Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
9660d8bc70a39a8263485abfab420350
-
SHA1
90d3a7ebef9645611c8d415e4ab99d7bd564e45b
-
SHA256
e2eaac4381353a11e866a104da19cf988a64d2d3c0e1bac998c68acc39612998
-
SHA512
f1f1e869564a45787ba5c5641d0dd5e25214375b3a622a6dd62be503a915b68c8c3ea444118cb9e7d42eb0cd35e90743273e4f4ef4796cfccb06005087a7ca84
-
SSDEEP
12288:UEMa8hlFY/zcK41sWytpmRYTklM/vbpqwVeEIwIm6iLQW+TLz:UEf8hlF0zcd2tpMM1qyefnmwW+D
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral2/memory/1652-1-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-4-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-3-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-5-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-7-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-8-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-10-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-6-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-9-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-12-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-107-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-105-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-108-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-109-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-110-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-112-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-113-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-114-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-116-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-119-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-121-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-123-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-129-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-134-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-135-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-138-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-140-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-142-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-141-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-143-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-147-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-146-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-148-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-149-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-151-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-155-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-157-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-158-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-159-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-168-0x0000000002420000-0x00000000034DA000-memory.dmp upx behavioral2/memory/1652-365-0x0000000002420000-0x00000000034DA000-memory.dmp upx -
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process File opened (read-only) \??\X: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\E: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\H: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\J: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\K: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\Q: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\S: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\U: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\W: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\Y: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\P: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\G: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\L: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\M: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\N: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\O: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\I: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\R: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\T: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\V: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened (read-only) \??\Z: 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process File opened for modification C:\autorun.inf 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification F:\autorun.inf 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Drops file in Program Files directory 14 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Backup 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Temp 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\7z.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process File created C:\Windows\e57ef42 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe File opened for modification C:\Windows\SYSTEM.INI 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exepid process 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Token: SeDebugPrivilege 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exepid process 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription pid process target process PID 1652 wrote to memory of 796 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 792 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 388 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe dwm.exe PID 1652 wrote to memory of 2432 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe sihost.exe PID 1652 wrote to memory of 2444 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 2536 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe taskhostw.exe PID 1652 wrote to memory of 3268 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Explorer.EXE PID 1652 wrote to memory of 3580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 3772 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe DllHost.exe PID 1652 wrote to memory of 3892 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1652 wrote to memory of 3972 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4088 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe SearchApp.exe PID 1652 wrote to memory of 4192 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4812 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe TextInputHost.exe PID 1652 wrote to memory of 5052 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3984 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 2472 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4824 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3880 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4112 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4844 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 796 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 792 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 388 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe dwm.exe PID 1652 wrote to memory of 2432 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe sihost.exe PID 1652 wrote to memory of 2444 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 2536 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe taskhostw.exe PID 1652 wrote to memory of 3268 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Explorer.EXE PID 1652 wrote to memory of 3580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 3772 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe DllHost.exe PID 1652 wrote to memory of 3892 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1652 wrote to memory of 3972 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4088 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe SearchApp.exe PID 1652 wrote to memory of 4192 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4812 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe TextInputHost.exe PID 1652 wrote to memory of 5052 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3984 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 2472 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4824 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3880 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4112 