Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe
-
Size
8.5MB
-
MD5
6c9399a87e0672b66fa26a39fcddaad0
-
SHA1
3e6c7d6330948aec97e7f2e62b776d84c0ccee09
-
SHA256
e8ba0fe4c967dce850222941594ee24a54497b6c5faa745ba5a923c5870783b3
-
SHA512
6c17741b6f055f0a42e45bcded53edd8f6b548e61549bbe97cb0dfc2d1188329644f55143d519f38a6dff630bf7836a7f2e7e82463b66b502a28e8ee5679d512
-
SSDEEP
196608:eIVCzv5nF2CoAKQ5/X5bEN2tm5pOuU3TcLWGO7djZkrC5RQe:eIVCT5UJAKQNX5bENYm5IV3TcLWGO7t/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 7 IoCs
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\125.0.6422.77\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 34 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe updater.exeupdater.exeupdater.exeupdater.exeupdater.exeupdater.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exe125.0.6422.77_chrome_installer.exesetup.exesetup.exesetup.exesetup.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeelevation_service.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe 1696 updater.exe 5052 updater.exe 5028 updater.exe 968 updater.exe 4756 updater.exe 3256 updater.exe 3864 icsys.icn.exe 64 explorer.exe 3672 spoolsv.exe 1516 svchost.exe 1872 spoolsv.exe 2152 125.0.6422.77_chrome_installer.exe 2936 setup.exe 5020 setup.exe 5000 setup.exe 1776 setup.exe 1972 chrome.exe 2480 chrome.exe 4148 chrome.exe 3832 chrome.exe 3208 chrome.exe 3616 chrome.exe 4976 chrome.exe 2388 elevation_service.exe 1768 chrome.exe 4004 chrome.exe 4396 chrome.exe 2968 chrome.exe 1384 chrome.exe 1832 chrome.exe 1500 chrome.exe 2596 chrome.exe 5612 chrome.exe -
Loads dropped DLL 37 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 1972 chrome.exe 2480 chrome.exe 1972 chrome.exe 4148 chrome.exe 4148 chrome.exe 3832 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 3832 chrome.exe 3208 chrome.exe 3208 chrome.exe 3616 chrome.exe 4976 chrome.exe 4148 chrome.exe 4976 chrome.exe 4148 chrome.exe 4148 chrome.exe 3616 chrome.exe 1768 chrome.exe 1768 chrome.exe 4004 chrome.exe 4396 chrome.exe 4004 chrome.exe 4396 chrome.exe 2968 chrome.exe 2968 chrome.exe 1384 chrome.exe 1384 chrome.exe 1832 chrome.exe 1832 chrome.exe 1500 chrome.exe 1500 chrome.exe 2596 chrome.exe 2596 chrome.exe 5612 chrome.exe 5612 chrome.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 4 IoCs
Processes:
setup.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32\ = "\"C:\\Program Files\\Google\\Chrome\\Application\\125.0.6422.77\\notification_helper.exe\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32\ServerExecutable = "C:\\Program Files\\Google\\Chrome\\Application\\125.0.6422.77\\notification_helper.exe" setup.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
updater.exeupdater.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in System32 directory 3 IoCs
Processes:
explorer.exesvchost.exesetup.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
Processes:
updater.exesetup.exe6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe 125.0.6422.77_chrome_installer.exechrome.exesetup.exeupdater.exeupdater.exeupdater.exeupdater.exeupdater.exedescription ioc process File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\es.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\ur.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\VisualElements\SmallLogo.png setup.exe File created C:\Program Files (x86)\Google1752_1949374087\updater.7z 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe File created C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\CHROME.PACKED.7Z 125.0.6422.77_chrome_installer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_2139374443\crl-set chrome.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\fil.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\ja.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\chrome_wer.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\optimization_guide_internal.dll setup.exe File opened for modification C:\Program Files\Crashpad\metadata setup.exe File created C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\manifest.json updater.exe File created C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\511eae6b-76ca-4ab2-adc5-dad84d8e9b6d.tmp updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\d3dcompiler_47.