Resubmissions

05-07-2024 16:54

240705-vesbwavapf 10

05-07-2024 16:49

240705-vb469ssamr 7

04-07-2024 16:17

240704-trmrgs1eja 10

04-07-2024 16:14

240704-tpl26syfqj 7

04-07-2024 16:11

240704-tmx2na1dne 10

Analysis

  • max time kernel
    83s
  • max time network
    88s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 16:11

General

  • Target

    https://gofile.io/d/SRT9tP

Malware Config

Extracted

Family

redline

Botnet

s6murai on telegram

C2

178.40.160.213:3333

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/SRT9tP
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2a3546f8,0x7ffb2a354708,0x7ffb2a354718
      2⤵
        PID:1856
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
        2⤵
          PID:4592
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
          2⤵
            PID:3596
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
            2⤵
              PID:2400
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:3064
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:1
                2⤵
                  PID:2092
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 /prefetch:8
                  2⤵
                    PID:1928
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3536
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                    2⤵
                      PID:2848
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                      2⤵
                        PID:1664
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:1
                        2⤵
                          PID:2028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                          2⤵
                            PID:2472
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                            2⤵
                              PID:4320
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5896 /prefetch:8
                              2⤵
                                PID:680
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                                2⤵
                                  PID:2328
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2216,11135382063807322531,18300634963877837891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4228
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3264
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2300
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:5324
                                    • C:\Program Files\7-Zip\7zG.exe
                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Redline Crack\" -ad -an -ai#7zMap8346:88:7zEvent11658
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:5980
                                    • C:\Windows\system32\NOTEPAD.EXE
                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline Crack\Redline Crack\ReadMe.txt
                                      1⤵
                                        PID:3184
                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe
                                        "C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Suspicious use of SetThreadContext
                                        PID:5472
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Unkown' -Value '"C:\Windows\system32\chome_exe\CraxSMS Beta test.exe"' -PropertyType 'String'
                                          2⤵
                                          • Adds Run key to start application
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5612
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          2⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5640
                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Kurome.Builder\Kurome.Builder.exe
                                        "C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Kurome.Builder\Kurome.Builder.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5816

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        dabfafd78687947a9de64dd5b776d25f

                                        SHA1

                                        16084c74980dbad713f9d332091985808b436dea

                                        SHA256

                                        c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201

                                        SHA512

                                        dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        c39b3aa574c0c938c80eb263bb450311

                                        SHA1

                                        f4d11275b63f4f906be7a55ec6ca050c62c18c88

                                        SHA256

                                        66f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c

                                        SHA512

                                        eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        288B

                                        MD5

                                        54ba6c64fb44b2d4e2a74db648413514

                                        SHA1

                                        6b7eb570e6eba10a0b665c0c5073485df1c50f32

                                        SHA256

                                        58dd4e62800f25ff7511297024cf5e9ee8e59a2406e69c17ef17d4b5aa8ef6e7

                                        SHA512

                                        86c8666c8f07bdfd6fcfaf5ce550e2e39b3e2b654c99d6fa7cebf7eec48017699b1237ee911b564daa715ec681476a5c70ecf71c431d2d69a320a2cf63a40f8c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        317B

                                        MD5

                                        afc6cddd7e64d81e52b729d09f227107

                                        SHA1

                                        ad0d3740f4b66de83db8862911c07dc91928d2f6

                                        SHA256

                                        b5e81a7c7d80feaaa10ee7bc8aaef9f21a5c1e4b03b3823ed115022311d674a0

                                        SHA512

                                        844edb69585153c378a7c97709983776fc9303a32fb5ef8122ecca32adfc0b265f5ef7118ee07814da5c020ac7ba1bf2a2f66d46312e4d8e6df99aab2e5f9b2a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        5ba00dfa556c7f7f238bc0d497baa53a

                                        SHA1

                                        00a4d1a58ad78ba6628a5a8a6b63c5b2c8a48ed9

                                        SHA256

                                        c75e65ae35373aa74ee6c1f4a7f4e1d37812ce2e234a8b53208e3844b02cdeb5

                                        SHA512

                                        68f153eed8f7482413d5293267f08fbce92cb6c32fb12cd59a1dc7306879373a09eb41dd1c1f30616b426a05a2182bc4c07dad7fb33f9e2b724ee1342e4db02c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        14e3b0bcdfa32ae9672be924aed39592

