Analysis

  • max time kernel
    148s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 16:24

General

  • Target

    RBXIDLE.Setup.3.0.0.exe

  • Size

    144.1MB

  • MD5

    f7cd23293d037af068d7b4552f8bcee3

  • SHA1

    32485a4bb72cb1646a3028836378015cbcde2180

  • SHA256

    6d567d0959ae8c664714535ee960910c49e5f61971858fa396e9edb19688c1b3

  • SHA512

    f31091dd3f6c86e39fd861e35a5213ce9fcec676a8e7f33abb71fb8c48a5ca648127bf07ecfe249aaa9e039281689b789407340f4c7476a6f1bfb721b63978aa

  • SSDEEP

    3145728:JPFNsCo0L7fiLGL5n6PT6Lr0UOkyJQweGopgu9CzxxNEQFSvyrzkfC0T6:1FN4SUu0UOkyJQp7pH9krNQvYgfw

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Run Powershell and hide display window.

  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 24 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 21 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RBXIDLE.Setup.3.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\RBXIDLE.Setup.3.0.0.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2924
  • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe
    "C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2656
      • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe
        "C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe" --type=gpu-process --field-trial-handle=1672,8786671343154987098,14790130731393933691,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --gpu-preferences=UAAAAAAAAADgAAAIAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1680 /prefetch:2
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4292
      • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe
        "C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1672,8786671343154987098,14790130731393933691,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --mojo-platform-channel-handle=2264 /prefetch:8
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe
        "C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --app-path="C:\Users\Admin\AppData\Local\Programs\RBXIDLE\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1672,8786671343154987098,14790130731393933691,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2436 /prefetch:1
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1292
      • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe
        "C:\Users\Admin\AppData\Local\Programs\RBXIDLE\RBXIDLE.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\RBXIDLE" --app-path="C:\Users\Admin\AppData\Local\Programs\RBXIDLE\resources\app.asar" --enable-sandbox --field-trial-handle=1672,8786671343154987098,14790130731393933691,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:1
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4820
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197\execute.bat'" -WindowStyle hidden -Verb runAs"
        2⤵
        • Hide Artifacts: Hidden Window
        PID:3284
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe Start-Process -FilePath "'C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197\execute.bat'" -WindowStyle hidden -Verb runAs
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1176
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197\execute.bat"
            4⤵
              PID:4028
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "explorer https://discord.gg/XB94k6SxWN"
          2⤵
            PID:4940
            • C:\Windows\explorer.exe
              explorer https://discord.gg/XB94k6SxWN
              3⤵
                PID:5472
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2224
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4656
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:800
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:768
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4500
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3732
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2700
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4792
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3664
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:516
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4452
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1324
              • C:\Windows\System32\Conhost.exe
                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                3⤵
                  PID:3284
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4244
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3504
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197""
                2⤵
                  PID:5424
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml"
                  2⤵
                    PID:4140
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      3⤵
                        PID:3664
                      • C:\Windows\system32\dxdiag.exe
                        dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml
                        3⤵
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:6204
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml"
                      2⤵
                        PID:5660
                        • C:\Windows\system32\dxdiag.exe
                          dxdiag /x C:\Users\Admin\AppData\Roaming\RBXIDLE\dx.xml
                          3⤵
                          • Drops file in System32 directory
                          • Checks SCSI registry key(s)
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of SetWindowsHookEx
                          PID:6468
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:2912
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                        1⤵
                          PID:5824
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/XB94k6SxWN
                            2⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:5656
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff818c046f8,0x7ff818c04708,0x7ff818c04718
                              3⤵
                                PID:6152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
                                3⤵
                                  PID:6536
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:6544
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
                                  3⤵
                                    PID:6556
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                                    3⤵
                                      PID:6704
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                      3⤵
                                        PID:6712
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:1
                                        3⤵
                                          PID:2636
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5072 /prefetch:8
                                          3⤵
                                            PID:5160
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5132 /prefetch:8
                                            3⤵
                                            • Modifies registry class
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:3368
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:8
                                            3⤵
                                              PID:5880
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:8
                                              3⤵
                                                PID:6028
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1
                                                3⤵
                                                  PID:2924
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                                                  3⤵
                                                    PID:1100
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                                                    3⤵
                                                      PID:6404
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1
                                                      3⤵
                                                        PID:2112
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,12104895023324587025,1379855934750699199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:2
                                                        3⤵
                                                          PID:5200
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:6940
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:7048