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\pt-BR.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\sv.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\125.0.6422.77.manifest setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\bg.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\manifest.fingerprint updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\hu.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\sw.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files\Google\Chrome\Application\125.0.6422.77\Installer\chrmstp.exe setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_356856842\_metadata\verified_contents.json chrome.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad\metadata updater.exe File opened for modification C:\Program Files (x86)\Google\Update\GoogleUpdate.exe updater.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad\metadata updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\fi.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\nl.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\mojo_core.dll setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1972_356856842\manifest.fingerprint chrome.exe File created C:\Program Files (x86)\Google1752_948790148\UPDATER.PACKED.7Z 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe File created C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RFe579182.TMP updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\zh-TW.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad\settings.dat updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\bn.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\fa.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\libEGL.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\notification_helper.exe setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\chrome.dll.sig setup.exe File created C:\Program Files (x86)\Google1752_1949374087\bin\updater.exe 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\updater.log updater.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Extensions\external_extensions.json setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\VisualElements\SmallLogoBeta.png setup.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\1bd39228-8d73-4898-b863-eedcc1a071ec.tmp updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\dxil.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\es-419.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\te.pak setup.exe File created C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad\settings.dat updater.exe File created C:\Program Files (x86)\Google\GoogleUpdater\102fa63b-f0dc-4890-a400-ffb62564b2aa.tmp updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\ml.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\sl.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\dxcompiler.dll setup.exe File created C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\uninstall.cmd updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\af.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\Locales\sk.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\Chrome-bin\125.0.6422.77\vulkan-1.dll setup.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\updater.log updater.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad\metadata updater.exe File created C:\Program Files\Google\Chrome\Temp\source2936_1018331306\chrome.7z setup.exe -
Drops file in Windows directory 5 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 12 IoCs
Processes:
setup.exechrome.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Google\Chrome setup.exe Key created \REGISTRY\USER\.DEFAULT\Software setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Google\Chrome\InstallerPinned = "0" setup.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google setup.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609011196674292" chrome.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC\SoftLockoutVolatileKey svchost.exe Key created \REGISTRY\USER\S-1-5-19 svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC svchost.exe -
Modifies registry class 64 IoCs
Processes:
