Analysis
-
max time kernel
135s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:47
Behavioral task
behavioral1
Sample
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
98143cf3aafa5f8f370d552fb99fe360
-
SHA1
67cc505864cf76a4a448c77230fbb9686be993c6
-
SHA256
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3
-
SHA512
4462b54386fc45613be421b4f366ccc86ba592334e18d7952c5ea03801ac1c39526c4ea07e80203708a3ce8eb631478485f095ac50bebaa8691aff45fb1c442f
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/mfuOdfHhGEi:E5aIwC+Agr6tdlmU1/eHKO
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2232-15-0x00000000008A0000-0x00000000008C9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exepid process 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 2120 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 1620 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe -
Loads dropped DLL 2 IoCs
Processes:
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exepid process 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2620 sc.exe 1944 sc.exe 2924 sc.exe 2828 sc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exepowershell.exepowershell.exepid process 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 2512 powershell.exe 2172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exedescription pid process Token: SeDebugPrivilege 2512 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeTcbPrivilege 2120 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe Token: SeTcbPrivilege 1620 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exepid process 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 2120 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe 1620 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.execmd.execmd.exe09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.execmd.exedescription pid process target process PID 2232 wrote to memory of 2324 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2324 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2324 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2324 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2388 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2388 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2388 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2388 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2640 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2640 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2640 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2640 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe cmd.exe PID 2232 wrote to memory of 2668 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe PID 2232 wrote to memory of 2668 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe PID 2232 wrote to memory of 2668 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe PID 2232 wrote to memory of 2668 2232 08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe PID 2324 wrote to memory of 2620 2324 cmd.exe sc.exe PID 2324 wrote to memory of 2620 2324 cmd.exe sc.exe PID 2324 wrote to memory of 2620 2324 cmd.exe sc.exe PID 2324 wrote to memory of 2620 2324 cmd.exe sc.exe PID 2388 wrote to memory of 2828 2388 cmd.exe sc.exe PID 2388 wrote to memory of 2828 2388 cmd.exe sc.exe PID 2388 wrote to memory of 2828 2388 cmd.exe sc.exe PID 2388 wrote to memory of 2828 2388 cmd.exe sc.exe PID 2668 wrote to memory of 2680 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2680 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2680 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2680 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2808 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2808 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2808 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2808 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2624 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2624 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2624 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 2624 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe cmd.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2640 wrote to memory of 2512 2640 cmd.exe powershell.exe PID 2640 wrote to memory of 2512 2640 cmd.exe powershell.exe PID 2640 wrote to memory of 2512 2640 cmd.exe powershell.exe PID 2640 wrote to memory of 2512 2640 cmd.exe powershell.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe PID 2668 wrote to memory of 1648 2668 09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\08ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {7653457A-0AAE-488A-9859-164028D3A217} S-1-5-18:NT AUTHORITY\System:Service:1⤵
-
C:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exeC:\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD55b4db5b2f4c0c7d0e1f876fd0f85365f
SHA19b576619e66121f4478cb81fbbf950cfa594ba9c
SHA256a389101feec4ecefbb429ec4b71fc2a9c9f9d19b0064d42da7364d416b86289d
SHA5124750d8cb7e377ce38cceb58fba46719c0c19306d7d4eede4cb3b596011a64cc55831481ac2a924bf785e27abf108c0973ee35ff09b1531a8c2e421577d40ba4a
-
\Users\Admin\AppData\Roaming\WinSocket\09ad7eb8fef39a9c076a799fd4344f1ff46cd1e39f6379a6ba32afedffc087c3_NeikiAnalytict.exeFilesize
1.4MB
MD598143cf3aafa5f8f370d552fb99fe360
SHA167cc505864cf76a4a448c77230fbb9686be993c6
SHA25608ad6eb7fef38a9c065a688fd4344f1ff45cd1e39f5369a5ba32afedffc076c3
SHA5124462b54386fc45613be421b4f366ccc86ba592334e18d7952c5ea03801ac1c39526c4ea07e80203708a3ce8eb631478485f095ac50bebaa8691aff45fb1c442f
-
memory/1620-92-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1620-93-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1648-49-0x0000000010000000-0x000000001001E000-memory.dmpFilesize
120KB
-
memory/2120-71-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-74-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-72-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-73-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-65-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-66-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-67-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-68-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-69-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-70-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-76-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2120-75-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2232-13-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-11-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-6-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-5-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-3-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-2-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-7-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-9-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-12-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-10-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-8-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-4-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-14-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2232-15-0x00000000008A0000-0x00000000008C9000-memory.dmpFilesize
164KB
-
memory/2232-18-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2232-17-0x0000000000421000-0x0000000000422000-memory.dmpFilesize
4KB
-
memory/2668-44-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2668-30-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-32-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-33-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-34-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-35-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-31-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-36-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-39-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-38-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-37-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-40-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2668-45-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/2668-41-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB