Analysis Overview
SHA256
88cd1d88dcaa57d9679b7a55eca807b8630f6a31d1128e3ff1efccab5c16bb5c
Threat Level: Known bad
The file c95e67da84009169ba495d2dc2e240c0N.exe was found to be: Known bad.
Malicious Activity Summary
Neconyd
Checks computer location settings
UPX packed file
Loads dropped DLL
Executes dropped EXE
Reads user/profile data of web browsers
Adds Run key to start application
Drops file in System32 directory
System Location Discovery: System Language Discovery
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-19 06:14
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-19 06:14
Reported
2024-08-19 06:16
Platform
win7-20240708-en
Max time kernel
116s
Max time network
120s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
Files
C:\Users\Public\Microsoft Build\Isass.exe
| MD5 | 9ee3aea20fa8de7b19353aef20d64baf |
| SHA1 | 17926e9fd3e1f03574c94f94cdccd2845fb952a2 |
| SHA256 | c6deded1772c32340199c3affea29a61834c3bedf5ab7c5da19aa9ce42dae858 |
| SHA512 | 4a1d96700f744752862370144b2f74123cef3ffe489a200354c7cd31e52052dcf53b2bea9aad067192fec5f9c610e023f69976768e9cd08b5b53dc5d5fbab767 |
memory/2884-9-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2884-13-0x0000000004420000-0x00000000056C9000-memory.dmp
memory/3024-16-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2764-17-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-15-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2884-12-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2624-19-0x0000000000400000-0x00000000016A8E52-memory.dmp
\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
| MD5 | 50fe69e9c49802d005038522f81e9b06 |
| SHA1 | 276d8f126ebe06549320d7e324f9e105222d209c |
| SHA256 | 72f771647913744c8d3fa98f345b883cfe62ac773363e56d4d08f66fbf0a00db |
| SHA512 | 17f6065960e7e54ef24ed2f4f82cd0f92d65aba0aaaac409dbba5b5a9802d7f604a8d4a40e24e1481cbcc5338ccb26b7fea171f2892e4cd1a02fd5b44bb1a7b2 |
memory/2848-30-0x0000000000400000-0x00000000016A8E52-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 67b56a5fecd2e6a6598c5d36ba8a40d5 |
| SHA1 | dd868ba6efb13ff044dee1b5f78d6966d63f7422 |
| SHA256 | c95a8282e4d1c03e38b530ee82a7d761f7091e2edc91c77fc943e955e442610e |
| SHA512 | 6df322eccbe17d29388215a7ca49edc1047c97ffe006b1e5f47b05554070bb9e01dff131bdd13e16059d7eb55d6c18628f9639b5faf63c08ce23571b317658ba |
memory/2680-39-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-42-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-43-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2208-44-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-47-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-49-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-57-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2208-58-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-59-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-68-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-70-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2208-71-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-79-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2208-80-0x0000000000400000-0x000000000042D000-memory.dmp
\Windows\SysWOW64\omsecor.exe
| MD5 | 4b9e192636dd436efca0120ae52f2c7c |
| SHA1 | dd72e6198ebf277b3312f48801a5d2d97352cf05 |
| SHA256 | 7c672d77c3df37262af99d46664c784335bb0b8ebe891cef7480db74579fcf29 |
| SHA512 | f8a4607cb94b81444c88f44cb32eac960fe96a85b07aec1becfda605a71199fcd7c1d9a755b2f859a95d037ff4b77417a0ba537940a953dbac1642d8928bd125 |
memory/2208-88-0x0000000000400000-0x000000000042D000-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 1989bf5facd9f1cb972e61a4b555c8fd |
| SHA1 | 2b726d9ab41a6d45adf13c27da4c108345d260ce |
| SHA256 | 15b052d40d235334a0e871eede8936d0ab2f7598e894e764a73bc34dd3971079 |
| SHA512 | 58425e731a506e7e8af39e81111d76b7bf260ea05c996a0f4be43e137f71e777a53cf2bfdcdffbc5a608bf6e8754bc54a2c03adadbb91536ccc429f2afd93775 |
memory/2176-98-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-101-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/284-102-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3024-110-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3024-112-0x0000000000400000-0x00000000016A8E52-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-19 06:14
Reported
2024-08-19 06:16
Platform
win10v2004-20240802-en
Max time kernel
120s
Max time network
106s
Command Line
Signatures
Neconyd
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Public\Microsoft Build\Isass.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Public\Microsoft Build\Isass.exe
