Behavioral task
behavioral1
Sample
14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics.pdf
Resource
win10v2004-20240426-en
General
-
Target
14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics
-
Size
442KB
-
MD5
14f6a202b3855468e52a9292b6432ed0
-
SHA1
a5bc2bc0be3fee2cd078ecb36627ab50762a7891
-
SHA256
6bb58d4570c12668eb56cc6961a56fcf40a6ef0f921aa72265e3602e6dc389f0
-
SHA512
0ab48c1350598eaa7e35e767b5624813bac1716f69776c48c751838a3cd6a4d297cdcb9d7ce1d18c31a0aa1fa2d6859b89487cbe95bf0c2e5ed34654740a0952
-
SSDEEP
12288:7GXotZ3A7DjRJntCpS4tDKnORexG43GOOvwl:ioZ3qPR1sEc5exG43Ggl
Malware Config
Signatures
Files
-
14f6a202b3855468e52a9292b6432ed0_NeikiAnalytics.pdf
-
http://BCCmissratiowhenvaryingBCCsizeandnumberofpagesperentry.by
-
http://acm.org
-
http://cs.wisc.edu
-
http://download.intel.com/design/processor/specupdt/320836.pdf,May2011.[21]IntelXeonProcessorE5Family:Speci
-
http://dx.doi.org/10.1145/2830772.2830819.1.INTRODUCTION`Bordercontrol'meanstheactivitycarriedoutataborder...inresponseexclusivelytoanintentiontocrossortheactofcrossingthatborder,regardlessofanyotherconsideration,consistingofborderchecksandbordersurveillance.Article2,Section9oftheSchengenBordersCode1WiththebreakdownofDennardscaling,specializedhardwareacceleratorsarebeinghailedasonewaytoimproveperformanceandreducepower.Computationscanbeo
-
http://virtical.upv.es/pub/sc13.pdf,Nov.2013.[16]USDepartmentofDefense,
-
http://www.amd.com/us/products/desktop/processors/a-series/Pages/nextgenapu.aspx
-
http://www.amd.com/us/products/desktop/processors/a-series/Pages/nextgenapu.aspx.[15]J.Goodacre,
-
http://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html
-
http://www.xilinx.com/products/silicon-devices/soc/zynq-7000.html,2014.[19]A.L.Shimpi,
- Show all
-