Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe
-
Size
812KB
-
MD5
e5e4054e4f4268a21dd172ab7837e450
-
SHA1
f63e44b9fae0161717527b47161e597fb53f1f00
-
SHA256
497c868ed60ac4983b1e3e7c1a92bbf270b6a481315acda06bfed002fa6ac1d4
-
SHA512
19a26554df704120096ecbfd47098fd13439ed283f224f9fc12807a06ca258289c66f9cbd975f047ff8b32b403dc2e077ef9c86e5a3c4e4237f4127b5e810da0
-
SSDEEP
12288:wBbMjdsHaoe/f8zVa6YbXDx1Ec2O5IciBGqxWMsBG7:wNMjOaoe/UzI6YbXLP2O5IcitkXU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2400 WScript.exe -
Executes dropped EXE 64 IoCs
pid Process 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 896 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2368 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1136 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2448 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1620 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1060 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 632 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 592 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2148 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1196 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1460 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 776 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1012 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 800 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2068 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1956 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2044 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1364 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1020 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 872 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2832 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2996 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1612 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2036 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2964 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 964 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2696 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2700 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2608 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2720 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 528 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1648 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1412 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2208 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2232 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 876 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1472 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2076 WScript.exe 2712 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2444 WScript.exe 2392 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1800 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Loads dropped DLL 64 IoCs
pid Process 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 896 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 896 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2368 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2368 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1136 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1136 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2448 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2448 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1620 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1620 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1060 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1060 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 632 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 632 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 592 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 592 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2148 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2148 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1196 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1196 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1460 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1460 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 776 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 776 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf WScript.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf WScript.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf WScript.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf WScript.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf WScript.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf WScript.exe File created C:\autorun.inf WScript.exe File opened for modification C:\autorun.inf WScript.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\autorun.inf WScript.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\autorun.inf NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe WScript.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs WScript.exe File opened for modification C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File opened for modification C:\Windows\SysWOW64\xiaoxin.vbs NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe File created C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Windows\\SysWOW64\\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe" NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1012 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 1612 WScript.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 896 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 896 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2160 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2368 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2368 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1136 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1136 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2448 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2448 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1672 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1620 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1620 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1060 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1060 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 632 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 632 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2440 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 592 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 592 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2148 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 2148 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1196 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1196 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1460 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 1460 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 776 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 776 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2768 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 29 PID 2688 wrote to memory of 2768 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 29 PID 2688 wrote to memory of 2768 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 29 PID 2688 wrote to memory of 2768 2688 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 29 PID 2768 wrote to memory of 2728 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 30 PID 2768 wrote to memory of 2728 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 30 PID 2768 wrote to memory of 2728 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 30 PID 2768 wrote to memory of 2728 2768 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 30 PID 2728 wrote to memory of 2724 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 31 PID 2728 wrote to memory of 2724 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 31 PID 2728 wrote to memory of 2724 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 31 PID 2728 wrote to memory of 2724 2728 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 31 PID 2724 wrote to memory of 2532 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 32 PID 2724 wrote to memory of 2532 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 32 PID 2724 wrote to memory of 2532 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 32 PID 2724 wrote to memory of 2532 2724 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 32 PID 2532 wrote to memory of 2584 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 33 PID 2532 wrote to memory of 2584 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 33 PID 2532 wrote to memory of 2584 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 33 PID 2532 wrote to memory of 2584 2532 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 33 PID 2584 wrote to memory of 2272 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 34 PID 2584 wrote to memory of 2272 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 34 PID 2584 wrote to memory of 2272 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 34 PID 2584 wrote to memory of 2272 2584 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 34 PID 2272 wrote to memory of 2580 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 35 PID 2272 wrote to memory of 2580 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 35 PID 2272 wrote to memory of 2580 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 35 PID 2272 wrote to memory of 2580 2272 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 35 PID 2580 wrote to memory of 2516 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 36 PID 2580 wrote to memory of 2516 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 36 PID 2580 wrote to memory of 2516 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 36 PID 2580 wrote to memory of 2516 2580 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 36 PID 2516 wrote to memory of 1084 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 37 PID 2516 wrote to memory of 1084 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 37 PID 2516 wrote to memory of 1084 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 37 PID 2516 wrote to memory of 1084 2516 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 37 PID 1084 wrote to memory of 268 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 38 PID 1084 wrote to memory of 268 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 38 PID 1084 wrote to memory of 268 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 38 PID 1084 wrote to memory of 268 1084 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 38 PID 268 wrote to memory of 1692 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 39 PID 268 wrote to memory of 1692 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 39 PID 268 wrote to memory of 1692 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 39 PID 268 wrote to memory of 1692 268 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 39 PID 1692 wrote to memory of 2596 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 40 PID 1692 wrote to memory of 2596 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 40 PID 1692 wrote to memory of 2596 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 40 PID 1692 wrote to memory of 2596 1692 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 40 PID 2596 wrote to memory of 2820 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 41 PID 2596 wrote to memory of 2820 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 41 PID 2596 wrote to memory of 2820 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 41 PID 2596 wrote to memory of 2820 2596 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 41 PID 2820 wrote to memory of 2816 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 42 PID 2820 wrote to memory of 2816 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 42 PID 2820 wrote to memory of 2816 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 42 PID 2820 wrote to memory of 2816 2820 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 42 PID 2816 wrote to memory of 2860 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 43 PID 2816 wrote to memory of 2860 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 43 PID 2816 wrote to memory of 2860 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 43 PID 2816 wrote to memory of 2860 2816 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 43 PID 2860 wrote to memory of 1272 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 44 PID 2860 wrote to memory of 1272 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 44 PID 2860 wrote to memory of 1272 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 44 PID 2860 wrote to memory of 1272 2860 NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"19⤵PID:3488
