112f19acbaab3
-
Filesize
345KB
MD5cf7f04fe40c7a9e5010563fad76e59fb
SHA1e7c4b9cf606d8337c177e63a3ac387eedb551749
SHA2563753ee8d5d9f8967ed4e379600adf8819bd8bb7c752459eea8ef0ba36c1bb487
SHA5125baab547119edfb391942b2a60605c70056b4f03dead2b93674d731666cc58b6f068bf50962cccfda2bbe7658d1d03de3dd38440be9ea60bb011205a34ff84db
-
Filesize
345KB
MD5cf7f04fe40c7a9e5010563fad76e59fb
SHA1e7c4b9cf606d8337c177e63a3ac387eedb551749
SHA2563753ee8d5d9f8967ed4e379600adf8819bd8bb7c752459eea8ef0ba36c1bb487
SHA5125baab547119edfb391942b2a60605c70056b4f03dead2b93674d731666cc58b6f068bf50962cccfda2bbe7658d1d03de3dd38440be9ea60bb011205a34ff84db
-
Filesize
345KB
MD53a800f4ab1976d4a9a9f2ad184b9f7df
SHA1519c83e13d5a18bb12c29cfcef9187e4ec151a88
SHA25600d5dad9b56c313f7e30fcf94198f4329730d6b4fd7a2e6a9adde87d51b4cd1f
SHA51213069c0fc13f02ebc52e10a587c952e4a2e74201ae7936a0e4cb17dcb49027a98ff35b400e7e36a2070cf2d5e5d27f78cd80e8204cb6c82953655d5b6faac9de
-
Filesize
345KB
MD53a800f4ab1976d4a9a9f2ad184b9f7df
SHA1519c83e13d5a18bb12c29cfcef9187e4ec151a88
SHA25600d5dad9b56c313f7e30fcf94198f4329730d6b4fd7a2e6a9adde87d51b4cd1f
SHA51213069c0fc13f02ebc52e10a587c952e4a2e74201ae7936a0e4cb17dcb49027a98ff35b400e7e36a2070cf2d5e5d27f78cd80e8204cb6c82953655d5b6faac9de
-
Filesize
345KB
MD5c790aef90a8304602f4c4bab8424526f
SHA1e8945cdc5f3cd60f3e50b2c3ec7e7cdd09ca5852
SHA2562fc3455940567c412e7448db715bc98d1a29fd5e0c56b3202165bea4e4300057
SHA512a62f0b25d5c3edade719b8425933f23c5ed59ec50507feef66b3a6d0722b4a02158309e33994c21649f1a4a7adfb3974d1dbc5f1a6faa28f8101a35b6681179c
-
Filesize
345KB
MD5c790aef90a8304602f4c4bab8424526f
SHA1e8945cdc5f3cd60f3e50b2c3ec7e7cdd09ca5852
SHA2562fc3455940567c412e7448db715bc98d1a29fd5e0c56b3202165bea4e4300057
SHA512a62f0b25d5c3edade719b8425933f23c5ed59ec50507feef66b3a6d0722b4a02158309e33994c21649f1a4a7adfb3974d1dbc5f1a6faa28f8101a35b6681179c
-
Filesize
345KB
MD5361faa0d42a4c43f2c108021ff6a215e
SHA13571322c078ccc5a56fcb913612a31da02b55bf8
SHA2564bcf09d83976d6b7c68940f35ce86f86023b93f4e9c8b9f99b95b7d7fd579efa
SHA512cd876c46ee67a13f192f9b00ee3398dd90156a2feac09334065858a9bc6164307d79df2367baa4baa150dffe2572403a0399ca465a7147e636e6301344704729
-
Filesize
345KB
MD5361faa0d42a4c43f2c108021ff6a215e
SHA13571322c078ccc5a56fcb913612a31da02b55bf8
SHA2564bcf09d83976d6b7c68940f35ce86f86023b93f4e9c8b9f99b95b7d7fd579efa
SHA512cd876c46ee67a13f192f9b00ee3398dd90156a2feac09334065858a9bc6164307d79df2367baa4baa150dffe2572403a0399ca465a7147e636e6301344704729
