Resubmissions

29-07-2024 20:26

240729-y71eqstbme 10

17-07-2024 12:19

240717-pg6dmazgjq 10

05-07-2024 16:51

240705-vc87lssapk 10

05-07-2024 14:28

240705-rs3g8azeln 1

05-07-2024 14:22

240705-rp3c2ssdmf 7

05-07-2024 11:39

240705-nsb4gszfja 10

05-07-2024 11:30

240705-nl4vxsxdrk 10

Analysis

  • max time kernel
    843s
  • max time network
    844s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 11:39

General

  • Target

    https://github.com/RZM-CRACK-TEAM/RedLine-CRACK?tab=readme-ov-file

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

127.0.0.1:1337

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 42 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • DCRat payload 30 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Loads dropped DLL 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 42 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/RZM-CRACK-TEAM/RedLine-CRACK?tab=readme-ov-file
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88e1446f8,0x7ff88e144708,0x7ff88e144718
      2⤵
        PID:3216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
        2⤵
          PID:5092
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1452
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:8
          2⤵
            PID:5044
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4764
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
              2⤵
                PID:4212
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                2⤵
                  PID:2616
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2416
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5028 /prefetch:8
                  2⤵
                    PID:2548
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                    2⤵
                      PID:732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                      2⤵
                        PID:464
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                        2⤵
                          PID:2172
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                          2⤵
                            PID:3776
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:1
                            2⤵
                              PID:1764
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5140
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3008 /prefetch:1
                              2⤵
                                PID:3520
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:1
                                2⤵
                                  PID:6092
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:1
                                  2⤵
                                    PID:4556
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:1
                                    2⤵
                                      PID:5020
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:1
                                      2⤵
                                        PID:5740
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                        2⤵
                                          PID:3732
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7044 /prefetch:1
                                          2⤵
                                            PID:4480
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:1
                                            2⤵
                                              PID:4776
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6496 /prefetch:1
                                              2⤵
                                                PID:5608
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:1
                                                2⤵
                                                  PID:5580
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6992 /prefetch:1
                                                  2⤵
                                                    PID:3932
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1340 /prefetch:1
                                                    2⤵
                                                      PID:4488
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1
                                                      2⤵
                                                        PID:2188
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1840 /prefetch:8
                                                        2⤵
                                                          PID:5372
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=1344 /prefetch:8
                                                          2⤵
                                                          • Modifies registry class
                                                          PID:2692
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                                                          2⤵
                                                            PID:1328
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:1
                                                            2⤵
                                                              PID:2116
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:1
                                                              2⤵
                                                                PID:1076
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5760 /prefetch:8
                                                                2⤵
                                                                  PID:5220
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                                                                  2⤵
                                                                    PID:3208
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:1
                                                                    2⤵
                                                                      PID:4872
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=printing.mojom.PrintCompositor --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --service-sandbox-type=print_compositor --mojo-platform-channel-handle=6164 /prefetch:8
                                                                      2⤵
                                                                        PID:2868
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5500 /prefetch:6
                                                                        2⤵
                                                                          PID:1048
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:1
                                                                          2⤵
                                                                            PID:5172
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7128 /prefetch:1
                                                                            2⤵
                                                                              PID:4560
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:1
                                                                              2⤵
                                                                                PID:516
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15691271120837051616,1596567533646456509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:1
                                                                                2⤵
                                                                                  PID:4496
                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                1⤵
                                                                                  PID:4900
                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                  1⤵
                                                                                    PID:908
                                                                                  • C:\Windows\System32\rundll32.exe
                                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                    1⤵
                                                                                      PID:3240
                                                                                    • C:\Program Files\7-Zip\7zG.exe
                                                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Redline-crack-by-rzt\" -ad -an -ai#7zMap5684:102:7zEvent10784
                                                                                      1⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      PID:1244
                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe
                                                                                      "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe"
                                                                                      1⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in Windows directory
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3136