                                        SHA1

                                        9dac860782f5f4da3c023652aad3c68be82183ab

                                        SHA256

                                        c217325db812d6983e058e7b8cfe2f7c425281525615368f7ff3569114877920

                                        SHA512

                                        812d807ef049b247ddf4a485020c775bca80ce36a3da5f664e746a0674ca808378c990e80b6ff5e0168363e64caf67402fba649a359eaa19a09d3008933e2e74

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        fd9f092aef4871acd724dae4ac37df3e

                                        SHA1

                                        f3d9e842e2d158bdf4e72c93c5f91ed3cdb92bb0

                                        SHA256

                                        7287fe7f70e3320e878dfff931300b4c8d651f4e10f9302dbb28bb4bde4c685f

                                        SHA512

                                        3161a4824e7b7f85c26546614e0ab94fddf2438982b0877b6e705afda7eeb00f4de409afa71bb7ee767b0343576ff88913b0dbed17284a3805e800ff7acfd83b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        7598814716f0506046353691a88cba21

                                        SHA1

                                        9d5ece1abac9ade85a0c4a4d7431b74714d77de8

                                        SHA256

                                        fbcfb951db2ea9bf113369ae3c572ab307d0e6ee6ce2a981563648a08676506d

                                        SHA512

                                        65fc72a74277ed0c3a47d6fdbb088ef16c146c0a31b314e3f7dad492257f7812865b9c235649091b3bbb186c8797f23902fa0b7945d1f38cfee3b3ca16ead19e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        2ededa91299c27dec8d65f98b0f535ef

                                        SHA1

                                        ffeab860d1bad6e3e607992c5f15693679f74353

                                        SHA256

                                        106aa7d0cf8f5fe7988edbf13cb9da50bd869fcb55f3125b625f5b9ec885cc41

                                        SHA512

                                        c97138c5841a62e6eb833d037494b1a49837a2fbd6d7a82c806c55395c43b4d355de1f34230868e943d9ce2e44c5eda42115dc0eb61313d12424b83650acd43b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        db4dee93bf1eb7f2987e2d970366549a

                                        SHA1

                                        9ff65333a80d7fa4615f1197c83aa1570d3d54c8

                                        SHA256

                                        50047f9d43ad605b6b5ded1c1c10a8645180eb877f4ef53c096f36776f61341b

                                        SHA512

                                        313301e92a74d6fe615bcde48c0e4af1efaa511e9d79658cd107aa8ff6ba42e7853c2b268f94c4e867df8d446ae8e71c20d865bdbb250b55004cc89b18cd4a67

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        024b45ab50085cfbb7bd6746f7bc4c30

                                        SHA1

                                        8d2b4932a7bc34fbd97a06441fbdca772c9d0c12

                                        SHA256

                                        cbe5563e4917271e1f7a6a85dc320d18a26ee5e9b0156f712ed1939ef0d25a6a

                                        SHA512

                                        f4dd53e336505f0c0257aef093271b12620240ff5f5a9efdc4a70fd2ea888b3f891e028dc7784e0389e2325a15e798f0b2177b5f83a098c2ec1cc38aece83b46

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z5mmx2xl.kmm.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\Downloads\Redline Crack.rar

                                        Filesize

                                        8.1MB

                                        MD5

                                        074ab00a6884e6ae21bd0ec676484c84

                                        SHA1

                                        2ae50e1fe181a80467f5aaca6978857381599e15

                                        SHA256

                                        4e33bacb99e5faef2d9d99dc712dd0b6b053414fafa29a83905e6ccb2afc2eb7

                                        SHA512

                                        13bd0745f497749038e032de2735ffff2f879c1eed69a83416c785c1435a4cd3de4e239603b5085eb2ba910fba67a4d5fe1182de5730d1fcd13d1d6b0a3ef129

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Kurome.Builder\Kurome.Builder.exe

                                        Filesize

                                        137KB

                                        MD5

                                        cf38a4bde3fe5456dcaf2b28d3bfb709

                                        SHA1

                                        711518af5fa13f921f3273935510627280730543

                                        SHA256

                                        c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

                                        SHA512

                                        3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Kurome.Builder\Kurome.Builder.exe.config