updater.exeupdater.exesetup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib\Version = "1.0" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{C4622B28-A747-44C7-96AF-319BE5C3B261}\1.0\0\win32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\1.0\0\win32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\TypeLib setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F63F6F8B-ACD5-413C-A44B-0409136D26CB} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\TypeLib\ = "{F258BE54-7C5F-44A0-AAE0-730620A31D23}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\1.0 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\5" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\ = "ICurrentState" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\1.0\ = "GoogleUpdater TypeLib for IPolicyStatus3" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\1.0\ = "GoogleUpdater TypeLib for IUpdaterObserverSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\TypeLib\Version = "1.0" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{699F07AD-304C-5F71-A2DA-ABD765965B54}\1.0 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4334319-8210-469B-8262-DD03623FEB5B}\1.0\ = "GoogleUpdater TypeLib for IPolicyStatus3System" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\TypeLib\ = "{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\TypeLib\ = "{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\1.0\ = "GoogleUpdater TypeLib for IProcessLauncher2" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F253E6BF-D9BE-5B1A-9E0D-23FA9FD4D571}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\5" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ = "IPolicyStatus3" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32\ServerExecutable = "C:\\Program Files\\Google\\Chrome\\Application\\125.0.6422.77\\notification_helper.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\1.0\0\win64 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827}\ = "IProcessLauncher2System" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\LocalService = "GoogleUpdaterService126.0.6462.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\TypeLib\ = "{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\ = "GoogleUpdater TypeLib for ICurrentStateSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\1.0\ = "GoogleUpdater TypeLib for IUpdaterSystem" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\ = "IAppCommandWebSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\ProxyStubClsid32 updater.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\LocalServer32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\GoogleUpdate.Update3WebMachine updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B62C003B-DD12-572A-87D4-6AA073CD56B1}\1.0\ = "GoogleUpdater TypeLib for IUpdaterInternalSystem" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\TypeLib\ = "{85AE4AE3-8530-516B-8BE4-A456BF2637D3}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4FE76BC-62B9-49FC-972F-C81FC3A926DB}\ = "IProcessLauncherSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\0\win64 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E9CD91E3-A00C-4B9E-BD63-7F34EB815D98}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\126.0.6462.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\1.0\0 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A0050632-BE5D-5130-9940-EAA92018E727}\ServiceParameters = "--com-service" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\ = "IUpdaterAppStateSystem" updater.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exeupdater.exeupdater.exeupdater.exeicsys.icn.exepid process 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 1696 updater.exe 1696 updater.exe 1696 updater.exe 1696 updater.exe 1696 updater.exe 1696 updater.exe 5028 updater.exe 5028 updater.exe 5028 updater.exe 5028 updater.exe 5028 updater.exe 5028 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 4756 updater.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 3864 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 64 explorer.exe 1516 svchost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe 125.0.6422.77_chrome_installer.exechrome.exedescription pid process Token: 33 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe Token: SeIncBasePriorityPrivilege 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe Token: 33 2152 125.0.6422.77_chrome_installer.exe Token: SeIncBasePriorityPrivilege 2152 125.0.6422.77_chrome_installer.