                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe
                                                                                      "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe"
                                                                                      1⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:1912
                                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ.txt
                                                                                      1⤵
                                                                                        PID:3740
                                                                                      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                                        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ (English).docx" /o ""
                                                                                        1⤵
                                                                                        • Checks processor information in registry
                                                                                        • Enumerates system info in registry
                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:3836
                                                                                      • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe
                                                                                        "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe"
                                                                                        1⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:5212
                                                                                        • C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe"
                                                                                          2⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • Drops file in Program Files directory
                                                                                          • Drops file in Windows directory
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:5556
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ctqENoUWTa.bat"
                                                                                            3⤵
                                                                                              PID:4008
                                                                                              • C:\Windows\SysWOW64\w32tm.exe
                                                                                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                4⤵
                                                                                                  PID:5224
                                                                                                  • C:\Windows\system32\w32tm.exe
                                                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                    5⤵
                                                                                                      PID:856
                                                                                                  • C:\Program Files (x86)\Google\CrashReports\System.exe
                                                                                                    "C:\Program Files (x86)\Google\CrashReports\System.exe"
                                                                                                    4⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:5752
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\Panel.exe"
                                                                                                2⤵
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:5620
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "--monitor"
                                                                                                  3⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:6044
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAYmMvkocoGUaSpLYbxX0+jwAAAAACAAAAAAAQZgAAAAEAACAAAABrirtW7G8nD8IWGy3JXTkcRzqTqaP/8O1xthyg0J43qgAAAAAOgAAAAAIAACAAAADIAotTjulWH/Kq7sn3DEom7FD/urUCnQtCe9f6UxhugRAAAAA9o0qVm8/v7Yo2FrFlLKFqQAAAAMsGEDWNmo9RXgc6smv6/ZqBCkzU8WewplKqMHomhXKwB7Zc68pV0v72+f03WtBnAgPCgDKWkCBCTeSIBLiCUaE=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAYmMvkocoGUaSpLYbxX0+jwAAAAACAAAAAAAQZgAAAAEAACAAAADI4DXUHNAp1J85kHQW88qOk84xY80GEfEuAx4j0ST2iQAAAAAOgAAAAAIAACAAAAAexzEdXj9xoJtNuRUU5Lvj+9uULqrno1RCdaWlKNIMUhAAAABLG7Zg97vhGgfgs/H2j1UZQAAAAHPxyOVBIzo56p0n91z7zZSeKMIyoj7trTS9W2usSpA7v/pxvgefO8d5faDCH27sFb1WajudulYOafJpfLpG/Ck="
                                                                                                    4⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5912
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAYmMvkocoGUaSpLYbxX0+jwAAAAACAAAAAAAQZgAAAAEAACAAAABrirtW7G8nD8IWGy3JXTkcRzqTqaP/8O1xthyg0J43qgAAAAAOgAAAAAIAACAAAADIAotTjulWH/Kq7sn3DEom7FD/urUCnQtCe9f6UxhugRAAAAA9o0qVm8/v7Yo2FrFlLKFqQAAAAMsGEDWNmo9RXgc6smv6/ZqBCkzU8WewplKqMHomhXKwB7Zc68pV0v72+f03WtBnAgPCgDKWkCBCTeSIBLiCUaE=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAYmMvkocoGUaSpLYbxX0+jwAAAAACAAAAAAAQZgAAAAEAACAAAADI4DXUHNAp1J85kHQW88qOk84xY80GEfEuAx4j0ST2iQAAAAAOgAAAAAIAACAAAAAexzEdXj9xoJtNuRUU5Lvj+9uULqrno1RCdaWlKNIMUhAAAABLG7Zg97vhGgfgs/H2j1UZQAAAAHPxyOVBIzo56p0n91z7zZSeKMIyoj7trTS9W2usSpA7v/pxvgefO8d5faDCH27sFb1WajudulYOafJpfLpG/Ck=" "--monitor"
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:5492
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.HostK" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:6084
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.Host" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:6120
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.HostK" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:6140
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dwm.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5276
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5224
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\dwm.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5196
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SearchApp.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5148
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SearchApp.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1964
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Photo Viewer\it-IT\SearchApp.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5136
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Windows\twain_32\SearchApp.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4484
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\twain_32\SearchApp.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3796
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Windows\twain_32\SearchApp.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4520
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Templates\spoolsv.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1156
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Default\Templates\spoolsv.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:868
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Templates\spoolsv.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4940
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Windows\es-ES\sihost.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4592
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\es-ES\sihost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1580
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Windows\es-ES\sihost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4500
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:224
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1104
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\explorer.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:464
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.LoaderK" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\ssh\Kurome.Loader.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4044
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.Loader" /sc ONLOGON /tr "'C:\Users\All Users\ssh\Kurome.Loader.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:2324
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "Kurome.LoaderK" /sc MINUTE /mo 9 /tr "'C:\Users\All Users\ssh\Kurome.Loader.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5164
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\CrashReports\System.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3768
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\CrashReports\System.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:432
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\CrashReports\System.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:2400
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\TextInputHost.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3712