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          6cf293cb4d80be23433eecf74ddb5503

                                                          SHA1

                                                          24fe4752df102c2ef492954d6b046cb5512ad408

                                                          SHA256

                                                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                          SHA512

                                                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          37f660dd4b6ddf23bc37f5c823d1c33a

                                                          SHA1

                                                          1c35538aa307a3e09d15519df6ace99674ae428b

                                                          SHA256

                                                          4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                                          SHA512

                                                          807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                          Filesize

                                                          152B

                                                          MD5

                                                          d7cb450b1315c63b1d5d89d98ba22da5

                                                          SHA1

                                                          694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                                          SHA256

                                                          38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                                          SHA512

                                                          df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          480B

                                                          MD5

                                                          7b1b8a08f1197a751d92eb3d7bfd3e85

                                                          SHA1

                                                          a3813481b779c66b45903543b1e4d25cdb24c158

                                                          SHA256

                                                          2dea9712996aa769864a18c1ed76b9b2c10b3462d42d1243ff8a4527fbd2b6b0

                                                          SHA512

                                                          6962307254da370a9a9cb0aab3c50eef6de3d2321fc04581ca92a7b1fbc4f028cdd8c8e8f1101a98aff7df57acdf05383dbbd2d6780e9a09030233c6dfeb8bc6

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                          Filesize

                                                          323B

                                                          MD5

                                                          a5a1149047729a493b1a2a65063c39ba

                                                          SHA1

                                                          8f1f45cb0c0772dcd05795734cbf408636fb9fb9

                                                          SHA256

                                                          e0ef1f906ea2606c802310437fe799d93e073770ab6549060ee4b9c9c49f2006

                                                          SHA512

                                                          8ce257a087115e2d542657a2b4679d0c100ebdec76e3392cff1bbba133e129f2fcdbd73f9baab92e762bef47a2572d3dc8553fa3858d787d2a0b2bf8f05dc54e

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          da3400c716b0229c06b260b10fe24845

                                                          SHA1

                                                          3735a5a0426aa2f3cbc6dc7668438f37507e3ea1

                                                          SHA256

                                                          1951705dae9c8fef051bfb29f0c8370c77f68ce263daae7e62c076141fb4f9d2

                                                          SHA512

                                                          3d8d0224f80d6a4ce6db661fb09570bf1c9fae6676103a3d3d123c1263d072e2d169a629505a1c70155466f3a94e7bf904abb7ab673cbfb662f996698cca6f45

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                          Filesize

                                                          5KB

                                                          MD5

                                                          8ebd9394a67312e7636c3998ba6d7614

                                                          SHA1

                                                          2c28728bd5b727f0a3c8a14627120a1bf016777c

                                                          SHA256

                                                          c24597131f5e9bf4c97270d0a787a41bf91836ea696375994e453526282023ee

                                                          SHA512

                                                          6db55cee3a959721b174dc02f9c50f8e386096af1efb779659e3e88175eeb42bf482cda7a56bdbe9119ca2783af33391f628293a5af437f1f1e988360385fed8

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          6752a1d65b201c13b62ea44016eb221f

                                                          SHA1

                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                          SHA256

                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                          SHA512

                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                          Filesize

                                                          10KB

                                                          MD5

                                                          ba9e23004aa17e688bcc1ae5ee30bfed

                                                          SHA1

                                                          9801f3d469f2c25ba801aad78d90c3499cb08de1

                                                          SHA256

                                                          0e2459e8fc45a75a88023b9f7d0045c9992b9a4663f45c6030e0b6339af287b9

                                                          SHA512

                                                          961ad8729dbcf8e8ee0622c64364323fd7564906396ac6d422bb48fcd96c1b7b4ea1517a70aad73a92763702c7a16c96aea91afc33dc4e3c12e80b0e9627cb2a

