Malware Analysis Report

2025-08-10 19:49

Sample ID 250702-xjhpcazvgs
Target 2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop
SHA256 8c38c395be0daf5c90ffd44263af56a2d5fa0d109dd03fbca087ad6f976c1f3f
Tags
neconyd discovery trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8c38c395be0daf5c90ffd44263af56a2d5fa0d109dd03fbca087ad6f976c1f3f

Threat Level: Known bad

The file 2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop was found to be: Known bad.

Malicious Activity Summary

neconyd discovery trojan

Neconyd family

Neconyd

Executes dropped EXE

Drops file in System32 directory

Suspicious use of SetThreadContext

Program crash

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-07-02 18:52

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-07-02 18:52

Reported

2025-07-02 18:55

Platform

win10v2004-20250619-en

Max time kernel

146s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"

Signatures

Neconyd

trojan neconyd

Neconyd family

neconyd

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 692 wrote to memory of 5432 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 692 wrote to memory of 5432 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 692 wrote to memory of 5432 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 692 wrote to memory of 5432 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 692 wrote to memory of 5432 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 5432 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5432 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5432 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2632 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2632 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2632 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2632 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2632 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2020 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2020 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2020 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2320 wrote to memory of 3340 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2320 wrote to memory of 3340 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2320 wrote to memory of 3340 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2320 wrote to memory of 3340 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2320 wrote to memory of 3340 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3340 wrote to memory of 5472 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3340 wrote to memory of 5472 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3340 wrote to memory of 5472 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5472 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5472 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5472 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5472 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5472 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 692 -ip 692

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2632 -ip 2632

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 288

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 296

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2320 -ip 2320

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 300

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5472 -ip 5472

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5472 -s 260

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 mkkuei4kdsz.com udp
GB 142.250.179.227:80 c.pki.goog tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 52.27.79.221:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp

Files

memory/692-0-0x0000000000400000-0x0000000000424000-memory.dmp

memory/5432-1-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5432-2-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5432-3-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5432-5-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2632-9-0x0000000000400000-0x0000000000424000-memory.dmp

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 594332f25218c9cb36a5186a39612da5
SHA1 a80a3fc1f2fe0750d43697a061a4eacc626e01eb
SHA256 524dbafcdccf5c36ae9efff0c4714309875c372bf590466e6dffdd3379b46020
SHA512 e1c809c1fc4c70e6d4dab831162e840293e1618f8bcb35e1d3695b53dec35fb7191c54e1cd2186302121009cfe38b40092472c7e32c0432d60b47173e42b9e85

memory/2020-14-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2020-15-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2632-17-0x0000000000400000-0x0000000000424000-memory.dmp

memory/692-16-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2020-18-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2020-21-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2020-24-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2020-25-0x0000000000400000-0x0000000000429000-memory.dmp

C:\Windows\SysWOW64\omsecor.exe

MD5 3e38ddac45ebfa9faa6c069ca99170b6
SHA1 36093179f7a490e0300d5f36ed3541cf905b3eda
SHA256 fe80f07891d5ad1229ea7cb1e873529c9c97bfe733809aeaecbc67987fbc396f
SHA512 14d120211e99b2d71dcf7f8279593fc81c90816b5124779c13f0f6ab1660f362131e4cc6c58762ce577d7b83e88e6820dc62891fcf586ef4c340bd882232e67f

memory/2320-32-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2020-31-0x0000000000400000-0x0000000000429000-memory.dmp

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 93f948448d75fe7a4a4a4e883e937be6
SHA1 b8fa1a12459296bf611d5039b1b369f1b87d4713
SHA256 145c6d0b7a309f13ed2073c00570f9234da70fc09cbd5037f8b4db193c75ff99
SHA512 b5556b5661fc2574a33e71b9d163bdf774a281512316e437ecd1cfae0ab421fbcf32847bdd74b80c7806db96701681f0addc3ea7596c8b21b0b5c6bbe34423b9

memory/3340-40-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5472-45-0x0000000000400000-0x0000000000424000-memory.dmp

memory/3340-38-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3340-37-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4508-50-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4508-49-0x0000000000400000-0x0000000000429000-memory.dmp

memory/2320-51-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4508-52-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4508-55-0x0000000000400000-0x0000000000429000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-07-02 18:52