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3240
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:3488
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1796
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1420
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\csrss.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:6036
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 8 /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_64\msedge.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4416
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_64\msedge.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5816
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\Windows\assembly\NativeImages_v4.0.30319_64\msedge.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5612
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\csrss.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5476
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\Templates\csrss.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1968
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\Templates\csrss.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4964
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Multimedia Platform\dllhost.exe'" /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:928
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5860
                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Multimedia Platform\dllhost.exe'" /rl HIGHEST /f
                                                                                              1⤵
                                                                                              • Process spawned unexpected child process
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5372
                                                                                            • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe
                                                                                              "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:1440
                                                                                            • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe
                                                                                              "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              PID:2740
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              "C:\Windows\system32\cmd.exe"
                                                                                              1⤵
                                                                                                PID:5240
                                                                                                • C:\Windows\system32\ipconfig.exe
                                                                                                  ipconfig
                                                                                                  2⤵
                                                                                                  • Gathers network information
                                                                                                  PID:3524
                                                                                              • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe
                                                                                                "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                PID:5700
                                                                                              • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe
                                                                                                "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                PID:4224
                                                                                              • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe
                                                                                                "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                PID:116
                                                                                              • C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe
                                                                                                "C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4784
                                                                                              • C:\Users\Admin\Templates\csrss.exe
                                                                                                C:\Users\Admin\Templates\csrss.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2512
                                                                                              • C:\Windows\assembly\NativeImages_v4.0.30319_64\msedge.exe
                                                                                                C:\Windows\assembly\NativeImages_v4.0.30319_64\msedge.exe
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4888
                                                                                              • C:\Program Files\Windows Multimedia Platform\dllhost.exe
                                                                                                "C:\Program Files\Windows Multimedia Platform\dllhost.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2120
                                                                                              • C:\Users\All Users\ssh\Kurome.Loader.exe
                                                                                                "C:\Users\All Users\ssh\Kurome.Loader.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4872
                                                                                              • C:\Users\Default User\dwm.exe
                                                                                                "C:\Users\Default User\dwm.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2432
                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\ReadMe.txt
                                                                                                1⤵
                                                                                                  PID:4440
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                                  1⤵
                                                                                                    PID:5676
                                                                                                  • C:\Windows\twain_32\SearchApp.exe
                                                                                                    C:\Windows\twain_32\SearchApp.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2508
                                                                                                  • C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe
                                                                                                    "C:\Program Files (x86)\Windows NT\TableTextService\en-US\Kurome.Host.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:5528
                                                                                                  • C:\Program Files (x86)\Google\CrashReports\System.exe
                                                                                                    "C:\Program Files (x86)\Google\CrashReports\System.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:432
                                                                                                  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                                                    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ (English).docx" /o ""
                                                                                                    1⤵
                                                                                                    • Checks processor information in registry
                                                                                                    • Enumerates system info in registry
                                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3316
                                                                                                  • C:\Users\Admin\Templates\csrss.exe
                                                                                                    C:\Users\Admin\Templates\csrss.exe
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:6132
                                                                                                  • C:\Users\Default User\TextInputHost.exe
                                                                                                    "C:\Users\Default User\TextInputHost.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3696