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          28c65370f12e84b734af87ad491ea257

                                                          SHA1

                                                          402d3a8203115f1365d48fa72daf0a56e14d8a08

                                                          SHA256

                                                          4ea873fb3d77a2f8eefae82c943f621f16723516e181bde133568f8f0c91290c

                                                          SHA512

                                                          56eb34162b0a39da4aaf66aad35ef355a7709982b5060792e3b4849c36650725176e927815537ec58e7ddf0fb1763066b203d6b7f9d1b3dd2c8bc091c0c850cc

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          7a1e03fe1039bf494d77070f2c583626

                                                          SHA1

                                                          bb6b31d644873fea13cb3c37e6225670b5682c8b

                                                          SHA256

                                                          53bb6e31c2534c61d2bb23c0ef4d9550c1b9361610bd01ef1816a97297147ed2

                                                          SHA512

                                                          e45c36ab8a4ba0c84783b2ddb2c26a9ab66cd5d26f1f0999b1288656288b1f8f33922a92c05641e6dfad03fac708525a1a37815d8ce1088ed0c72217e2f82827

                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          2f87410b0d834a14ceff69e18946d066

                                                          SHA1

                                                          f2ec80550202d493db61806693439a57b76634f3

                                                          SHA256

                                                          5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                                                          SHA512

                                                          a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\D3DCompiler_47.dll

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          7641e39b7da4077084d2afe7c31032e0

                                                          SHA1

                                                          2256644f69435ff2fee76deb04d918083960d1eb

                                                          SHA256

                                                          44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

                                                          SHA512

                                                          8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\chrome_100_percent.pak

                                                          Filesize

                                                          138KB

                                                          MD5

                                                          0fd0a948532d8c353c7227ae69ed7800

                                                          SHA1

                                                          c6679bfb70a212b6bc570cbdf3685946f8f9464c

                                                          SHA256

                                                          69a3916ed3a28cd5467b32474a3da1c639d059abbe78525a3466aa8b24c722bf

                                                          SHA512

                                                          0ee0d16ed2afd7ebd405dbe372c58fd3a38bb2074abc384f2c534545e62dfe26986b16df1266c5807a373e296fe810554c480b5175218192ffacd6942e3e2b27

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\chrome_200_percent.pak

                                                          Filesize

                                                          202KB

                                                          MD5

                                                          1014a2ee8ee705c5a1a56cda9a8e72ee

                                                          SHA1

                                                          5492561fb293955f30e95a5f3413a14bca512c30

                                                          SHA256

                                                          ed8afe63f5fc494fd00727e665f7f281600b09b4f4690fa15053a252754e9d57

                                                          SHA512

                                                          ac414855c2c1d6f17a898418a76cce49ad025d24c90c30e71ad966e0fd6b7286acf456e9f5a6636fd16368bc1a0e8b90031e9df439b3c7cd5e1e18b24a32c508

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\ffmpeg.dll

                                                          Filesize

                                                          2.6MB

                                                          MD5

                                                          e75e08c888c96422068a7dec5b1844e3

                                                          SHA1

                                                          3ef8efcd066d218b116290483099ea610f722a7b

                                                          SHA256

                                                          6145fb062a750ff9d8f2b3ab4b7e07e2d9c1763acbb975b0cbe1123ed274f23e

                                                          SHA512

                                                          617e99ffb60e49a9576d42621dc5ce99c55db60af6f0c40a220a994409c7b82aec6bebe226d299bcd7a1720d3264001aa363b40b1460e023cff48eb6ca6ad153

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\icudtl.dat

                                                          Filesize

                                                          9.7MB

                                                          MD5

                                                          224ba45e00bbbb237b34f0facbb550bf

                                                          SHA1

                                                          1b0f81da88149d9c610a8edf55f8f12a87ca67de

                                                          SHA256

                                                          8dee674ccd2387c14f01b746779c104e383d57b36c2bdc8e419c470a3d5ffadc

                                                          SHA512

                                                          c04d271288dd2eff89d91e31829586706eba95ffbab0b75c2d202a4037e66a4e2205e8a37ecf15116302c51239b1826064ed4670a3346439470b260aba0ea784

