Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 13:23
Behavioral task
behavioral1
Sample
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
-
Size
2.9MB
-
MD5
c8c6b960a64cb319bf37b53591955960
-
SHA1
f04f1d843a9a8b4244ebb7d4a8bd04fdcd03872d
-
SHA256
5cf77cb93ee5c6fda6b575b6c14d60cb52dc6a69e17d23d989c088f4a098b0e8
-
SHA512
31110e87110406b1ca88cfafbf4c00d7c7a767393008a66b4f2748df387474af576bc7eb04adc4ac12c11f7b0e33150c16d7a60c12ff7a5592106d1ed11769fb
-
SSDEEP
49152:UHszeWDxWaQYU9xnOunPr423fny4CMqH05hKSX0PzdVYQ+Wnbf8enNlDUjZxEhso:UHSpVU9bPr42XRqUfXCzHYQBbf8iNtSw
Malware Config
Signatures
-
Detect Neshta payload 15 IoCs
Processes:
resource yara_rule behavioral2/memory/2024-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-144-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta behavioral2/memory/2024-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Executes dropped EXE 2 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exec8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exepid process 4068 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Loads dropped DLL 11 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exepid process 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe 4176 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\BHO\ie_to_edge_stub.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\msedge_proxy.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\elevation_service.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\cookie_exporter.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\INSTAL~1\setup.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~4.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.17\MICROS~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~2.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI9C33~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\notification_click_helper.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI391D~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\122023~1.52\identity_helper.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~3.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MIA062~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription ioc process File opened for modification C:\Windows\svchost.com c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exec8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exedescription pid process target process PID 2024 wrote to memory of 4068 2024 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe PID 2024 wrote to memory of 4068 2024 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe PID 2024 wrote to memory of 4068 2024 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe PID 4068 wrote to memory of 4176 4068 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe PID 4068 wrote to memory of 4176 4068 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe PID 4068 wrote to memory of 4176 4068 c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe"C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exe" -burn.filehandle.attached=548 -burn.filehandle.self=5363⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3940 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exeFilesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
C:\Users\Admin\AppData\Local\Temp\3582-490\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exeFilesize
2.9MB
MD5fe7b3a28d0d7b2812d117f822d938e65
SHA1a19dcfb8ed6627f1b0f9e54a7c64e4014e523b7a
SHA256d4a1891cd83e19fbb3d908f6db3bfd516f65e06108fbe0c45fb7fc52f132d3b4
SHA512ae7ac7d11bcb3108ca8ba9b47b0d90630c1fc6a5fdb3de4d26ea988e1645fb805bfeaf0dad5c8edd0d0928e299051375a6d073f504e503778bfd39e9b078f8a3
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Bootstrapper.dllFilesize
197KB
MD5cbd90fb2b484f33d2878d8d81794de37
SHA1ac153d36b1ffb15e933509b0cc5a38deee12bbd9
SHA256df40c2e9c90ad31f1130d37e2dbe896369c5df5737010432464fc853e5ea2f30
SHA512ef5d647916362a81107bce5ac7ffd1e20d75308f96437f8134a89895866d4579ceaea88f0d59590c9a6de6f8d27efef861f088637e8d0ad6fe95df6287a4b829
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\BootstrapperCore.configFilesize
1KB
MD55a502123a2adb3c114dbe6c5d37f9f61
SHA1c0d90ce929ec8c626dc1db431edc0b70b7edee6a
SHA2562527c708b6cab167e0c7c9a281f1aad6e8d952bc7ab0cc5731d6decca181cd5f
SHA5123a182f3d51e31257487e409b882c89d5c115623f0db905fa0d557cb1a010810b25046c11929b0827624fbe7f4dd0bde32869eff1a3ecd2462cde05d990552bde