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Panel.exe.log

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    cd48530bd8e623c8c70e28bcce887e80

                                                                                                    SHA1

                                                                                                    578b96fc5a0917250331db16f6625eb17d2c3409

                                                                                                    SHA256

                                                                                                    1c051ac06c180e5b6e00291e6d489e5169de770a5662206357b37869cd427974

                                                                                                    SHA512

                                                                                                    9bbd097ee6f05a648a8033818ffe43fab65a69842e7dce0c221914e0e0d2e7630ced1591ffbe9059e183d56f1ac10a7f61fe9eb15f3cc90d4cd172ead3055a94

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\msedge.exe.log

                                                                                                    Filesize

                                                                                                    484B

                                                                                                    MD5

                                                                                                    49bddeedfc82481ba9d2c17cfce37675

                                                                                                    SHA1

                                                                                                    5a45bfedf3a990883bfc1a1fa2affbe5db94b6fb

                                                                                                    SHA256

                                                                                                    ab656bebc4d9c75956304be395323a41c282c748ae8e8ab2e46e0031f1cb8578

                                                                                                    SHA512

                                                                                                    9fa56622319d5e6fccacb2b7f5c5bda48a871e282b6d488822dd8e8349288626d6cc5960eb891df2a6268e67daac3c88e2d4bee450b4981d56789799551c6a24

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    b6c11a2e74ef272858b9bcac8f5ebf97

                                                                                                    SHA1

                                                                                                    2a06945314ebaa78f3ede1ff2b79f7357c3cb36b

                                                                                                    SHA256

                                                                                                    f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777

                                                                                                    SHA512

                                                                                                    d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                    Filesize

                                                                                                    152B

                                                                                                    MD5

                                                                                                    9abb787f6c5a61faf4408f694e89b50e

                                                                                                    SHA1

                                                                                                    914247144868a2ff909207305255ab9bbca33d7e

                                                                                                    SHA256

                                                                                                    ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07

                                                                                                    SHA512

                                                                                                    0f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0a0003ad-d869-4fb9-9c13-85e64f1ebdf6.tmp

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    08b7f6f1536ff8792e15203393b54b4f

                                                                                                    SHA1

                                                                                                    bcd8fcc49752252fcac61c99ef73be1a214786c1

                                                                                                    SHA256

                                                                                                    8c6f4d4d23201f98f25541a5a9e485bef7ab98d3751ae57ed28170eafea9b68e

                                                                                                    SHA512

                                                                                                    65cc1b26250b554a10b3a7f3ad68ad3aef0b56084740d45868c3e5307e21fd4730cea59fe4f3af508e8722cde9dc3e2a4929377a7683b9f2685254298f1e2ee6

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    aec66ef6281850b21f1025b16be7be41

                                                                                                    SHA1

                                                                                                    1a251529f129468e9910491cd203094b8b40f4b1

                                                                                                    SHA256

                                                                                                    5a28207f39cf834e782cd238c6e54c45f2dd3c0f49052d3dee0c39bf60645315

                                                                                                    SHA512

                                                                                                    51197d0ba11a09b2e5d56abe5cf3aac015f9778e2be994c39c32d9ffb448ae7492e421c1d2fe32818ed5b0ff4698a0c9365541cb95aa88502e7c620c9dc18d28

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    dc54f80c237b26f66b83425d73bc8d1c

                                                                                                    SHA1

                                                                                                    8cbd4e023576b9ba5b195dec797ba03ec46633b3

                                                                                                    SHA256

                                                                                                    8ada6923e3c7dd760ded2ca2fb488a5044126ec52a4e8bd662f091ee6d2cc5b8

                                                                                                    SHA512

                                                                                                    710b5cc43200cd8ce447b5941f327e7c007c69d7879b79fea0c456bcf32589c86f45708104ec1de7cd2eb4cd69e717444ddcfe9862d0938a44e22c758a5b1e25

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    be2301b7e2703bcab9502df4e0ba6ac1

                                                                                                    SHA1

                                                                                                    6ae9873c76c229cbbd0eb52bcd388996248d99fb

                                                                                                    SHA256

                                                                                                    80c60b23093c199ad6ec7f572c3c22cc8da58f105cf8c4ba550ebdc2965da60f

                                                                                                    SHA512

                                                                                                    65370daac445f5692cdad26dcb66371a340def2763b1b863be4f5f7b02f667145ac889b8d1ca1058c1e3013934305c55a4595bde3ac477c4e55220f9efda2b2b

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    c999d99e5cd26b130e4da4573fbf97db

                                                                                                    SHA1

                                                                                                    826d783bce700edaf672c5934d677bb50f3091a5

                                                                                                    SHA256

                                                                                                    98c5d5acfbe027f855fd3d69dc0c3ef3802a87fb71e954da7a9dc4f3af4c99a3

                                                                                                    SHA512

                                                                                                    d8489830140d51b18afd39624fe7b7e408a1ae0b619d4399dbe8a39eb62c2d446c920d557f1f2448152cadb74b2e54dec0a34fc0e0f44a8d521bcecb963a676c

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                    Filesize