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\libGLESv2.dll

                                                          Filesize

                                                          7.5MB

                                                          MD5

                                                          bdef859433e7d3aa28c09e0e56bcc527

                                                          SHA1

                                                          366f2249676473754866559b442ef2e54df2544f

                                                          SHA256

                                                          8c13a4b5754ce67f97df2cb4ed356e44e4d902002600136f07c0d6b6837c182e

                                                          SHA512

                                                          4cc22db001d9f94db1443f64d124baa84b20e234d18c523d2dad62c8ecf421884b85c56ea080e81d52a96d5141decee3f761d3481f5b73a074fed9fd11f53451

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\libegl.dll

                                                          Filesize

                                                          431KB

                                                          MD5

                                                          2abed6d1a85117fc8e319db10303df46

                                                          SHA1

                                                          b8adf5c210d4d8cb7fe47d1fcbe5aaffef6a7c1b

                                                          SHA256

                                                          13bba503fb0ad061b3b32f3a1580c50e3379c8f8da4de009c85bca294ad0d6e8

                                                          SHA512

                                                          020a3c1f58f3eecaa992ea59fa09ba49fe5da6d117988235a847eec7bfe4256093dd1fe2e8c017260eb6c23f7602a67d49c10d5f8d1afe21af848f2f96c11b7e

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\locales\en-US.pak

                                                          Filesize

                                                          95KB

                                                          MD5

                                                          214e2b52108bbde227209a00664d30a5

                                                          SHA1

                                                          e2ac97090a3935c8aa7aa466e87b67216284b150

                                                          SHA256

                                                          1673652b703771ef352123869e86130c9cb7c027987753313b4c555a52992bab

                                                          SHA512

                                                          9029402daea1cbe0790f9d53adc6940c1e483930cf24b3a130a42d6f2682f7c2d6833f2cd52f2417009c3655fed6a648b42659729af3c745eaa6c5e8e2b5bb9e

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\resources.pak

                                                          Filesize

                                                          5.6MB

                                                          MD5

                                                          0189f72b35a76ffcf33f457c1c5c9ed9

                                                          SHA1

                                                          744724f2c543f1a3f6f0dbd1f1a773ab92e052d3

                                                          SHA256

                                                          eccc333eb22909c05dd55ac45429fac3e0322c83d31e83a57447025af91e69cc

                                                          SHA512

                                                          ba10319a86aef87b21435a81c961239a1e61a6edb1efc39066283b2376d250441f52b46079768ce0de5010d64c69629faf2635ea365145905304c46789d7e9e7

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\resources\app-update.yml

                                                          Filesize

                                                          91B

                                                          MD5

                                                          89a87240dd48d49663488139c41d10f0

                                                          SHA1

                                                          9cc1f64a3529160741a683b39dff9aa184f3d2f1

                                                          SHA256

                                                          6fe43f1f33de29426d24af215ac34862e89619a79ab8b7afdc8c1d72a97fc285

                                                          SHA512

                                                          31fd3549aadf1305c7eb98d261ddecfe24e3c22816a8de3f8da68567b08bc622432dd431d609b1fee7140937c80aafe3794809065deaffd169bb03839891a0e1

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\v8_context_snapshot.bin

                                                          Filesize

                                                          160KB

                                                          MD5

                                                          03c3851343e11392b24b91897910b060

                                                          SHA1

                                                          9ec2de38a63ed606c1ed545f583ac427b48b3192

                                                          SHA256

                                                          0abf6a4b73a4abf6e43eb8eac6fa9399164166502de4fd23e9a659f47a416600

                                                          SHA512

                                                          80144fa894ff193027b4ff24a0d4301e41d5f0fbc39dc1e5c14f2834e9092765739a956260182396f275faabfe07329c685bb095a9aa72286141d9b1cb0a354a

