Analysis

  • max time kernel
    150s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 16:24

General

  • Target

    RBXIDLE.exe

  • Size

    134.1MB

  • MD5

    92d241ee2322192f628a7c0ca5c48f48

  • SHA1

    60e19cb221c868c750601ecaf88309dcad32d886

  • SHA256

    93d3e9ee4cca55a9287418e12eba8929bc471aa37ec213147f7bd8dc0896f98f

  • SHA512

    8ff9dd69f699d7d538b12e03564a04d1f31aaabc00cf2895a33bd8edf6e7864f888dd065c74ea6de9376da96a44c566b1b59d328c6e7c9dbc91ff03cfee3e75c

  • SSDEEP

    1572864:UUIbvHBgU0Tj91hRhmsMj9ZcZW0SUqDQ:UcUw+AGE

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs

    Using powershell.exe command.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 2 IoCs
  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
    "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2256
      • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
        "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe" --type=gpu-process --field-trial-handle=1640,9624674439324350722,9068604256172353578,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1660 /prefetch:2
        2⤵
          PID:3936
        • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
          "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1640,9624674439324350722,9068604256172353578,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --mojo-platform-channel-handle=2128 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4544
        • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
          "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1640,9624674439324350722,9068604256172353578,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2392 /prefetch:1
          2⤵
          • Checks computer location settings
          • Suspicious behavior: EnumeratesProcesses
          PID:4408
        • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
          "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --field-trial-handle=1640,9624674439324350722,9068604256172353578,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:1
          2⤵
          • Checks computer location settings
          PID:1196
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\execute.bat'" -WindowStyle hidden -Verb runAs"
          2⤵
          • Hide Artifacts: Hidden Window
          PID:3352
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\execute.bat'" -WindowStyle hidden -Verb runAs
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3332
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\execute.bat"
              4⤵
                PID:1688
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  5⤵
                    PID:4760
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe -ExecutionPolicy Bypass Add-MPPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\RBXIDLE.exe
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2084
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe -ExecutionPolicy Bypass Add-MPPreference -ExclusionPath C:\Users\Admin\AppData\Roaming\RBXIDLE
                    5⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5644
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "explorer https://discord.gg/XB94k6SxWN"
              2⤵
                PID:4268
                • C:\Windows\explorer.exe
                  explorer https://discord.gg/XB94k6SxWN
                  3⤵
                    PID:4284
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4392
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4272
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2440
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4524
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1732
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1712
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:516
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3168
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2824
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2784
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1616
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3648
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4456
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:440
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88""
                  2⤵
                    PID:6884
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml"
                    2⤵
                      PID:7028
                      • C:\Windows\system32\dxdiag.exe
                        dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml
                        3⤵
                        • Drops file in System32 directory
                        • Checks SCSI registry key(s)
                        • Modifies registry class
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:7104
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml"
                      2⤵
                        PID:7140
                        • C:\Windows\system32\dxdiag.exe
                          dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml
                          3⤵
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:6240
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:2656
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                        1⤵
                          PID:5500
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/XB94k6SxWN
                            2⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:5352
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa0a7846f8,0x7ffa0a784708,0x7ffa0a784718
                              3⤵
                                PID:5724
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                                3⤵
                                  PID:6060
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:3
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5332
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:8
                                  3⤵
                                    PID:5548
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                                    3⤵
                                      PID:4324
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                                      3⤵
                                        PID:5312
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                                        3⤵
                                          PID:6608
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4632 /prefetch:8
                                          3⤵
                                            PID:6344
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4604 /prefetch:8
                                            3⤵
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2152
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                                            3⤵
                                              PID:2276
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                                              3⤵
                                                PID:6860
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                                                3⤵
                                                  PID:3428
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                                                  3⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5592
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:1
                                                  3⤵
                                                    PID:4292
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:1
                                                    3⤵
                                                      PID:7112
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,133189114959566434,7748046495989102692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:2
                                                      3⤵
                                                        PID:724
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:6296
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:6460

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        6cf293cb4d80be23433eecf74ddb5503