                                                                                                    740B

                                                                                                    MD5

                                                                                                    4ab13236254f9d18037af9870c1f3db7

                                                                                                    SHA1

                                                                                                    20ac43d6fe805da6aa728b9fcf656fadce285b0d

                                                                                                    SHA256

                                                                                                    098485e6c1fd27cd216a1708583ccc911e4b0313eddd123176e0286789999fbc

                                                                                                    SHA512

                                                                                                    0c922249d492ab594b8640c1f277527b952f854ae26150c4fe197439402671c79b6aeadb421b0f1b46719fc9f4277abd3c231d7020b9a7146276990b42b8cebd

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                    Filesize

                                                                                                    670B

                                                                                                    MD5

                                                                                                    c2f4105e08b7168fc2ae97caa0469cc9

                                                                                                    SHA1

                                                                                                    ac354f7f6f1daf7208d7e6f5c56bf55b1caf16db

                                                                                                    SHA256

                                                                                                    b2580b9167d9398cc05f931ed47fdb0a67a3ec98594bd235313c10280c3d5759

                                                                                                    SHA512

                                                                                                    00c6ec47e6e3a67c39fcbbda308bc55ac3459163819de2db031e1e7a494cc863399028f780bf05453773cb0f8be5682aa65ce5982d7aa47a26009ea77059b0d4

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                    Filesize

                                                                                                    3KB

                                                                                                    MD5

                                                                                                    0a6f0f44bbf7891586d68bf3e2996290

                                                                                                    SHA1

                                                                                                    5368a79062c7d2ef4a27ec7404e8e27d527c7c83

                                                                                                    SHA256

                                                                                                    607e02934f72e9944b130ba598115b139d8660a3201df4c0a3b648ac9c289895

                                                                                                    SHA512

                                                                                                    19a4b562a86245451d66d7533c26c7eec9db4d462acceca26b66fda22ca6b7c0f0628470d331b8f63a7e4a131a3f79c474ac631a60c11cb188df6717d5235874

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    04bea4573850b48d9403b895b8910c5c

                                                                                                    SHA1

                                                                                                    13fd526ce8dc17540ae5524bedf177204b3e57f6

                                                                                                    SHA256

                                                                                                    4e311ba04dbfc27ed80bec8d1db18120ddf372384a1776bedd2f3f294fa0ab9c

                                                                                                    SHA512

                                                                                                    9f5d0d0caefe6e057028d95719f378225b3496b0ba87c479c7463e114fd19d57ab67a75daee954bf46b9067fe15c7631d944947134bb7f072c587cdcb0317c63

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    ee7e28ca3024d78a22d840db9567d8f0

                                                                                                    SHA1

                                                                                                    c49a15da0caf53d9d969d8e91f3861f7b0078bd3

                                                                                                    SHA256

                                                                                                    2dc7d426196620a84ea1dad6d7c264cccde9d119ac051584160377d982582fe7

                                                                                                    SHA512

                                                                                                    118d7e64bffa224e6740bedffe64e2937916d84fec0cd2f8658b69e479a9961aaee5f8ac931cc815ac07813099fcd00555d3b298e65c1be3acc4bd5c9cc4568e

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    7KB

                                                                                                    MD5

                                                                                                    db9610f761d3823915b231abbaa5c142

                                                                                                    SHA1

                                                                                                    f194a0df71f97c124f9f63fd5a36a31c1b8c7525

                                                                                                    SHA256

                                                                                                    f3879d877d75eef315f23acecb2ee900dd33a0841cb6ea43bb90429e1ea4ee48

                                                                                                    SHA512

                                                                                                    274910d2ea07e7eb08e8cc7bd85503fc85fb803267a0efe954944682e9dcfee213af292a5d022dc4f536c8681ccf2ebdbb188bd7aacb91e24e8e87b1eb147361

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    f89e7c99bf1ea531df05e0190efa056f

                                                                                                    SHA1

                                                                                                    6f4098e53c6e80953c99bc4939cdfcfaf92d922f

                                                                                                    SHA256

                                                                                                    05f4b438dd94195bad5eb4c81b466d4373cec3e482798be8b6bc1252cb08966a

                                                                                                    SHA512

                                                                                                    d0a017154b9abd4bb55e34f4bfa3fb50dee9b6493cc933c90b0f5dbb4475fe70a15f04144f200b71e77275403a333363432205d75577138fe15253da83c16eb0

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    9cb96ded727837d01ed165a058938743