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe Token: SeShutdownPrivilege 1972 chrome.exe Token: SeCreatePagefilePrivilege 1972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe 1972 chrome.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 3864 icsys.icn.exe 3864 icsys.icn.exe 64 explorer.exe 64 explorer.exe 3672 spoolsv.exe 3672 spoolsv.exe 1516 svchost.exe 1516 svchost.exe 1872 spoolsv.exe 1872 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe updater.exeupdater.exeupdater.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exe125.0.6422.77_chrome_installer.exesetup.exesetup.exechrome.exedescription pid process target process PID 2360 wrote to memory of 1752 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe PID 2360 wrote to memory of 1752 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe PID 2360 wrote to memory of 1752 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe PID 1752 wrote to memory of 1696 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe updater.exe PID 1752 wrote to memory of 1696 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe updater.exe PID 1752 wrote to memory of 1696 1752 6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe updater.exe PID 1696 wrote to memory of 5052 1696 updater.exe updater.exe PID 1696 wrote to memory of 5052 1696 updater.exe updater.exe PID 1696 wrote to memory of 5052 1696 updater.exe updater.exe PID 5028 wrote to memory of 968 5028 updater.exe updater.exe PID 5028 wrote to memory of 968 5028 updater.exe updater.exe PID 5028 wrote to memory of 968 5028 updater.exe updater.exe PID 4756 wrote to memory of 3256 4756 updater.exe updater.exe PID 4756 wrote to memory of 3256 4756 updater.exe updater.exe PID 4756 wrote to memory of 3256 4756 updater.exe updater.exe PID 2360 wrote to memory of 3864 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe icsys.icn.exe PID 2360 wrote to memory of 3864 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe icsys.icn.exe PID 2360 wrote to memory of 3864 2360 6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe icsys.icn.exe PID 3864 wrote to memory of 64 3864 icsys.icn.exe explorer.exe PID 3864 wrote to memory of 64 3864 icsys.icn.exe explorer.exe PID 3864 wrote to memory of 64 3864 icsys.icn.exe explorer.exe PID 64 wrote to memory of 3672 64 explorer.exe spoolsv.exe PID 64 wrote to memory of 3672 64 explorer.exe spoolsv.exe PID 64 wrote to memory of 3672 64 explorer.exe spoolsv.exe PID 3672 wrote to memory of 1516 3672 spoolsv.exe svchost.exe PID 3672 wrote to memory of 1516 3672 spoolsv.exe svchost.exe PID 3672 wrote to memory of 1516 3672 spoolsv.exe svchost.exe PID 1516 wrote to memory of 1872 1516 svchost.exe spoolsv.exe PID 1516 wrote to memory of 1872 1516 svchost.exe spoolsv.exe PID 1516 wrote to memory of 1872 1516 svchost.exe spoolsv.exe PID 4756 wrote to memory of 2152 4756 updater.exe 125.0.6422.77_chrome_installer.exe PID 4756 wrote to memory of 2152 4756 updater.exe 125.0.6422.77_chrome_installer.exe PID 2152 wrote to memory of 2936 2152 125.0.6422.77_chrome_installer.exe setup.exe PID 2152 wrote to memory of 2936 2152 125.0.6422.77_chrome_installer.exe setup.exe PID 2936 wrote to memory of 5020 2936 setup.exe setup.exe PID 2936 wrote to memory of 5020 2936 setup.exe setup.exe PID 2936 wrote to memory of 5000 2936 setup.exe setup.exe PID 2936 wrote to memory of 5000 2936 setup.exe setup.exe PID 5000 wrote to memory of 1776 5000 setup.exe setup.exe PID 5000 wrote to memory of 1776 5000 setup.exe setup.exe PID 1696 wrote to memory of 1972 1696 updater.exe chrome.exe PID 1696 wrote to memory of 1972 1696 updater.exe chrome.exe PID 1972 wrote to memory of 2480 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 2480 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe PID 1972 wrote to memory of 4148 1972 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6c9399a87e0672b66fa26a39fcddaad0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\users\admin\appdata\local\temp\6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exec:\users\admin\appdata\local\temp\6c9399a87e0672b66fa26a39fcddaad0_neikianalytics.