                                                        SHA1

                                                        24fe4752df102c2ef492954d6b046cb5512ad408

                                                        SHA256

                                                        b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                        SHA512

                                                        0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                                        SHA1

                                                        010da169e15457c25bd80ef02d76a940c1210301

                                                        SHA256

                                                        6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                                        SHA512

                                                        e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        85ba073d7015b6ce7da19235a275f6da

                                                        SHA1

                                                        a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                                        SHA256

                                                        5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                                        SHA512

                                                        eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        480B

                                                        MD5

                                                        9be9d3a90107785561128f264ca4d6f3

                                                        SHA1

                                                        0a95045a925fd3d14ea4ecca0101cd0d739315a5

                                                        SHA256

                                                        5a3aa055103b28030ebbb88715899d97c5a3ac7750d7c8b96c0e08fba4793795

                                                        SHA512

                                                        9356aabaff080bf381cf4329fd98bdd2e525b7682626cfe804353523b763bc46881dc1f201149fcc00b57ca229becd3af967122df90c15fe204f4c497aa09502

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                        Filesize

                                                        323B

                                                        MD5

                                                        a5a1149047729a493b1a2a65063c39ba

                                                        SHA1

                                                        8f1f45cb0c0772dcd05795734cbf408636fb9fb9

                                                        SHA256

                                                        e0ef1f906ea2606c802310437fe799d93e073770ab6549060ee4b9c9c49f2006

                                                        SHA512

                                                        8ce257a087115e2d542657a2b4679d0c100ebdec76e3392cff1bbba133e129f2fcdbd73f9baab92e762bef47a2572d3dc8553fa3858d787d2a0b2bf8f05dc54e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        b527fed3984b61bbc0f21902ecf47e29

                                                        SHA1

                                                        ff21beb53ecdae1387e0eb6b71ef987fc692e6a4

                                                        SHA256

                                                        9aed45cc5779cbb4d8687764112d68e64a54f5413da325155b8d5ebc42108550

                                                        SHA512

                                                        c6a1e2e285aad7fdc5393159b874d0d9581a3c5a717be59d0ed481d556c96da13eacf12b08c9e5efb8f9a4e877a3952b49a6556cd9270c01cc9c4f8478ed3ce8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        511f238f236b8c00ac396d190840c3f1

                                                        SHA1

                                                        5ee104377011f593c85f7a58236a04e2dca6a7cc

                                                        SHA256

                                                        ffea60d1a5eddf11c887a0191177bada92f4e4ba27801286c803d1e147bc9b24

                                                        SHA512

                                                        a57b78f8b00019385f0331d5a6423400525ec614d374256284096ff77a3165517dac45180cb863d5083cb3131e7a4c18c12297ef5a9e64263aa05dcdd062db6e

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        6752a1d65b201c13b62ea44016eb221f

                                                        SHA1

                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                        SHA256

                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                        SHA512

                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        10KB

                                                        MD5

                                                        4d50f5c46fd70ec2925fe769c8ce3ba0

                                                        SHA1

                                                        d16bdf1075a5f7bd4b03151088ef39a680beec48

                                                        SHA256

                                                        cf6969ed505501497d40608acac7744376ca4a412da0cb39532647302eb7ece2

                                                        SHA512

                                                        446dd09b6c3f66b8e7591daf649a4b5f2315c635d183ec3d3ebacaa28a16aeb95d8c9b4872bfa78ab397aff46d5c86c6df5433f83ee326f6b283fec4ae2190b9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        7a1e03fe1039bf494d77070f2c583626

                                                        SHA1

                                                        bb6b31d644873fea13cb3c37e6225670b5682c8b

                                                        SHA256

                                                        53bb6e31c2534c61d2bb23c0ef4d9550c1b9361610bd01ef1816a97297147ed2

                                                        SHA512

                                                        e45c36ab8a4ba0c84783b2ddb2c26a9ab66cd5d26f1f0999b1288656288b1f8f33922a92c05641e6dfad03fac708525a1a37815d8ce1088ed0c72217e2f82827