Reported

2025-07-02 18:55

Platform

win11-20250610-en

Max time kernel

144s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"

Signatures

Neconyd

trojan neconyd

Neconyd family

neconyd

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1776 wrote to memory of 5700 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 1776 wrote to memory of 5700 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 1776 wrote to memory of 5700 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 1776 wrote to memory of 5700 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 1776 wrote to memory of 5700 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
PID 5700 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5700 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5700 wrote to memory of 4144 N/A C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4144 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4144 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4144 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4144 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4144 wrote to memory of 3452 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3452 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3452 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3452 wrote to memory of 4924 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4924 wrote to memory of 4984 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4924 wrote to memory of 4984 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4924 wrote to memory of 4984 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4924 wrote to memory of 4984 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4924 wrote to memory of 4984 N/A C:\Windows\SysWOW64\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4984 wrote to memory of 5040 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4984 wrote to memory of 5040 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4984 wrote to memory of 5040 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5040 wrote to memory of 5780 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5040 wrote to memory of 5780 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5040 wrote to memory of 5780 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5040 wrote to memory of 5780 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 5040 wrote to memory of 5780 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1776 -ip 1776

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 300

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4144 -ip 4144

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 312

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4924 -ip 4924

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 304

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5040 -ip 5040

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 268

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 52.27.79.221:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp

Files

memory/1776-0-0x0000000000400000-0x0000000000424000-memory.dmp

memory/5700-1-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5700-2-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5700-3-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5700-5-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4144-8-0x0000000000400000-0x0000000000424000-memory.dmp

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 594332f25218c9cb36a5186a39612da5
SHA1 a80a3fc1f2fe0750d43697a061a4eacc626e01eb
SHA256 524dbafcdccf5c36ae9efff0c4714309875c372bf590466e6dffdd3379b46020
SHA512 e1c809c1fc4c70e6d4dab831162e840293e1618f8bcb35e1d3695b53dec35fb7191c54e1cd2186302121009cfe38b40092472c7e32c0432d60b47173e42b9e85

memory/3452-14-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3452-15-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4144-16-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1776-17-0x0000000000400000-0x0000000000424000-memory.dmp

memory/3452-18-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3452-21-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3452-24-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3452-25-0x0000000000400000-0x0000000000429000-memory.dmp

memory/3452-33-0x0000000000400000-0x0000000000429000-memory.dmp

C:\Windows\SysWOW64\omsecor.exe

MD5 b898f671200923edec86c5e9f6c21b60
SHA1 1160b70a770a251861c76736ff2700a98765ae90
SHA256 0f265bb4acaf8b8b2d104e0413281da9e9cb451536e0489eb0bd391f99153f5c
SHA512 3ecf29d186426478e040f3e8df8936820ac513bed37d6f6388124e13fc3ae13fe356a13d08d7fe3c3aa7ea2f2d5abfd45edd2da7f599fdae3b44d6ff8ef8aeac

memory/4924-35-0x0000000000400000-0x0000000000424000-memory.dmp

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 bc70b2c2d130a9d979c297e9c1e87980
SHA1 d924ec21cdbb6d9b48d79fa373689a674e59f59a
SHA256 4507c07a5a14dbbdbbd9a91b48f3889a53f1ebfab59d967bf04671b3eb54ee28
SHA512 e61d03f2206365eb13597ddf1c26ed602ab4ec7258c48fa6da92d7713cdb324ba2448f39a4a501b50c0a10208b210597928db743bb448d26be8a4df6274d6841

memory/4984-43-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4984-38-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4984-39-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5040-46-0x0000000000400000-0x0000000000424000-memory.dmp

memory/5780-50-0x0000000000400000-0x0000000000429000-memory.dmp

memory/4924-51-0x0000000000400000-0x0000000000424000-memory.dmp

memory/5780-52-0x0000000000400000-0x0000000000429000-memory.dmp

memory/5780-55-0x0000000000400000-0x0000000000429000-memory.dmp