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Google1752_1949374087\bin\updater.exe"C:\Program Files (x86)\Google1752_1949374087\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={6E478048-6B2C-95EC-72F7-7B440C89EBD4}&lang=en&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=23⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Google1752_1949374087\bin\updater.exe"C:\Program Files (x86)\Google1752_1949374087\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x8a965c,0x8a9668,0x8a96744⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=125.0.6422.77 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcfaed1c70,0x7ffcfaed1c7c,0x7ffcfaed1c885⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=1996 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1888,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=2032 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2340,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=2312 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2908,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=2976 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2916,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=3092 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=2920,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=4496 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4720,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=4740 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4992,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=4948 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4940,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5048 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4928,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5212 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=4932,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5236 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --field-trial-handle=5512,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5520 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=728,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5056 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --field-trial-handle=5152,i,13209584756408042142,12498362672448900519,262144 --variations-seed-version=20240507-180133.206000 --mojo-platform-channel-handle=5636 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5612 -
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --system --windows-service --service=update-internal1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x10f965c,0x10f9668,0x10f96742⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:968
-
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --system --windows-service --service=update1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\126.0.6462.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=126.0.6462.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x10f965c,0x10f9668,0x10f96742⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3256 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\125.0.6422.77_chrome_installer.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\125.0.6422.77_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\511eae6b-76ca-4ab2-adc5-dad84d8e9b6d.tmp"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe" --install-archive="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\511eae6b-76ca-4ab2-adc5-dad84d8e9b6d.tmp"3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=125.0.6422.77 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff62a702698,0x7ff62a7026a4,0x7ff62a7026b04⤵
- Executes dropped EXE
PID:5020 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\CR_BAE3C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=125.0.6422.77 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff62a702698,0x7ff62a7026a4,0x7ff62a7026b05⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1776
-
C:\Program Files\Google\Chrome\Application\125.0.6422.77\elevation_service.exe"C:\Program Files\Google\Chrome\Application\125.0.6422.77\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵
- Modifies data under HKEY_USERS
PID:5128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD595222faeeab2cebe9502f2e123d5dd2a
SHA1dac0e46c7b0bc998bee826538a3128fbe396e638
SHA256b8af4588875e697e49db4e1ff5833ef8f89ffde327ab9dc9fad101551d6aec28
SHA512aaec6212bb69d7dbf4b7d09dfa6ccfca803835c19a5974f534f7db2d6235e741bb404969b2695ff9487ee2c7ac2ab1f740a436332b740b45fbaf579c6e13bf4f
-
Filesize
40B
MD53f1dfb8074ef31b5e9864d08b1c72c9f
SHA1551ac02030e2df9548f5e59fe8e2b54974bf0bec
SHA2569d8889114df531402c61add8a1380d16f784e770b7ccb057b0f6e17e4bee108a
SHA5120bb27363d8fddf3742ba3a4ebb029e8e1ff6343cacf3d7c85f2ae1eb805c158ee87d54e6a82264d6314dd442df7d5cb18a86a92eea4d55a9c924489ff198a250
-
Filesize
619B
MD5c24f3f14fa876356fbc40ca86a339444
SHA1b51318c23411417e03e05c62ed5f6a172a0e39ae
SHA2564587ace62d8cb9c8a5b43c33c6f1d98033511d57610c47b336215e5cc4e07fe0
SHA512be6af724ecccb84f0ee5cb976cb2549bb454a9a6637c7ab57479e5d38c29616c3a3ee49d034f706aea12280a86ceaf3f533a9f59e13c37b98f852f1a4ce5701f
-
Filesize
520B
MD5bf9a66253b5fa51f3122b4e1186a6ad0
SHA1158f83964be1eb4e082824ad65c0044bd794ad57
SHA25693eae5d0e79a899222905b5a11ff1feb4129bf7a77f279bdf92e1888086c2268
SHA5120dba755c8f6fa76f7b5a7759bc0a4d207bd8b99c61108b4560f41fb669ef34c726fba9f5607df451d18f51aefff358cd7d80679bd6c6b00336e76892fdcbe67a
-
Filesize
354B
MD50fa4d538d8cfadfd48c3e6c0c43cc38e
SHA1c1ed9ecf5289fd64720221b04e1cbe9c1d1cd53d
SHA2566e360fc67364c1c5db0c0811dbe024dbc132b97e370eb7e7c6f5bb121a154f6b
SHA512373ebc3effd0da9335d211902acd31d511b67fac1a6b76441c0e348f240e0af03ebbece3df11b9182e90cbb5c1a0571a2bd535e95321fe6a34e20dd0c6c1e4b8
-
Filesize
49B
MD52738e30424bb4f0dddb94575f10d5f86
SHA121573096eca9b8b7b3d9d68ad6a996807631b5e1
SHA2565e58028edd1d27fb853a4b05e62bf20cfc4d042123db9ae2e7de01870cb18819
SHA5120dccb0267e80a74402d01b0447d9c63178473830a146b5b9c530132ac52e7c73ae940f65d2879bfa5a39f811b61b70ebca03f85931b15cf63e69fa4f4c12e9f5
-
Filesize
1KB
MD54c629bb4ce6abe81600832c68937c2c9
SHA17a4c16132436816c1b2816c8c28a388198c594fd
SHA256c6f8e781efed07f72347e2e4b4a8a4b6fe5745efb48946569d0ca3181d8b4adf
SHA512bca44a4f9851541b7c5a3bd14fe8d76ffc6bfec4330b805b285e51125313c881497d0543aa3acccfcc0b131b399ca1528ef6d7a0eff34bc13fe19d198cc4c4dc
-
Filesize
2KB
MD5ba645cd0a709eb523297c852b4052ee0
SHA14bd6660a4139c5b51924c370d872318a1618e086
SHA25661f778f5da32d756d686c49958cfde85b90ab57ba7efa88aee2f51c41de36c71
SHA5129c6dc9097619e3dcdb492beee10e3ccdaa4e891beade64de91f51dfb7e6c6c31dc520611bb961ce24a5c1282b61cfc51a73d7e39406fd60daf0dc11be48e8fb0
-
Filesize
4KB
MD589399bd4cbd3f9b58a9beeb396c59ecd
SHA1f6871601f6d74f9a9d1906d16f8be1658ef70027
SHA25606b6d18b73bded4f9faff65f0f199c913282a51bf02de0c9a089042255e91a40
SHA512750fb6501b8e251452470ae1f68207bf6ff9ef019927cfb3ca26d5b332c60a0fb1519c5985885848dc27833b1daa9552094ae6f6a4ea8d334f43a8ae15275916
-
Filesize
5KB
MD5e0c51718a0c04645e9cce5c6407890cf
SHA17380eaf25c4416b5254a1fe9796082da585845e1
SHA256524f16760fa8fda407326f3be5c01593171de971615e4c38f80c94db5b76634b
SHA512188b2ef4a3c4ec2753df13ae6f90cb5705f6c4a135ee896f5291764489c7bdd60fad176a18a8714684369d410ceb4b1008907cdb94ef26b08ef1c34fafeb427e
-
Filesize
13KB
MD5e296f1108a90773638d51c751971b1f7
SHA1f97c0dae606bf3bf225cf3997cabc44b753a94cf
SHA256f9d97ca2f7aa77a191c4b45d44212278970f180ebff2e77c0033a6ac65ac98dc
SHA512f7f46983d5f6167f688e0d8011c8bd59fd2d77d9a68c9e51bf2261dbb983bf2d4db69d55d1f935663f8c03be49412c5286d97aae8cd99cd4b2dbbd9ad51e409e
-
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4756_1045190476\511eae6b-76ca-4ab2-adc5-dad84d8e9b6d.tmp
Filesize627KB
MD5102eed6821c97fb51cf1b237abc5060c
SHA1a3063e9acac951122cd96c931431b2f2d6a8ad7f
SHA2560eacb5fe5c6e8eeaf83b2d5f5783bab07d45840731bffb264bda61219ef3c485
SHA512369b63fdce535986a51d067097b65b2f4f1a21b55a82726f6a9b910953639197c8f628cd1e69842b7d5d3977dcaf2bea7811378897423aa379a4918657086192
-
Filesize
4.0MB
MD54720049060b8fa6feec3eee617e55ca6
SHA118607aad1d274c6964df7bdb51d5c62584b1aeb3
SHA2568b2293f54eb6371a2b7f379f32662b9b4f36a66563ea2f24dc4b9747d5f22fc3
SHA512ee17dacafefef6344717ec1de2438e6e7540569edf862b3c8dbae5234cba067582b101a1caf687cecf09cbcb787bfc7c5c8fb373ff9b6807aa03999a58645d1f
-
Filesize
40B
MD59c2687c101790810652bf7dd2ff39831
SHA1b7f24c5a7f99ef0e1660857a28ff459a03be88c1
SHA2566e38a307473723b94ef03937b28d2cca026d3ffcd8573960d9fdd437432d5a65