"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 8.8.8.8:53 | 240.143.123.92.in-addr.arpa | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 64.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | 73.91.225.64.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| US | 8.8.8.8:53 | 229.198.34.52.in-addr.arpa | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
Files
memory/4984-1-0x0000000000400000-0x00000000016A8E52-memory.dmp
C:\Users\Public\Microsoft Build\Isass.exe
| MD5 | 9ee3aea20fa8de7b19353aef20d64baf |
| SHA1 | 17926e9fd3e1f03574c94f94cdccd2845fb952a2 |
| SHA256 | c6deded1772c32340199c3affea29a61834c3bedf5ab7c5da19aa9ce42dae858 |
| SHA512 | 4a1d96700f744752862370144b2f74123cef3ffe489a200354c7cd31e52052dcf53b2bea9aad067192fec5f9c610e023f69976768e9cd08b5b53dc5d5fbab767 |
memory/3716-5-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-7-0x0000000001C60000-0x0000000001C61000-memory.dmp
memory/4984-6-0x0000000001AA0000-0x0000000001AA1000-memory.dmp
memory/4984-9-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2396-10-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2396-11-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2640-12-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2640-14-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2468-15-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2468-17-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/2164-19-0x0000000000400000-0x00000000016A8E52-memory.dmp
C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
| MD5 | 50fe69e9c49802d005038522f81e9b06 |
| SHA1 | 276d8f126ebe06549320d7e324f9e105222d209c |
| SHA256 | 72f771647913744c8d3fa98f345b883cfe62ac773363e56d4d08f66fbf0a00db |
| SHA512 | 17f6065960e7e54ef24ed2f4f82cd0f92d65aba0aaaac409dbba5b5a9802d7f604a8d4a40e24e1481cbcc5338ccb26b7fea171f2892e4cd1a02fd5b44bb1a7b2 |
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 67b56a5fecd2e6a6598c5d36ba8a40d5 |
| SHA1 | dd868ba6efb13ff044dee1b5f78d6966d63f7422 |
| SHA256 | c95a8282e4d1c03e38b530ee82a7d761f7091e2edc91c77fc943e955e442610e |
| SHA512 | 6df322eccbe17d29388215a7ca49edc1047c97ffe006b1e5f47b05554070bb9e01dff131bdd13e16059d7eb55d6c18628f9639b5faf63c08ce23571b317658ba |
memory/2672-33-0x0000000000400000-0x000000000042D000-memory.dmp
memory/1808-27-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-34-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-35-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/4468-36-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3716-39-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-41-0x0000000000400000-0x00000000016A8E52-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
| MD5 | e9bd2d1d0c612ef4375fdec99b526282 |
| SHA1 | a2d836daf8fe264a0e5e07d2fa4f350a025b751d |
| SHA256 | 4154b4494a5542dee7924a9ddacee0fcb3aaf2532d2c675c14e494993e06493b |
| SHA512 | 628504edade4b608d36eded95381c02ce7c81203b0adc67e9788c5b5c9b54c4a735e0efad4c399c6ab54ea446c33dfbe44441eac9b5f3a370be6a7aab3146d32 |
memory/3716-46-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/4468-47-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3716-48-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-57-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-59-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/4468-60-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3716-66-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/4468-67-0x0000000000400000-0x000000000042D000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | 933a5e25533ef7178f519bde6a836ac5 |
| SHA1 | 80302ecb5940a14030c57760a44baf3271dd143a |
| SHA256 | 876744e5adbe38d9dc8e20239166912add97f6c4ffbf4d8f003df1fc46cc9513 |
| SHA512 | c19e745e36750d8c351d1e666ab80e2f75731d0c264d051b481581a8c25f56747955f1787f506707ba1be0dc5ed196a6cd7c4f16aaf9588ddffa4acd0d8f9439 |
memory/4468-71-0x0000000000400000-0x000000000042D000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | eb3067223b4757bf1b5625b42bae143f |
| SHA1 | 8af5f650e7e3cd05fa02b4ab48d48fd3bde187d7 |
| SHA256 | 16f8f0613d5e0189bc968c4f04c8da809d6ed4b6f38da07a7fb7c9655280288c |
| SHA512 | ed2c615adad78f09ed2e8a5125c5072de3433e47e697ab7c51d3d28e78fcaac7f4459d48cd1f7459c71adeffdeb53b901c7558e848836d6bb0e91e729e51fef7 |
memory/3808-76-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3716-78-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/4944-86-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3716-85-0x0000000000400000-0x00000000016A8E52-memory.dmp
memory/3716-87-0x0000000000400000-0x00000000016A8E52-memory.dmp