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\BootstrapperCore.dllFilesize
87KB
MD5b0d10a2a622a322788780e7a3cbb85f3
SHA104d90b16fa7b47a545c1133d5c0ca9e490f54633
SHA256f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426
SHA51262b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Chipset.Bootstrapper.dllFilesize
10KB
MD5b20303841a71e1754adf296496633a71
SHA1226507f26be011ee2de5248161c24a93c997961e
SHA256ba072d1caf155a26d186063260f8d27126549805bfd9e8e0d537d343e24cbbcb
SHA512f6a73fb032eb0192e3c41cf573fafef1326f48d0eb156c4726be6ef1f3569ccbbe3d8560cee3a5046f23d92c8d329b8adffd01a63bf6e6c2b8e1334ac19a6666
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\CommandLineUtility.dllFilesize
46KB
MD5325b410c9d84003f5037cedf07bb97fe
SHA19a93f6cf8bcd15e0aa12c96109836e57b6d9267a
SHA2564b2330966345bb6fc6382e81a4ff1e7eab43a3ec642dedb8f2add7e0b03c6e41
SHA512d2359b7ca0ac32a22324b38d1b5325a045f4a1fa380761741349e86f6007c8850fa25f18ae9cfdbbeaf592412766b961be9491a64b478657e2d0a3ea9d5a7457
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\Intel.Tools.dllFilesize
18KB
MD536700b8cb3f725c0b266786200c86dde
SHA19734c9f8b193c77797a4c8785ac5cfac84befa52
SHA25652e7dab135e97b048c81bb943f9f231244588c1e8c0ccfb7a32b75a106e35f62
SHA512ecfe58c0fd34f738a61aec34eb938c557a59adce4e4344d1ad52ed0a7348b582c3d15b7dbeaaf9182e097d3a66c1535ac2029cbb4df91f992f9e169bc1aac2f9
-
C:\Windows\Temp\{31A24D23-3D1D-4D37-A5A8-6E46396249C3}\.ba\mbahost.dllFilesize
119KB
MD5c59832217903ce88793a6c40888e3cae
SHA16d9facabf41dcf53281897764d467696780623b8
SHA2569dfa1bc5d2ab4c652304976978749141b8c312784b05cb577f338a0aa91330db
SHA5121b1f4cb2e3fa57cb481e28a967b19a6fefa74f3c77a3f3214a6b09e11ceb20ae428d036929f000710b4eb24a2c57d5d7dfe39661d5a1f48ee69a02d83381d1a9
-
C:\Windows\Temp\{87EA7342-8523-4B75-B62B-5532398F6C3A}\.cr\c8c6b960a64cb319bf37b53591955960_NeikiAnalytics.exeFilesize
2.1MB
MD5329c83c19c24414bc4197e8edb59be73
SHA1c87a0c70d4aa94d1785b1a10fa31c0f33dcae8a9
SHA256f77c93d43d8ed763e19a8398c6fd8c5725bed806186be69d0723d9de1255a211
SHA512640b042b0f6b3c8756756f6e8faf15ba33c0b3a4e125f7866080a167a2216f8aee435402613d9298501093a30e4f807b30a80584ac323291fd09eff5a12da150
-
memory/2024-270-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-266-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-269-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-268-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-271-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-267-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-272-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-123-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-265-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-108-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-263-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-144-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-247-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/2024-165-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4176-124-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-149-0x0000000007B90000-0x0000000007C22000-memory.dmpFilesize
584KB
-
memory/4176-148-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-162-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-147-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-166-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-169-0x0000000007F90000-0x0000000007FC8000-memory.dmpFilesize
224KB
-
memory/4176-171-0x0000000007D00000-0x0000000007D0E000-memory.dmpFilesize
56KB
-
memory/4176-217-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-146-0x000000007298E000-0x000000007298F000-memory.dmpFilesize
4KB
-
memory/4176-143-0x0000000007010000-0x0000000007022000-memory.dmpFilesize
72KB
-
memory/4176-264-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-139-0x0000000007440000-0x00000000079E4000-memory.dmpFilesize
5.6MB
-
memory/4176-138-0x0000000006CD0000-0x0000000006CDC000-memory.dmpFilesize
48KB
-
memory/4176-134-0x0000000006D10000-0x0000000006D48000-memory.dmpFilesize
224KB
-
memory/4176-130-0x0000000006CC0000-0x0000000006CC8000-memory.dmpFilesize
32KB
-
memory/4176-121-0x00000000068A0000-0x00000000068B8000-memory.dmpFilesize
96KB
-
memory/4176-117-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-115-0x0000000072980000-0x0000000073130000-memory.dmpFilesize
7.7MB
-
memory/4176-114-0x000000007298E000-0x000000007298F000-memory.dmpFilesize
4KB