SHA5125e5840d3ec5f695ed96b5e46f5122641eed55842cd0a9bbe4883d1aac9a3f1a611b156b7716bcb620a1bea2d5197e641c258c203ecaae03ba7a04e43ec339b7b
-
Filesize
1.2MB
MD547a446a8ea73680bf64fc1064d9da881
SHA10557329fe0bd1dcc0166d56673f5ae6230e64256
SHA256b512f42db36ae99dbe8f96d06c90e92a93db8f4cae25e56cb6d68e7281540cb4
SHA51269b7a2f7704bd44dd1c54a1874aa91b95d25d0cd81189f814f70007358a1d03c71b028f77a2572c745a6e430cb697dc813f14f9b586ea5a82befb17b274b9ea7
-
Filesize
4.7MB
MD5a7b7470c347f84365ffe1b2072b4f95c
SHA157a96f6fb326ba65b7f7016242132b3f9464c7a3
SHA256af7b99be1b8770c0e4d18e43b04e81d11bdeb667fa6b07ade7a88f4c5676bf9a
SHA51283391a219631f750499fd9642d59ec80fb377c378997b302d10762e83325551bb97c1086b181fff0521b1ca933e518eab71a44a3578a23691f215ebb1dce463d
-
Filesize
471KB
MD5fc344924ddd5ca27a12256f54fe777bc
SHA11a5b34fd7cbc424de6c44088252fdd56e2b8b149
SHA25681e4012e7632c6f8ad5a24595aa822f9d4643e778c272d3edd326dbf9e40e67a
SHA512739e25ed70b3dc0cbfaeda84a91ad88226d1736cd4ce31971dc69d621b8d3880095a7c96baa452ca9a049e0a394c9199e42cda64a64831519e951d5db2c23284
-
Filesize
7.7MB
MD501e5a2bd68f22542141a79cf9244ebf5
SHA1371934c7a640d700c7e4bf68caff7244c69721f7
SHA25699266404048cd820a8977d248d11a87f35339e617b41a980f5e8dc52b55a6bf7
SHA5120b9c65b527eb2be07b74a335099796a9efef5947451f68843ef76eeb524f712f26907de87e1f89ce473b851e09cee6a793f0522eac4ef976a82918fdab43fa3a
-
Filesize
2.7MB
MD55d35aab56213ce854ae5c726234327fd
SHA13bf1be4e1febb647c36c9eb42a76a4a73909d5f4
SHA256240acb488ef8971c9f79c9d34c86456ce9dad0c269d04ea707fd83c8d5683a5a
SHA5123183f1ae492fd7647cad23fb64e9e4cafbea1d99dfff4e6e4a823c994ec3212825cbbe44efe634b0ab12d983c7d8403e81e4df5d806c0cc9235f5065806dce3a
-
Filesize
22KB
MD5d580c11f9c66e6102e5d479d1da0048a
SHA12e78a16da0da507a80521a162ae35cee40bee840
SHA256cd6dc1dc219bd5f330d422a6c09cf17633e1fc53670df79afb062d88a4d5eb80
SHA512b1ac292c87c03ac5cb3bebaaf0cdb76a546262a027c8f6e1182feedc2b56fb7bee3d38714f48ebd8572658352f870b005454c573041af3e7c4e8cdf705820f9e
-
Filesize
95B
MD5ef7b61bd3574418643e09dc8ad52470d
SHA136bea8885a8c159401acede8cc671c320acb089e
SHA25603911d66198d97b10dd78bccf8afc0a76d2690b8c008a06b689589903891cc89
SHA51224fbb90b09269f27b5a68a18a6041ecbe00679e46b29ed2f0a3008489aaa63235ed18f27dc76704057f3be9baf99622d4b2450f2f2ff7f8e2978040ee38c1fcd
-
Filesize
114B
MD54c30f6704085b87b66dce75a22809259
SHA18953ee0f49416c23caa82cdd0acdacc750d1d713
SHA2560152e17e94788e5c3ff124f2906d1d95dc6f8b894cc27ec114b0e73bf6da54f9
SHA51251e2101bcad1cb1820c98b93a0fb860e4c46172ca2f4e6627520eb066692b3957c0d979894e6e0190877b8ae3c97cb041782bf5d8d0bb0bf2814d8c9bb7c37f3
-
Filesize
2KB
MD5b7e2fb0e46afefdad620b014c1d5ba38
SHA166853ea85fb88c72c152dc6e9761a1ed3a1a5742
SHA256157e3b5c1a38e3b60a1c736e5fdf8a0a4e8f0eb8549573bc4a3a326d9bd18f49
SHA5123592f11a05046f31e555c6165e8bf66a65d15601bcbe40e7ba9e43cba153d13c59dec0e4811a799e234e99eae6886fac746678d0cec9d0ad73ff8feb1f0a5906
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
3KB
MD580fce76fc09fcc4b5496e046fa991bad
SHA1d8d4fe5999caaf87df4348d0d54ca51f204e3080
SHA2562d48b4ab67c0b74c56c6f72ce4b0834d0d1c37f261c51f314aea886038fde97f
SHA512660661f6951300c72b80430c11a622a2fc6ce27ec3f5203726a89a54d6e37bb765967518d2f3c8ba408b18e478e000270fb9ea82086bcad9233f39d18e62057f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d757d4c06f830ebc188988755500b848
SHA1ca673ed502c1f9c87e73b41bbc28e83e9c918d57
SHA2569f253c002130ae4c975a720498195dc24593ca62b01c78fe1c063c7e7eafb124
SHA512bc2e4b42e90f1aea2a6db8fa9f67f082a4c2a0440f62f0f279e4d31bc58b878b52210b2d8212cc54a691d92129a6989ae19601c5b273c9028ebfe19bb32bbd2f
-
Filesize
9KB
MD511c49adab886b641c41e727c29989dc3
SHA1707a1e22e182f14127e42507e8709b05bc48d7c7
SHA256275187d6692140b5198a27ed5e9232659eae976254981510ee05f10181cf68ef
SHA51275ffb6a041677e724c6bacc0205b06bdebb8bb228e94c5e9ec538811312aa3d90698b5b39958747d781511b710ce4423aaafb5cdda7d4a0917688005c3e58f97
-
Filesize
15KB
MD5faecc1e5103d575166a827c3a8ed7869
SHA1a81048a258bc5c70c2f14afea125b484ebfaecc7
SHA256642f54a9af58f67730b3bf518af88501fa74d5ea04e63b7f0057c61242ba8e06
SHA51223ded595f308b2988370971e68e91bb324953d5cab075ea44b979cccf163aa0ebc339bc0048a801af094a6eda7b273a5970ee2138e124f384080e8f983c3f0f9
-
Filesize
38B
MD53433ccf3e03fc35b634cd0627833b0ad