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        28c65370f12e84b734af87ad491ea257

                                                        SHA1

                                                        402d3a8203115f1365d48fa72daf0a56e14d8a08

                                                        SHA256

                                                        4ea873fb3d77a2f8eefae82c943f621f16723516e181bde133568f8f0c91290c

                                                        SHA512

                                                        56eb34162b0a39da4aaf66aad35ef355a7709982b5060792e3b4849c36650725176e927815537ec58e7ddf0fb1763066b203d6b7f9d1b3dd2c8bc091c0c850cc

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        2f87410b0d834a14ceff69e18946d066

                                                        SHA1

                                                        f2ec80550202d493db61806693439a57b76634f3

                                                        SHA256

                                                        5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                                                        SHA512

                                                        a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        2219d11d38283c6540fe67fa7c6ffa9a

                                                        SHA1

                                                        6b31e02cc3bac71b2efe040cb9145a9f39cf265c

                                                        SHA256

                                                        c60525f251d08b002da0d783afa2defe40377aa19a7a3f6c5167bce73cdec2ba

                                                        SHA512

                                                        5910c82dec0862520bdeb224b081ab1811b358abb940fff57c9a2f78e804fcf8e3464912bcb1a7ed90a1860f2d9a158b8b9674d905b3a98a2f17af54e3b07343

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        64B

                                                        MD5

                                                        a6c9d692ed2826ecb12c09356e69cc09

                                                        SHA1

                                                        def728a6138cf083d8a7c61337f3c9dade41a37f

                                                        SHA256

                                                        a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b

                                                        SHA512

                                                        2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        944B

                                                        MD5

                                                        96ff1ee586a153b4e7ce8661cabc0442

                                                        SHA1

                                                        140d4ff1840cb40601489f3826954386af612136

                                                        SHA256

                                                        0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8

                                                        SHA512

                                                        3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

                                                      • C:\Users\Admin\AppData\Local\Temp\149fbd81-ac37-4603-9bd0-be166e635c12.tmp.node

                                                        Filesize

                                                        212KB

                                                        MD5

                                                        c2387a887c8665868269dc1ddb6d73b7

                                                        SHA1

                                                        a21ffa918e33972c77bd5d7d0801dae8e0da0b34

                                                        SHA256

                                                        4dc72530341ceb89eb249d04b9d914b7375ef45aa0cb9cc0640e45b69cf8cb2b

                                                        SHA512

                                                        ebbbaf2befd93c74693813c0de8846806d939bc1fbbbff94f20b85d019fa0194891859b8b2ea7e736320dc6b0a789ca443452ac22d8585243de17cd1c07c324c

                                                      • C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\command.bat

                                                        Filesize

                                                        298B

                                                        MD5

                                                        3d81ad1ad673a10c27c19ff119e7484d

                                                        SHA1

                                                        42de481417591da721cdbefe42877a37182e329a

                                                        SHA256

                                                        61e60c609fdebbe73e00ff2b7d0e7a4977fb7cc88b78080e6db61cf8e9a573e8

                                                        SHA512

                                                        954dbd9dcbabd36afe7d15d863df6a951f42a30d2e0f74d7076962a030e33d90399ab06330f697220ac9407a2667d87aa020e5e89744cc0ff76934f6dbf3ff1d

                                                      • C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\execute.bat

                                                        Filesize

                                                        352B

                                                        MD5

                                                        c8366ac5d29444fed033d45af0642a26

                                                        SHA1

                                                        6b7a80473fea77cae49bf7ec0f36cd858b7237c9

                                                        SHA256

                                                        df13ca9d491b3f0f55977c6747c43c35c543f2183a15fc04d8e6e23b6ebcfb6a

                                                        SHA512

                                                        252c888a6bb3c57f6f162395e56fd5f9e557f7f2360ba127925c9ba27b65d2ba7fe3872afc5e1849beb491c5ce31f7d797b0308d07e837e98de5d2bb7b929cd3