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"18⤵PID:3592
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"17⤵PID:3296
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"16⤵PID:2332
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"15⤵PID:3304
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"14⤵PID:3616
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"13⤵PID:3344
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"12⤵PID:3608
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"11⤵PID:3336
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"10⤵PID:3600
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"9⤵PID:3328
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"8⤵PID:3664
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"7⤵PID:2024
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"6⤵PID:1532
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"5⤵PID:3352
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"4⤵PID:3624
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\xiaoxin.vbs"3⤵PID:1928
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xiaoxin.vbs"2⤵
- Deletes itself
PID:2400
-
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops autorun.inf file
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1196 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe15⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
PID:1012 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe17⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe18⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe19⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe20⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe21⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:872 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe23⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe24⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
PID:2996 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe25⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe27⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe28⤵
- Executes dropped EXE
- Modifies system executable filetype association
PID:964 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2696 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe30⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2608 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe32⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:528 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe34⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe35⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe36⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe37⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe38⤵
- Executes dropped EXE
- Modifies system executable filetype association
PID:1412 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe39⤵
- Executes dropped EXE
- Drops autorun.inf file
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2232 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe41⤵PID:876
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe42⤵
- Executes dropped EXE
- Modifies system executable filetype association
PID:1472 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe43⤵PID:2076
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe44⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe45⤵PID:2444
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe46⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
PID:2392 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe47⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe48⤵PID:2512
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe49⤵
- Modifies system executable filetype association
- Drops autorun.inf file
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe50⤵
- Modifies system executable filetype association
- Drops autorun.inf file
PID:1624 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe51⤵PID:1560
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe52⤵
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe53⤵PID:1948
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe54⤵PID:3068
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe55⤵PID:2052
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe56⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe57⤵
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe58⤵PID:1964
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe59⤵
- Drops autorun.inf file
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe60⤵PID:2536
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe61⤵
- Drops autorun.inf file
PID:3044 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe62⤵
- Drops autorun.inf file
PID:2520 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe63⤵
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
PID:1392 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe64⤵
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe65⤵PID:1736
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe66⤵PID:1516
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe67⤵
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe68⤵PID:2348
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe69⤵
- Drops autorun.inf file
PID:1748 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe70⤵
- Modifies system executable filetype association
PID:2688 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe71⤵
- Drops autorun.inf file
- Modifies registry class
PID:276 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe72⤵
- Modifies system executable filetype association
- Drops autorun.inf file
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe73⤵
- Drops file in System32 directory
PID:3860 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:4140 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe75⤵
- Modifies system executable filetype association
PID:4212 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe76⤵PID:4232
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe77⤵PID:4252
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe78⤵
- Modifies registry class
PID:5400 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe79⤵
- Modifies system executable filetype association
- Drops autorun.inf file
PID:5468 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe80⤵PID:5476
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe81⤵PID:5484
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe82⤵PID:5492
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe83⤵
- Modifies system executable filetype association
PID:5500 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe84⤵
- Drops autorun.inf file
PID:5508 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe85⤵
- Modifies system executable filetype association
- Drops file in System32 directory
PID:5516 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe86⤵PID:5524
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe87⤵
- Drops autorun.inf file
PID:5532 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe88⤵
- Modifies system executable filetype association
- Drops autorun.inf file
PID:5540 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe89⤵
- Modifies system executable filetype association
- Drops autorun.inf file
PID:5548 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe90⤵
- Drops file in System32 directory
PID:5556 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe91⤵PID:5564
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe92⤵
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe93⤵PID:5620
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe94⤵
- Drops file in System32 directory
- Modifies registry class
PID:5652 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe95⤵
- Drops autorun.inf file
- Drops file in System32 directory
PID:5716 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe96⤵
- Modifies system executable filetype association
- Drops file in System32 directory
PID:5756 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe97⤵
- Drops autorun.inf file
PID:5780 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe98⤵
- Modifies registry class
PID:5832 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe99⤵
- Drops file in System32 directory
PID:5864 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe100⤵
- Modifies system executable filetype association
PID:5904 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe101⤵
- Drops file in System32 directory
PID:5936 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe102⤵
- Modifies system executable filetype association
- Drops file in System32 directory
PID:5968 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe103⤵
- Drops autorun.inf file
PID:6008 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe104⤵
- Modifies system executable filetype association
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:6064 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe106⤵PID:6072
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe107⤵
- Drops autorun.inf file
- Drops file in System32 directory
PID:6124 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe108⤵PID:1948
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe109⤵PID:1764
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe110⤵PID:624
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe111⤵PID:1716
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe112⤵
- Drops autorun.inf file
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe113⤵PID:2980
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe114⤵
- Drops autorun.inf file
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe115⤵PID:3260
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe116⤵
- Drops file in System32 directory
PID:3108 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe117⤵
- Modifies system executable filetype association
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe118⤵
- Modifies system executable filetype association
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe119⤵PID:1040
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe120⤵PID:1668
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe121⤵PID:632
-
C:\Windows\SysWOW64\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exeC:\Windows\system32\NEAS.e5e4054e4f4268a21dd172ab7837e450_JC.exe122⤵
- Modifies system executable filetype association
- Drops autorun.inf file
- Drops file in System32 directory
PID:2284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-