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\vk_swiftshader.dll

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          d748b67bbe5e511afd2107a51f857a32

                                                          SHA1

                                                          33b0b7ea20e112448c82f43fc52e39726a8a03e5

                                                          SHA256

                                                          bc965a0b30106263801249b156321dd1740117789f72f61329b61746c0f46c35

                                                          SHA512

                                                          53a1df01847366e3282f8920c1b71b135b940929c85e944c6b00ab557458ad1b3eeddff0e69f89592706e90a36189a44e5e9bff23fe0331dbaa8233d38e95536

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\vk_swiftshader_icd.json

                                                          Filesize

                                                          106B

                                                          MD5

                                                          8642dd3a87e2de6e991fae08458e302b

                                                          SHA1

                                                          9c06735c31cec00600fd763a92f8112d085bd12a

                                                          SHA256

                                                          32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9

                                                          SHA512

                                                          f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

                                                        • C:\Users\Admin\AppData\Local\Programs\RBXIDLE\vulkan-1.dll

                                                          Filesize

                                                          715KB

                                                          MD5

                                                          6a05b161245180545849155b1cf63253

                                                          SHA1

                                                          db0393114078ff56c8fab49e2ed680324f4e31f3

                                                          SHA256

                                                          05c6d4aff774c0ee8190749a8cdc359ca294e0410a56666d14730f9456ff51e2

                                                          SHA512

                                                          0e4c8a15e55c274513f60f0e57da2dfea8c9fdcf47694bc7a4c0e29eb9a1d00d10f7e9493da7985dc352cc006e5244fc84c5a048e1d8a1f911757a41684fe257

                                                        • C:\Users\Admin\AppData\Local\Temp\78b08713-4f34-409f-ab9d-7eb2e644467d.tmp.node

                                                          Filesize

                                                          191KB

                                                          MD5

                                                          7ec7dd493ee9bc5ffc207d58eef582a6

                                                          SHA1

                                                          f00bb96ccff396eaf68b40745f43c130af96ed85

                                                          SHA256

                                                          4f0dfd414666f66c1d93191e0314f86c1ae9e68405486bfe89e473816ecc273c

                                                          SHA512

                                                          4b9d6a8a8e56f377802458a79b8d80131fbbc34aac6debfc8bef05cf346008448aed18571a8e837d359f72dde0283b27ef5de746988fc420b49789f3e4c989ac

                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rgvwrlom.2dv.ps1

                                                          Filesize

                                                          60B

                                                          MD5

                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                          SHA1

                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                          SHA256

                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                          SHA512

                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                        • C:\Users\Admin\AppData\Local\Temp\a00584d4-98f3-486c-83c6-8aa24c8adcb0.tmp.node

                                                          Filesize

                                                          212KB

                                                          MD5

                                                          c2387a887c8665868269dc1ddb6d73b7

                                                          SHA1

                                                          a21ffa918e33972c77bd5d7d0801dae8e0da0b34

                                                          SHA256

                                                          4dc72530341ceb89eb249d04b9d914b7375ef45aa0cb9cc0640e45b69cf8cb2b

                                                          SHA512

                                                          ebbbaf2befd93c74693813c0de8846806d939bc1fbbbff94f20b85d019fa0194891859b8b2ea7e736320dc6b0a789ca443452ac22d8585243de17cd1c07c324c

                                                        • C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197\command.bat

                                                          Filesize

                                                          322B

                                                          MD5

                                                          694d0e0cfad90ec5fa987eab1dbc8025

                                                          SHA1

                                                          97891323366f0b51f7294bcbb101dfddbbc16a5e

                                                          SHA256

                                                          bb569cf53989a6fca920247303e6187b4ef0ecf42ab278a4c637899200b47c01

                                                          SHA512

                                                          43374ae735f550d4ee23d7b2b3aaa87658f5a4c82217b4e66825df9e7efdd487abcd1a1049ff2b3169956d7321f5f910fd02cef1f7df8c5529f30a00826125d6