                                                      • C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\status

                                                        Filesize

                                                        3B

                                                        MD5

                                                        a5ea0ad9260b1550a14cc58d2c39b03d

                                                        SHA1

                                                        f0aedf295071ed34ab8c6a7692223d22b6a19841

                                                        SHA256

                                                        f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04

                                                        SHA512

                                                        7c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74

                                                      • C:\Users\Admin\AppData\Local\Temp\33ab0b1f728e03625c5e82ac22e3dd88\stderr

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        56f65d7404887fac45cde2bfbfeb6274

                                                        SHA1

                                                        9209219c7254bad5b875bcaa6243278840b0a74f

                                                        SHA256

                                                        9d47a39f9d5ac3fd942fbcbf227508006471e55c719c08c71f1a96f657452af8

                                                        SHA512

                                                        e1a4bab1e6d9c18c9b50ac44d1854a061600330a3de0d90a8b0389cdd93260c0cc18dc7e421a5fae7ff89177a4bbc4e41da89f7c057b7da18e186cc513395b9e

                                                      • C:\Users\Admin\AppData\Local\Temp\9a85bc47-8dad-49a0-83ae-22e4eef0c15d.tmp.node

                                                        Filesize

                                                        191KB

                                                        MD5

                                                        7ec7dd493ee9bc5ffc207d58eef582a6

                                                        SHA1

                                                        f00bb96ccff396eaf68b40745f43c130af96ed85

                                                        SHA256

                                                        4f0dfd414666f66c1d93191e0314f86c1ae9e68405486bfe89e473816ecc273c

                                                        SHA512

                                                        4b9d6a8a8e56f377802458a79b8d80131fbbc34aac6debfc8bef05cf346008448aed18571a8e837d359f72dde0283b27ef5de746988fc420b49789f3e4c989ac

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1w3c5p3f.ezl.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                        Filesize

                                                        2B

                                                        MD5

                                                        f3b25701fe362ec84616a93a45ce9998

                                                        SHA1

                                                        d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                        SHA256

                                                        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                        SHA512

                                                        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\6fb1892f-bfe0-4a60-bbbc-0faed58c77f5.tmp

                                                        Filesize

                                                        57B

                                                        MD5

                                                        58127c59cb9e1da127904c341d15372b

                                                        SHA1

                                                        62445484661d8036ce9788baeaba31d204e9a5fc

                                                        SHA256

                                                        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                                                        SHA512

                                                        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        216B

                                                        MD5

                                                        20fa73f6cfbd19339e729b4fda45a6cd

                                                        SHA1

                                                        1205c27229f205a846cc914e88ab86744349c5ff

                                                        SHA256

                                                        d5486244f69459b54fbd6372ee6aef42c76340b95774a24fc54a03a93370cc04

                                                        SHA512

                                                        454c8388c34cec9d42b5e135b7e6ad3a7deea28cb8ae65f53749684235f8ffbe01580d063a8c377217d2f5193d8f32f4b6ce0d9415f75cc9ebb8547293aa96f8

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Code Cache\js\index-dir\the-real-index~RFe589f96.TMP

                                                        Filesize

                                                        48B

                                                        MD5

                                                        c8950ea1a66162e81c81cab24cc2031b

                                                        SHA1

                                                        9eedd8b6b450ff85c3a847adf063aa464c27e3ab

                                                        SHA256

                                                        3cefd57a1425d1748980d9d33cf883ad69ba50101ca69344b19ae84dfc7178e2

                                                        SHA512

                                                        0c0957bd346076cc1abda968c506ca08aaad2aaabebf463129d5ffbabced2ffc0d91bb87113dc1efd28c80347cb8143c731d4d07c1bbc5b0af00f815b61dab9b

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Network Persistent State

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        9db63dce35e29fe86e54eb0fad284c86

                                                        SHA1

                                                        9f2c36e785b9bf6a268a4d02b9f99d75ea17d333

                                                        SHA256

                                                        e19b5fba03558ec569f7fea1d16f39d4f8c41a624088df25f317a144189711da

                                                        SHA512

                                                        9f84946e0a3cb25c4424802da6fd176316b276e40a7a7d1b7d813decb6b742faeea9134984b297c8ab705103fb3a02b9c8e9546b50eec57edb4e0d865677aa56