-
Filesize
345KB
MD5b839b265f197bdc62f593dc9f99c843a
SHA1d98d94fc6672b427e209e8d3a0b0bc221f39275a
SHA25656ea566bd0ca87845d4fabf24d36d90bea80dbe426df70f2365819348d2c943e
SHA51292187d9e466cabf75b5cbb1b59d29912ed26fb1ad55e0d1771f7e2fc3757ce43e7e740f7f9f5e11fd502d2c8e75c1c8ab2d0ccca9b66bfcc3c949344698cf5a3
-
Filesize
345KB
MD5b839b265f197bdc62f593dc9f99c843a
SHA1d98d94fc6672b427e209e8d3a0b0bc221f39275a
SHA25656ea566bd0ca87845d4fabf24d36d90bea80dbe426df70f2365819348d2c943e
SHA51292187d9e466cabf75b5cbb1b59d29912ed26fb1ad55e0d1771f7e2fc3757ce43e7e740f7f9f5e11fd502d2c8e75c1c8ab2d0ccca9b66bfcc3c949344698cf5a3
-
Filesize
345KB
MD52cd4d778469477ab3bd52b96853c5eda
SHA14f95af885d0b56abe82b343835867232508e24aa
SHA2568cc4d56b9184764e4c8a97932d9698970cfe0ae1b1f62a170e11e0122d35b344
SHA5125528df854cf9a64b0571526555560420b526dc34aeefd7e85d05a3ad0081be543b86e74849a17a25b08bc910d39a6e2abe77978ede898d96309093ab07b5de9b
-
Filesize
345KB
MD52cd4d778469477ab3bd52b96853c5eda
SHA14f95af885d0b56abe82b343835867232508e24aa
SHA2568cc4d56b9184764e4c8a97932d9698970cfe0ae1b1f62a170e11e0122d35b344
SHA5125528df854cf9a64b0571526555560420b526dc34aeefd7e85d05a3ad0081be543b86e74849a17a25b08bc910d39a6e2abe77978ede898d96309093ab07b5de9b
-
Filesize
345KB
MD557e70bcb3eefeb910444786e9b6bf0a9
SHA1f3c22bebf4e535f8f335e0c5e7ce1af11e595b57
SHA256cca387b2e968beaf5be951b9deb1a05801a7ae80f90142ed2a9d5a24a109bced
SHA51230b29b4a2b8565480fbe3d22ae87ed9bad29333e0491cc00c9f04690ba8660f739140c54950a24a42a07697284fa3d054210591b5e9143c9d1e3653deabeab17
-
Filesize
345KB
MD557e70bcb3eefeb910444786e9b6bf0a9
SHA1f3c22bebf4e535f8f335e0c5e7ce1af11e595b57
SHA256cca387b2e968beaf5be951b9deb1a05801a7ae80f90142ed2a9d5a24a109bced
SHA51230b29b4a2b8565480fbe3d22ae87ed9bad29333e0491cc00c9f04690ba8660f739140c54950a24a42a07697284fa3d054210591b5e9143c9d1e3653deabeab17
-
Filesize
345KB
MD5be1b730e8074bcbb435ffbbb03292e90
SHA186b1f55f02e72e995a5bce0ba7c614c668cb5506
SHA256eb5711c2974959d7d00fd7ec4cba826a82c1316fe6d0aaa68513c938b10036a5
SHA5123a19342367ba6449eaa7998fc9fce05d38aeee1b516870ab834eaaed0090b471a44f6e50f696a40e85d739315539155147b7ba3e5074fbe49ca443455ad4a89a
-
Filesize
345KB
MD5be1b730e8074bcbb435ffbbb03292e90
SHA186b1f55f02e72e995a5bce0ba7c614c668cb5506
SHA256eb5711c2974959d7d00fd7ec4cba826a82c1316fe6d0aaa68513c938b10036a5
SHA5123a19342367ba6449eaa7998fc9fce05d38aeee1b516870ab834eaaed0090b471a44f6e50f696a40e85d739315539155147b7ba3e5074fbe49ca443455ad4a89a