                                                        • C:\Users\Admin\AppData\Local\Temp\de2f6bb9a0341b441096fd153cc4e197\execute.bat

                                                          Filesize

                                                          352B

                                                          MD5

                                                          8d71f69ee867395bf971ba35c618e5fc

                                                          SHA1

                                                          6bb694ba6082498943bc68131990bfbeed1ef520

                                                          SHA256

                                                          bb53381ed9addc814770f32be61cd32832bacc4f74232a8640f80df019858841

                                                          SHA512

                                                          af06bebaf708a44ad1435bbcf4c0937b585dd909769f017455c1b5e8879dd0151bab0f558f94e5381dcaa8c7da585af8bd5ce091ddb010b6ed7c958b754a008d

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\SpiderBanner.dll

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          17309e33b596ba3a5693b4d3e85cf8d7

                                                          SHA1

                                                          7d361836cf53df42021c7f2b148aec9458818c01

                                                          SHA256

                                                          996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

                                                          SHA512

                                                          1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\StdUtils.dll

                                                          Filesize

                                                          100KB

                                                          MD5

                                                          c6a6e03f77c313b267498515488c5740

                                                          SHA1

                                                          3d49fc2784b9450962ed6b82b46e9c3c957d7c15

                                                          SHA256

                                                          b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

                                                          SHA512

                                                          9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\System.dll

                                                          Filesize

                                                          12KB

                                                          MD5

                                                          0d7ad4f45dc6f5aa87f606d0331c6901

                                                          SHA1

                                                          48df0911f0484cbe2a8cdd5362140b63c41ee457

                                                          SHA256

                                                          3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

                                                          SHA512

                                                          c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\WinShell.dll

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          1cc7c37b7e0c8cd8bf04b6cc283e1e56

                                                          SHA1

                                                          0b9519763be6625bd5abce175dcc59c96d100d4c

                                                          SHA256

                                                          9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

                                                          SHA512

                                                          7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\nsProcess.dll

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          f0438a894f3a7e01a4aae8d1b5dd0289

                                                          SHA1

                                                          b058e3fcfb7b550041da16bf10d8837024c38bf6

                                                          SHA256

                                                          30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                                                          SHA512

                                                          f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

                                                        • C:\Users\Admin\AppData\Local\Temp\nsuC44B.tmp\nsis7z.dll

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          80e44ce4895304c6a3a831310fbf8cd0

                                                          SHA1

                                                          36bd49ae21c460be5753a904b4501f1abca53508

                                                          SHA256

                                                          b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

                                                          SHA512

                                                          c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

                                                        • C:\Users\Admin\AppData\Roaming\0ab92678-7e1c-4062-b3d8-1289a3bafb79.tmp

                                                          Filesize

                                                          874B

                                                          MD5

                                                          f8dcb630f8803e8d9f381cdd14b2dc4a

                                                          SHA1

                                                          0ca9f40fe44eba459f0d4fc2f67fbe4547e43fbc

                                                          SHA256

                                                          395f5c397659edd29a14714c32340f0a0385a6a193c79bb3087359d022d76b85

                                                          SHA512

                                                          cbcc5552b21e78cd0283da25629e366102671792e44bac3f4c6f24bf61d1ee0d961b2917bf6123df50e59cafb88c87ccf16a4ae68b55bb10a4f8af021bb06d9a

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                          Filesize

                                                          2B

                                                          MD5

                                                          f3b25701fe362ec84616a93a45ce9998

                                                          SHA1

                                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                          SHA256

                                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                          SHA512

                                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Code Cache\js\index-dir\the-real-index

                                                          Filesize

                                                          216B

                                                          MD5

                                                          405af810449acfd49e4f4bdf876b1367

                                                          SHA1

                                                          c955134a589f882c6020d5ed1c89058dbb4680b9

                                                          SHA256

                                                          c7e6ceb870178a58bb9e1e4276dab697daa4b1e8ffce91a4b5e56889a4b3c4c8

                                                          SHA512

                                                          4964dd35f1d9082582ae555d4568b7fb2fc90a54947e9fb0060bd493985f3788fa8ba7ce5f243c46af9f3e58d36326d5e8e53fc0ec0fc2d0b628ebeb516cf9ef