                                        Filesize

                                        189B

                                        MD5

                                        5a7f52d69e6fca128023469ae760c6d5

                                        SHA1

                                        9d7f75734a533615042f510934402c035ac492f7

                                        SHA256

                                        498c7f8e872f9cef0cf04f7d290cf3804c82a007202c9b484128c94d03040fd0

                                        SHA512

                                        4dc8ae80ae9e61d2801441b6928a85dcf9d6d73656d064ffbc0ce9ee3ad531bfb140e9f802e39da2a83af6de606b115e5ccd3da35d9078b413b1d1846cbd1b4f

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Kurome.Builder\Mono.Cecil.dll

                                        Filesize

                                        350KB

                                        MD5

                                        de69bb29d6a9dfb615a90df3580d63b1

                                        SHA1

                                        74446b4dcc146ce61e5216bf7efac186adf7849b

                                        SHA256

                                        f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                        SHA512

                                        6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe

                                        Filesize

                                        181KB

                                        MD5

                                        d12407c805a128099e2ae7929ec81030

                                        SHA1

                                        d5de8f0adff0d33780d1307ddbaa08c210b21432

                                        SHA256

                                        74e5079e7eb3e39ecf0f0d2d48a119770100bfd44f7f776a12ec0c25ed5936b8

                                        SHA512

                                        bc67efe96ef236eec83dbfd6b5258f79c2e99e1454132f75e399fdcede06f4468e355d263c06c507f47dc0c7273b87e99fd142a1f6841d9c56ef318908f8bef1

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\Panel\RedLine_20_2\Panel\Panel.exe.config

                                        Filesize

                                        26KB

                                        MD5

                                        494890d393a5a8c54771186a87b0265e

                                        SHA1

                                        162fa5909c1c3f84d34bda5d3370a957fe58c9c8

                                        SHA256

                                        f2a5a06359713226aeacfe239eeb8ae8606f4588d8e58a19947c3a190efbdfc7

                                        SHA512

                                        40fbd033f288fee074fc36e899796efb30d3c582784b834fc583706f19a0b8d5a134c6d1405afe563d2676072e4eefc4e169b2087867cab77a3fa1aa1a7c9395

                                      • C:\Users\Admin\Downloads\Redline Crack\Redline Crack\ReadMe.txt

                                        Filesize

                                        401B

                                        MD5

                                        0e9ea2262b11db9e8c1656c949da4495

                                        SHA1

                                        f332749e10817048cea5e1584edf5e88f47024eb

                                        SHA256

                                        ad8361226621c8261d69e1202e7f9831a00f3bb6549d77219d5deb0e8a6cbde6

                                        SHA512

                                        00aae0c559823ff27ca8af431d24d4fe8a3f4683b0d776a80fb14a96d82030cedf6ec1ddf2efd7fc229e2c2b3ab3ac0b15326dc1912cdd07932ec7ff8f80975c

                                      • memory/5472-292-0x00000000058E0000-0x00000000058FE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/5472-291-0x0000000005770000-0x0000000005792000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/5472-290-0x0000000005840000-0x00000000058B6000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/5472-286-0x0000000000B90000-0x0000000000BC4000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/5472-289-0x00000000055D0000-0x00000000055DA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/5472-288-0x00000000055E0000-0x0000000005672000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/5472-287-0x0000000005AF0000-0x0000000006094000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/5612-300-0x0000000005D10000-0x0000000005D32000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/5612-297-0x0000000005660000-0x0000000005C88000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/5612-317-0x0000000007480000-0x0000000007516000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/5612-307-0x0000000005DB0000-0x0000000005E16000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/5612-296-0x0000000004ED0000-0x0000000004F06000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/5612-308-0x0000000005E90000-0x0000000005EF6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/5612-319-0x00000000069E0000-0x0000000006A02000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/5612-314-0x0000000006000000-0x0000000006354000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/5612-315-0x00000000064A0000-0x00000000064BE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/5612-318-0x0000000006990000-0x00000000069AA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/5640-299-0x0000000005480000-0x0000000005492000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/5640-316-0x00000000057C0000-0x00000000058CA000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/5640-313-0x0000000005560000-0x00000000055AC000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/5640-301-0x0000000005520000-0x000000000555C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/5640-298-0x0000000005AA0000-0x00000000060B8000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/5640-294-0x0000000000400000-0x000000000041E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/5816-325-0x0000000000870000-0x0000000000898000-memory.dmp

                                        Filesize

                                        160KB

                                      • memory/5816-329-0x0000000006820000-0x000000000687E000-memory.dmp

                                        Filesize

                                        376KB