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Network Persistent State~RFe590526.TMP

                                                        Filesize

                                                        59B

                                                        MD5

                                                        2800881c775077e1c4b6e06bf4676de4

                                                        SHA1

                                                        2873631068c8b3b9495638c865915be822442c8b

                                                        SHA256

                                                        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                        SHA512

                                                        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                        Filesize

                                                        26B

                                                        MD5

                                                        2892eee3e20e19a9ba77be6913508a54

                                                        SHA1

                                                        7c4ef82faa28393c739c517d706ac6919a8ffc49

                                                        SHA256

                                                        4f110831bb434c728a6895190323d159df6d531be8c4bb7109864eeb7c989ff2

                                                        SHA512

                                                        b13a336db33299ab3405e13811e3ed9e5a18542e5d835f2b7130a6ff4c22f74272002fc43e7d9f94ac3aa6a4d53518f87f25d90c29e0d286b6470667ea9336ae

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe584532.TMP

                                                        Filesize

                                                        90B

                                                        MD5

                                                        6fdca5cd48ddd79c6921468c6b822a4d

                                                        SHA1

                                                        931d9954a3927a13d6297e5c92233bb75b1259fd

                                                        SHA256

                                                        9a76bc4e739a133efa183168e1041afad03e6e29afb1f4a3ba8d23596aef11fa

                                                        SHA512

                                                        a3b8f495a945a20577f665ac9e0b13f5265ffb81b34be8ea45429bc8c3de39bb475d26a24e93f53be1795bd695cfff8cb72390b6a75efbdf973ae174482e318a

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml

                                                        Filesize

                                                        165KB

                                                        MD5

                                                        422d609c5e7bdd571da26c52c20b8dd1

                                                        SHA1

                                                        72f0e0b571a72f14ca1512ce4b9774011ad77742

                                                        SHA256

                                                        39e160523e82ac69f32636c4ec4f5d0bcfcc2bd65ec8ca8467dbeeac6835f67f

                                                        SHA512

                                                        73b5f0719efe1ec8af69375134c22eec19b7a86738d75ea80cdc611826e90a70614949e4feec826097b99aa52757a7c7841e557e4c20427b87214c0f08d34992

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml

                                                        Filesize

                                                        69KB

                                                        MD5

                                                        8713ae4518cf31c5ad24523eeb5b3a53

                                                        SHA1

                                                        6d5df40c4e15ad2c39aa9b42731191b706004fa9

                                                        SHA256

                                                        52b81ca1625a75dcee1c1fe8677e4a7fe5474422cff9c9f83b9ef3ccecb8ba7c

                                                        SHA512

                                                        f3c35be3848b3512338f3109aab7ef6c4659db46851a8f8877d0e8639fce9abd643741381ba0cbedb043dfcc6d3b0820129421427b9af21cba0fd476c1dfa18f

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                        Filesize

                                                        347B

                                                        MD5

                                                        4a4712a64f9c8810480711f7fac791e3

                                                        SHA1

                                                        fca5a949329153cf5bdafe982cebd15817648e27

                                                        SHA256

                                                        87962a274a0c1e4d0d186a00e5ee44887a81078d9e0637dcd2566b42d426cdc8

                                                        SHA512

                                                        7818fe4eb40b5b6dca3d2c7e6e5bdf50994ad95f1500553ae2fd8fad35601142621d3bc7b6c4c86f8f3458ce69b4a6d35b3d5f3f723d7bab5f79b624de76c13f

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                        Filesize

                                                        345B

                                                        MD5

                                                        46678851b8badfd65a70604feb02ba0c

                                                        SHA1

                                                        574f675578d6de97d06bbb0590b1c2dee6c03f99

                                                        SHA256

                                                        da7ff07a09d2eb4b212293698f1be4de250d8589543e711ce6271cdd4ce1746a

                                                        SHA512

                                                        ad5a382e41c5bb47d656a13e9c85ccd325993b5b94d3d670f79f37e6d1edd9b975e72fd6eb58999b0d91eaa233546f33c469724c4748e0c050b587102c24459c