                                                                                                    SHA1

                                                                                                    af618124ab451c84fedbe6c2b95b48fe855ff161

                                                                                                    SHA256

                                                                                                    13d9dba9ee87f083db3082a48d51d8a2d33901fafb56ec570576a015056cab31

                                                                                                    SHA512

                                                                                                    ed73be70f6cbc275e27595926824a7b6fcb988300f195307b99af4ad9cb266a0089a9fac35471f11cb7c3f3bd5a849cbcd99da5f74f0088676271cca26900d65

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    6f939a52cebc5d9c45451c233e602860

                                                                                                    SHA1

                                                                                                    76dd66976d30c8c9b21b4d83bad1a07debb4939b

                                                                                                    SHA256

                                                                                                    c63ef6721255d394f15aeecd4aed52c32cb4146500c0707fd3dff51698c493b6

                                                                                                    SHA512

                                                                                                    cf4a103fde663cbb1db1b7fa5c14ba4e01459a61df89af3d1ad440667c1c2a76c1165b179782ce590d30b2924c04583d949572de3bb930f959c753e91910cf96

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    8KB

                                                                                                    MD5

                                                                                                    438aa18c43d5ca2962ec43a4bd39b34d

                                                                                                    SHA1

                                                                                                    9bdddf055b8fa2e9d0cff462ffbd9470a4d7924e

                                                                                                    SHA256

                                                                                                    fd7dcbbff29369c51469495af0bfd0c0ac8a8c78e76212ecfe0f041dc84dfd79

                                                                                                    SHA512

                                                                                                    8ed91cfaa773611beb55f005c5c76d4187034b17e6794c68b1f417a874aee878b3d5df17b6e1d215abf708f7682617d210f4e901b7b0bdb7b57ac32237a109fe

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                    Filesize

                                                                                                    6KB

                                                                                                    MD5

                                                                                                    585ccb01cc81fdae46d56f524d4735f5

                                                                                                    SHA1

                                                                                                    10c192e9e5989bb956308dcdaa5beef9f238b4a9

                                                                                                    SHA256

                                                                                                    db6a3b1a166fb4c774374e46a3ff487a0e94a15211285ab2cd9acff741e4f2e0

                                                                                                    SHA512

                                                                                                    47fc28262d628c307b93c643e5842775aacdf9b3b1b22346f245e396af79a125cbd1d48d529a78c167ccb412e6f93f8e9a0f0023f02d5d1856ec8dfd1c7bccc3

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    4514c9e43fab12a99a4dddb295c00143

                                                                                                    SHA1

                                                                                                    9d2d1a918e8e0f1eb8b80c253b03039e6917fd94

                                                                                                    SHA256

                                                                                                    1e786bd2df790963450bafc95bf8d2e45595694aa197b462fdbe06cd4083cf5f

                                                                                                    SHA512

                                                                                                    293219721218629fb0be19fec582db65007dc351e87e05e0dc4a9a59555d7e1f73d5342970c8abbe459db81efc648f17ede33b4ce81578347adcb31da826b94e

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    5255b45d0770356c056aab5fd52b577f

                                                                                                    SHA1

                                                                                                    c62ce9309674e00fd5e3ca4289c823ee3c408ad3

                                                                                                    SHA256

                                                                                                    0aa86e4216d0273be5b723a069a03879ee83756c96de7055af950a85d9bf656a

                                                                                                    SHA512

                                                                                                    d409630c601d0736bcae4c2df3d79c58c1ee4e068e7d7e2a754e03be6ccfae19c14b33098d91f408402ccf7d2d8f97f861a907aa6e1e42b68cb6f5d881543bfc

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5c7249.TMP

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    6122bbd29e1c052686293ea33f88e303

                                                                                                    SHA1

                                                                                                    afe1928885b03ba66b4f32aa0e19c94490377f59

                                                                                                    SHA256

                                                                                                    8122fd4e547fd1a2f730b968481bf0fa4406b77b46257fe51ebe8708e0100de9

                                                                                                    SHA512

                                                                                                    614de2416d69983fc08fe9450937bb31016165bfd5ec263ce28bbdd1d5b710eb654616de59b8b3e8c85e626a955a43f5a71fd65bab5f73ef710d6df070b2ba5a

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\547043ee-97f5-47f7-9144-12e87f967ea2\0