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4844 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 796 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 792 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe fontdrvhost.exe PID 1652 wrote to memory of 388 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe dwm.exe PID 1652 wrote to memory of 2432 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe sihost.exe PID 1652 wrote to memory of 2444 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 2536 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe taskhostw.exe PID 1652 wrote to memory of 3268 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe Explorer.EXE PID 1652 wrote to memory of 3580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe svchost.exe PID 1652 wrote to memory of 3772 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe DllHost.exe PID 1652 wrote to memory of 3892 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe StartMenuExperienceHost.exe PID 1652 wrote to memory of 3972 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4088 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe SearchApp.exe PID 1652 wrote to memory of 4192 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4812 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe RuntimeBroker.exe PID 1652 wrote to memory of 4580 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe TextInputHost.exe PID 1652 wrote to memory of 5052 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3984 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 2472 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 4824 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe PID 1652 wrote to memory of 3880 1652 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9660d8bc70a39a8263485abfab420350_NeikiAnalytics.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2ac,0x7ff9d0222e98,0x7ff9d0222ea4,0x7ff9d0222eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2244 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2292 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2468 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5204 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5416 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1516 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:82⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
6Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Adobe\ARM\ArmReport.iniFilesize
634B
MD54600ea83e72c40d5b6d25248895c4d66
SHA1666d119fa0398adce7093f434fc15437ca6913c5
SHA2564f9b2f699943dc7a42321fde879d884202e9b3bd8391519cc69bd83d8d485aae
SHA51208c1e1315bd3be50f47cce09a7b9c36aa38572495cdcbaa1053f6cc14af921437f3972c25d2d5c8df70a5b2e239a62d4cec6b3039de5b99e43b173eab4cb0bc9
-
C:\ProgramData\Adobe\ARM\ArmReport.iniFilesize
746B
MD55757246b0746f04f7c6c7685c433d80f
SHA1910a75876285c35fe0fa03c11f36257aeba8a2b3
SHA256d33f7174ff6e717d72bfb38cf92e25135823d3d02273bf3f575f95d2afdc12dc
SHA5128f2f3642154d4f016f7679567cc5879e8d4a794a07b62b9663905406a77aebb111b04032353588719a631d9e5223acf543499ef7f7b36e0e15ec966c638219f4
-
C:\Users\Admin\AppData\Local\Temp\ArmUI.iniFilesize
251KB
MD5877c3e51957ef4f666d1d0e48d3e5427
SHA1050ed353f1deb41bca4a4b0937c0f0a32cbfcc9d
SHA2563c0c26c4f5738959ee1bb4bb75098d3515dbc8b7a06ea3d361acbcea3502b371
SHA512e8286dad87ac30d413662344c23b3d833556572974aefa5b15305ea7d76c8c437c40d7a7f985deebd9b76f3a86ca42298b6e45ee2d6f7b8bcf35e2ae4f3583b7
-
C:\Users\Admin\AppData\Local\Temp\TmpB38C.tmpFilesize
3KB
MD5bbb796dd2b53f7fb7ce855bb39535e2f
SHA1dfb022a179775c82893fe8c4f59df8f6d19bd2fd
SHA256ff9b4cf04e3202f150f19c1711767361343935da7841c98b876c42fd2cabce9b
SHA5120d122f454fcbf4524c2756692f0f33dc98f5bd2426839c6f03cd5c5f4fd507a8a15cf489d7a7ceadd1b95cf31b506c04bf03d613a9ba7d76add92766b1dc5c2b
-
C:\Users\Admin\AppData\Local\Temp\TmpCA52.tmpFilesize
3KB
MD5ec946860cff4f4a6d325a8de7d6254d2
SHA17c909f646d9b2d23c58f73ec2bb603cd59dc11fd
SHA25619fe53c801ad7edc635f61e9e28d07da31780c2480e6f37ecfc63fffe1b250fe
SHA51238a98b18dbae063bc533a1ff25a3467a7de197651e07e77a1b22cf8ce251282ab31f61dcff5c51ef186cfd115dc506181d480eabffbe92af01dee6282cbee13e
-
C:\Users\Admin\AppData\Local\Temp\TmpCA91.tmpFilesize
3KB
MD5fc2430057cb1be74c788f10c2d4540c8
SHA1cab67ee8d5191fbf9f25545825e06c1a822af2f2
SHA256dcc9d2695125406282ba990fec39403c44b12964acf51b5e0dc7f2080d714398
SHA5124e2b9709a9e3ca5173abb35816e5a0aebbf2a7aaf971d7f75f3ae66e4a812cbade103baa5016525f5ab83a60c18f8d3c278c90ff83e4afdae419f81673cb5aee
-
C:\Users\Admin\AppData\Local\Temp\TmpD11A.tmpFilesize
3KB
MD5a58599260c64cb41ed7d156db8ac13ef
SHA1fb9396eb1270e9331456a646ebf1419fc283dc06
SHA256aabf92089e16fdb28706356dbc4efb5a81f5277946f2e67695b31676616ed2d2
SHA5126970cbc42e7ec64ccdb8e5633b7017b1e9ec0d4ad094869e221e9275b814b1442b84827996190159543bdb5e86df6885c45197c533d657db4660fca8ad761a71
-
C:\jxeyc.exeFilesize
97KB
MD5b47d54820a5d13cc569d97481d7e0ec7
SHA1f1139510fcf7ff04ab9879479d0678f6da23121e
SHA2568d31a85676cd2249f6c29d44a705f8e8905e0ca9d1cfde66eb4a737a23049eed
SHA512623f01f9ea62492f32b35b1c94f3379cab0ee8d87e372a6094c219e2802092d699b7fd5d8b5dca92b6b74c53aa5237987ad97d4462aeca41739f66368e19371f
-
memory/1652-116-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-123-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-7-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-8-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-103-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/1652-104-0x0000000004650000-0x0000000004652000-memory.dmpFilesize
8KB
-
memory/1652-102-0x0000000004650000-0x0000000004652000-memory.dmpFilesize
8KB
-
memory/1652-10-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-6-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-9-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-12-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-106-0x0000000004650000-0x0000000004652000-memory.dmpFilesize
8KB
-
memory/1652-107-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-105-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-108-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-109-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-110-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-112-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-113-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-114-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-3-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-119-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-121-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-5-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-129-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-134-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-135-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-138-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-140-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-142-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-141-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-143-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-147-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-146-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-148-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-149-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-151-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-155-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-157-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-4-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-1-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-0-0x0000000000400000-0x0000000000530000-memory.dmpFilesize
1.2MB
-
memory/1652-158-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-159-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-168-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB
-
memory/1652-352-0x0000000004650000-0x0000000004652000-memory.dmpFilesize
8KB
-
memory/1652-364-0x0000000000400000-0x0000000000530000-memory.dmpFilesize
1.2MB
-
memory/1652-365-0x0000000002420000-0x00000000034DA000-memory.dmpFilesize
16.7MB