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                        Filesize

                                                        396B

                                                        MD5

                                                        3898facc087a66584903c760de05fa34

                                                        SHA1

                                                        2a510d5021c5a0f91ff855891a204a3ac813e622

                                                        SHA256

                                                        da62d153a6a03dd735547425e623f44b3c0735f5ce3e9abb1b53aaed269a7d71

                                                        SHA512

                                                        a5874eae6225de3ee1f85e8972022f42be18cd43c43e722b6328d280d4e526fa354f6daad0921c26f62c10c7058b48c5ee008924fcee1a7ef0f12963008cbbd4

                                                      • C:\Users\Admin\AppData\Roaming\RBXIDLE\shared_proto_db\metadata\MANIFEST-000001

                                                        Filesize

                                                        41B

                                                        MD5

                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                        SHA1

                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                        SHA256

                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                        SHA512

                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                      • C:\Users\Admin\AppData\Roaming\b8b8236d-0184-4f75-942f-0d4bb519420b.tmp

                                                        Filesize

                                                        874B

                                                        MD5

                                                        d061080412f681e964c5241c7685e999

                                                        SHA1

                                                        e1e123df79d6a61b4b5c82bd7ed5ec2b8f421a3d

                                                        SHA256

                                                        880327788dd2eca2bbd1472835edd8d058b6828f4c7f0966b00d731bf0faaf28

                                                        SHA512

                                                        63129732bf519dcb1f64977c38a99b07556042f4618610bd2511a09a13f2237ab18f5853a7a131bcc7e1bf4d13ee974f3f058009356cfd15e3f014cf244d2c96

                                                      • C:\Users\Admin\AppData\Roaming\f9790f43-0781-4d98-9224-e186d7c55fe6.tmp

                                                        Filesize

                                                        872B

                                                        MD5

                                                        e3f92e4aa0f494b8423dc7e191abfd43

                                                        SHA1

                                                        e49661ecf83503836d8a126a199efafc7b5797d7

                                                        SHA256

                                                        ba249adcd9f2c453a1a068fae733be3a1fd37387651094f2cd01a69776fd42b0

                                                        SHA512

                                                        fb4944e10b8cd8596a42183c875c8d738f5588a32aaf166c5493ced11f34cde54c664afe44dd1c447ce69cfea763f1c82ea436ae2ff34ea2a704b0fe4b2806fe

                                                      • memory/1196-638-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-726-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-785-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-383-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-81-0x00007FFA31CF0000-0x00007FFA31CF1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/1196-803-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-791-0x0000017CE95B0000-0x0000017CE964E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/1196-82-0x00007FFA316B0000-0x00007FFA316B1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/2440-346-0x0000023B746A0000-0x0000023B746C4000-memory.dmp

                                                        Filesize

                                                        144KB

                                                      • memory/2440-345-0x0000023B746A0000-0x0000023B746CA000-memory.dmp

                                                        Filesize

                                                        168KB

                                                      • memory/3332-97-0x000002BD92960000-0x000002BD92982000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/3648-262-0x000001F4EE640000-0x000001F4EE684000-memory.dmp

                                                        Filesize

                                                        272KB

                                                      • memory/3648-270-0x000001F4EE940000-0x000001F4EE9B6000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/3936-684-0x000002362F190000-0x000002362F22E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/3936-314-0x000002362F190000-0x000002362F22E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/3936-804-0x000002362F190000-0x000002362F22E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/3936-11-0x00007FFA304D0000-0x00007FFA304D1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/3936-712-0x000002362F190000-0x000002362F22E000-memory.dmp

                                                        Filesize

                                                        632KB

                                                      • memory/6240-565-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-564-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-573-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-569-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-563-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-572-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-571-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-570-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-575-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/6240-574-0x00000150FF5E0000-0x00000150FF5E1000-memory.dmp

                                                        Filesize

                                                        4KB