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Code Cache\js\index-dir\the-real-index~RFe5894c9.TMP

                                                          Filesize

                                                          48B

                                                          MD5

                                                          c6c03ff0ed395d36ab05e3c0a822ff6a

                                                          SHA1

                                                          f3abb8d2af7a99a172a7e19b2c750214969cd8bc

                                                          SHA256

                                                          23b087d2139273195e6d5201f24ed2666ef8ae161074dda1e8f6f4074bef6d91

                                                          SHA512

                                                          acabd81da2c8b5b384f21ce37dba4ad01e588277a7f409d6996667baba82f3f7e730da4ab3b3e3d3149e1e7d7afca96fd374eb16ed0fba47e7ff664fa63f6575

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT

                                                          Filesize

                                                          16B

                                                          MD5

                                                          46295cac801e5d4857d09837238a6394

                                                          SHA1

                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                          SHA256

                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                          SHA512

                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Network Persistent State

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          8bf8c5bbce234d5e3d21b2099b0eaf5c

                                                          SHA1

                                                          f4010e6acf9685dd2f456c37ed7fbcea261f2be5

                                                          SHA256

                                                          e0ddc7b4be136cde2bfa2e10a56698579b85fe3596f4c678a377a88a5ca22a0b

                                                          SHA512

                                                          df6e8850b9a1a740300e968c981ef9086f66b41fe924bca9784aac53413de7326650e4ea29a98b2f9145e03a898d2f57dad12c66718c7b91d6bf899b99fa0f44

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Network Persistent State~RFe590d25.TMP

                                                          Filesize

                                                          59B

                                                          MD5

                                                          2800881c775077e1c4b6e06bf4676de4

                                                          SHA1

                                                          2873631068c8b3b9495638c865915be822442c8b

                                                          SHA256

                                                          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                          SHA512

                                                          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Preferences

                                                          Filesize

                                                          86B

                                                          MD5

                                                          d11dedf80b85d8d9be3fec6bb292f64b

                                                          SHA1

                                                          aab8783454819cd66ddf7871e887abdba138aef3

                                                          SHA256

                                                          8029940de92ae596278912bbbd6387d65f4e849d3c136287a1233f525d189c67

                                                          SHA512

                                                          6b7ec1ca5189124e0d136f561ca7f12a4653633e2d9452d290e658dfe545acf6600cc9496794757a43f95c91705e9549ef681d4cc9e035738b03a18bdc2e25f0

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Preferences

                                                          Filesize

                                                          57B

                                                          MD5

                                                          58127c59cb9e1da127904c341d15372b

                                                          SHA1

                                                          62445484661d8036ce9788baeaba31d204e9a5fc

                                                          SHA256

                                                          be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                                                          SHA512

                                                          8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                          Filesize

                                                          26B

                                                          MD5

                                                          2892eee3e20e19a9ba77be6913508a54

                                                          SHA1

                                                          7c4ef82faa28393c739c517d706ac6919a8ffc49

                                                          SHA256

                                                          4f110831bb434c728a6895190323d159df6d531be8c4bb7109864eeb7c989ff2

                                                          SHA512

                                                          b13a336db33299ab3405e13811e3ed9e5a18542e5d835f2b7130a6ff4c22f74272002fc43e7d9f94ac3aa6a4d53518f87f25d90c29e0d286b6470667ea9336ae

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe583a45.TMP

                                                          Filesize

                                                          90B

                                                          MD5

                                                          139be5cdcb03cee9cc1304961dc9c734

                                                          SHA1

                                                          cdd814b500e11a11da8907840c403d46fd537bbe

                                                          SHA256

                                                          7e9a58afeb18716512f57d34c3032a0b6a928da66c6f67c04d982404e269748c

                                                          SHA512

                                                          7c325a674bdc0f5ff6c38d1048515fe59a46e368140b9a3224182391785f1048c486a4a54d0a5d97627c3712470ad033dcad4e0a9e0668f9053b99bf2ce25d86

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                          Filesize