SHA1789a43382e88905d6eb739ada3a8ba8c479ede02
SHA256f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d
SHA51221a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c
-
Filesize
130KB
MD5c78aaa45fdec3b9a59cf63f925975b5c
SHA1958ce7f2153704662cbbb72f209fc4f5f0cf6fe3
SHA25604dc657b3ea8e57c0cff84236c944009ad959453cd788f2784c6536b4ea7e445
SHA51211c9ece27f467aa545feb63128c95d3cd41f8855734211f0d8928942e55112b88b8d7b9bedbccbf213d1bd9fd11896d6854d84646fd858dc66a6934933c31e09
-
Filesize
129KB
MD5108dba19ab5d2a67934e42d297e9f0e8
SHA1be1bd19d519500585bfc3883716e251e701c5c14
SHA2565aa43233a854f1de9fbece84a277098391ded77d7b4994bdad390e9e60b27a31
SHA512a61c0ddf5a5e9a7929049f48782e1b2b108ceca085ac0253f72a32e18ecf5977ffcf20eff0b0ee231ee0f81f7a5c856ae79fe5cba5a0432b508c4b6c97d4a09a
-
Filesize
203KB
MD55a028c2cf794bae9cce4f006103d77f0
SHA1aa04b8bf84e94d4a87509e48cdf00469c407e420
SHA256e97813dc8763ca7c2c139f195d9d6ff4578eb81f08da9e9f9dded7d0128ee21c
SHA5129ad1dc0437b8d04f9bbe244a04d92a95141713ec574a40fd35df9e83b65b842d61c79ae8715d92198218abcc7a1e6e4215db86c692ff7696316710c5ce960a0a
-
Filesize
203KB
MD52579d5208a460180f7ce3a0756b8da04
SHA16d345dd05e4cc3585161a4375cc39f13f85c79e1
SHA25698dfce5a3b4db5cbc79c7b41c9c2b0750a36dda1b1fceef6d95d8b66ad60b8b0
SHA51248dce35156a09ad9074a80d922cbd2122510b8e515dd468cc1a1e71decf43fee12728470cdcc91c2d797ecfde69819fd4512f2bf0a157e8bb08142a0665c5fc6
-
Filesize
206KB
MD59d9620539e17dc658921dd5c4ae62cd7
SHA18e55703bfdcce66cb6d4e9e8b690ee5e4725f466
SHA256777ea7aa800d17d31671595d0104195476cf5356d7243e76e780e054e6f63cab
SHA51295379cf767f7cb007dd5255a986524a06b936a8612257ba3e1e94c0cce9c2f3af22ecd2e198cc47123e0bfe762473068a9d796e028448b87544bc1d3105c4ab4
-
Filesize
206KB
MD54f9685a70f83651f478b8f439784e4fd
SHA1946eed1429a6022129ca669d961fca0e28df60a8
SHA2561ee5077e8cb968d1699c3719e2ac1f2943dbc458cc25f7f7c80338e9031f6992
SHA512561d9a6f63add8399f7e7c10fd80713ec523e983955d0eb8ea9614b676f3b68f1a48af06d7e71914b81deb658f0016796055a8e56aa476c9fc8ac29eef92dc78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules\9.49.1\Filtering Rules
Filesize68KB
MD56274a7426421914c19502cbe0fe28ca0
SHA1e4d1c702ca1b5497a3abcdd9495a5d0758f19ffc
SHA256ae2fd01d2908591e0f39343a5b4a78baa8e7d6cac9d78ba79c502fe0a15ce3ee
SHA512bf1287f502013308cdd906f6e42998c422ef1e272b348e66122dc4a4e471d01333b418f48d1bb2198c72845bdc950612597e179e612aaa1ba6cf8d48fb8f0cf5
-
Filesize
8.3MB
MD596c68607df3fca21a1c3e8686c5eb9c5
SHA1902cc5c653810df5f4a484e1b4b8ea7e9b45d763
SHA256b72bba5e11d761104bb218359180739f443881bcea06e55f860556e60705399e
SHA5124fd7fbef26edcea97c380f31169986521f677f81c92ae6e2a3fd304a9c3fc2b325d9e203bdf793ecec9c5a1ed96a4b59dbc847b948a7774250651b93f90ae321
-
Filesize
135KB
MD54d8b41532f724399cbad05db215f5d3a
SHA11c2d10cb047f123b21bd11e7259dbd0d99370708
SHA25687f289b0dc81884e72950d9eb8ea729f44389b2d5d7d6f7c810d61a64098204c
SHA512c80e4861d58f572363c9bfbac1044e439917439a907bd80958e88485a94e81046c751a5ae2c9d8aeeb664d263c943c42d542602cd26326339fe68e241d63db5d
-
Filesize
135KB
MD53dd7d6e6924a1366499ef9beac31d856
SHA13f2a2f32bb138c2a400a882aa62f6a60c97f809b
SHA256c6d289a8dbb0ffdd4c3ffc034e8010d9e2b50d866fc2d436465606cbc7020d13
SHA5126eb04513bb790625840f159829bd57c7eb460c12876b7feafcc12c8f4152433102473390402045a6046ee1a30e37f5c624084bce6f2377aa0c22042829dbc177
-
Filesize
22KB
MD5b790843924dc508262b1520dac40742b
SHA15be44a2f42f69bd7ccfc248b1075b2f754d0a75d
SHA256894f5821e3b85edbf1cc61766d6c3252088b30646d8feda8d180a387b558558e
SHA5128a9b0d40d0b22e670901f65758a992367463af2a7482622367692a50a7611ee9d516db5aaaf164f9866112c3ec117cb86c9e7e568bb6b9ef1fef00dd54d6d79f
-
Filesize
135KB
MD543e5588ec9c1ece61394bc361dd6b0a2
SHA1111e26f1c6e3dcded61f009147c3aab747d49dca
SHA256b0129f599a3595dd2fe4f4bbc3ee6ff036e19e6536b6c739c46bd12366b526e8
SHA5125c3a65acd2a4fa1ff020f05af172b22d9ddeef6f7aed12d9dba7aa3aaf04d468535767a5c5e5c867fd3c45131f0a18c4c123e479d4f9e6db7cc103389d023f7b
-
Filesize
135KB
MD5d996f86689bc374d1aec182980f5af09
SHA19ad0598272f806a765810f468858d5423e08b29c
SHA2564acb3ff0afcc93a76872f5d9616f04dec2fcddec78250f52fbd4dc59ba9993c1
SHA51246fc8c85e3ce759b8d3514f99f7f92131dc4000408cc52cc9130998ef0f0aaa96ed72f235e48c079fe3d6b0bd1fbfb1aa9ae5bc09e34a1a623c1a9535ef8c766
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e