                                                          360B

                                                          MD5

                                                          a68d7e60816ec3c7ba3cd5c39c527c63

                                                          SHA1

                                                          505fee6f64897dac8b4756f703c06ab7a10cb203

                                                          SHA256

                                                          a52026f9fedffd74d60582f07320d449a000b605c558d070aebb7a21118c1f86

                                                          SHA512

                                                          d33b0504835728678a2217462f0ade527d38f9b8d3b62bffde1bec5f0c6581c565d4a858b9bc714cdd1a2d07aacfd5f60bdaefcd6cab8846317b65767fd98bc4

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                          Filesize

                                                          358B

                                                          MD5

                                                          1f272d0cca801c107a0d5850883b5f73

                                                          SHA1

                                                          b6ab142016878852544660d6790041a1bd425ee8

                                                          SHA256

                                                          50239f5fa76442d9d0f4473af5bc44bea433f96def01acb55d0abf580e7d44b0

                                                          SHA512

                                                          d47252ccb8226c2e2ef9b7d77368384592e104ce18a3c3dc1c8c5f42521e8b377a60e2c88fb0b9fc0c802a6d879bfc99b4966212e805982e0a5dd8ee89084bf9

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\settings.json

                                                          Filesize

                                                          409B

                                                          MD5

                                                          02ceb1f30fd6ec12459e3482c7783638

                                                          SHA1

                                                          857a6065f2643ae025b11a1d9c7895e0ea3d0907

                                                          SHA256

                                                          0456410d1b98abb39a45a4e43d244d0480db0e864744d1cf25c2fa8c67ae579b

                                                          SHA512

                                                          13f4af65e9005721edb826cfcd83fd0fb59a96c02b989b1a7ea28585a180d8da8cab19968e560c005e778219c472d03adc7cc46beab895e1ef6b5be9b0af5a4c

                                                        • C:\Users\Admin\AppData\Roaming\RBXIDLE\shared_proto_db\metadata\MANIFEST-000001

                                                          Filesize

                                                          41B

                                                          MD5

                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                          SHA1

                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                          SHA256

                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                          SHA512

                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                        • C:\Users\Admin\AppData\Roaming\c1e89cc7-783a-4b17-9c54-cc77c062bf92.tmp

                                                          Filesize

                                                          874B

                                                          MD5

                                                          bc995d718cb2e2f2ff12477b9a1c8852

                                                          SHA1

                                                          34500786478a2372823e684e095271f838956e3e

                                                          SHA256

                                                          1cbbf04c4af91ed643a1b8ba94c3357351175144c6655b6ab848d8c4492d445c

                                                          SHA512

                                                          35546b2750ba91d4ce106a9654182d7cfbf6e89c5479ca4c200203d704a8e36694bec14cc290adcf019eab81c7b50985a6efa55a85c3408cef312dae1413f704

                                                        • memory/1176-984-0x00000275EDE80000-0x00000275EDEA2000-memory.dmp

                                                          Filesize

                                                          136KB

                                                        • memory/2224-1213-0x00000193205D0000-0x00000193205F4000-memory.dmp

                                                          Filesize

                                                          144KB

                                                        • memory/2224-1183-0x0000019320650000-0x00000193206C6000-memory.dmp

                                                          Filesize

                                                          472KB

                                                        • memory/2224-1211-0x00000193205D0000-0x00000193205FA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/4292-874-0x00007FF83BA70000-0x00007FF83BA71000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4656-1182-0x0000027EEC7A0000-0x0000027EEC7E4000-memory.dmp

                                                          Filesize

                                                          272KB

                                                        • memory/4820-1237-0x000001CD502B0000-0x000001CD509EF000-memory.dmp

                                                          Filesize

                                                          7.2MB

                                                        • memory/4820-977-0x00007FF83C0E0000-0x00007FF83C0E1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4820-976-0x00007FF83C6F0000-0x00007FF83C6F1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1404-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1393-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1391-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1392-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1406-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1405-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1401-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1403-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1402-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/6468-1400-0x0000015E95C00000-0x0000015E95C01000-memory.dmp

                                                          Filesize

                                                          4KB