                                                                                                    Filesize

                                                                                                    16.7MB

                                                                                                    MD5

                                                                                                    4a47f956d4e5b86c3a6721a3e4189071

                                                                                                    SHA1

                                                                                                    434fcc846c0b2aed6e71b96b4a22df0739e29356

                                                                                                    SHA256

                                                                                                    ddd595420854f182eadbaeb91f9e2541a20fb431b67f3bbd062e1220b817c43e

                                                                                                    SHA512

                                                                                                    7c51c70d299c9578d11fd4177a0bb17bffa30287c6ae2d9f26d82b726cfde46c32cce2be620d6128c6a6790b1e5f06176c552274239186fd17f5280fd6f1659f

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                    SHA1

                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                    SHA256

                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                    SHA512

                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    206702161f94c5cd39fadd03f4014d98

                                                                                                    SHA1

                                                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                    SHA256

                                                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                    SHA512

                                                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    12KB

                                                                                                    MD5

                                                                                                    431c6790db5b9eb5495405e1d3117f4d

                                                                                                    SHA1

                                                                                                    11be1c5c309486f7c7a1ac97533d457f3f2899a1

                                                                                                    SHA256

                                                                                                    de5ba413b0cb7beb013ca0fef14f58dd8d7a2e7c72cb881c11002b4a1f48197f

                                                                                                    SHA512

                                                                                                    93fc748126419f89e29a3a5d8e947c8abc3d793bb387768724402fae1a43434c3a6b790045b36c368f79e3d69a25cfa19f83db026c7e730894ab6a9a00fe8eb7

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    8a834dd5e1d5d6f2a2035ad3a3836885

                                                                                                    SHA1

                                                                                                    9e0c13bbbb61d634fee4f1af7f74a36d1eab801b

                                                                                                    SHA256

                                                                                                    f8eee630c3e2bef9667dc80fac49149e58d946ad9ac19b8dbd4f5e9d3717289a

                                                                                                    SHA512

                                                                                                    956e74607a47ce95bc725fbcfbd2469e8475e79e95a8630ac4fbe80e250217b7127e96654e51621372d604d0b714c4c522dddd5541d603e8dfa1c37cdb00c232

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    11KB

                                                                                                    MD5

                                                                                                    0a370ec8161e8b9f3591f4f7c5473992

                                                                                                    SHA1

                                                                                                    46702343314f5cdf0b30fe1ee45773a1104f0bc5

                                                                                                    SHA256

                                                                                                    c54eefd87154baf4a2e0974c96d02f204cb68b358ee0fc794555ad43448e04a2

                                                                                                    SHA512

                                                                                                    9afa07f176db5f38dcdfa954c983bdf832c0f3da12ec9705522c6569f0d22ff6e5316f68e3f8e6a2a23a32d2a3c701fb71067faec489ec1f6b1cec5214b0b83e

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    12KB

                                                                                                    MD5

                                                                                                    8ff3d3ee3b95d46c02856b62b63f808e

                                                                                                    SHA1

                                                                                                    a2854292428d114ce2ad8b57106834c4732e3992

                                                                                                    SHA256

                                                                                                    bb3e60d58d2e2042d6daac8d945dbd1f11d052fd375088172dbc802cf68c9069

                                                                                                    SHA512

                                                                                                    12a6c3f0bbffeab00a026b6448d81dece5a1f32ac3cd5e8c54ff0ce47a3d55993be6ee09f34e4cb2271c17263e89cfa1f212fd55b0e357f868531e2b7e417bda

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    12KB

                                                                                                    MD5

                                                                                                    4f77cc81ccf6a7da3e9ad92b21cf7d31

                                                                                                    SHA1

                                                                                                    cf95390b914e74182bcf94971052038ffea1fd89

                                                                                                    SHA256

                                                                                                    d8abd8b724ed6cb5587ac7e6744a7378d7ae8c305785d6db0fcc88d6b8d57629

                                                                                                    SHA512

                                                                                                    0efe6195b9537e2f6d53a21404446951d63733613a43d6f8223beb07dc8e1f357b1b605f2972d406a67d4dc1e5c66abdb45282bdc5e4e5ec56fd7af4a8b26db9

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                    Filesize

                                                                                                    12KB

                                                                                                    MD5

                                                                                                    4e3fc1267815bbf49bcbef314f7ba521

                                                                                                    SHA1

                                                                                                    1bbbc8830f6b02c5707ae9ed15d69456fcaa972a

                                                                                                    SHA256

                                                                                                    39ff1af08d27e39d14df07a6158f88875812eecef679a4df31dcfc90cc4a67c4

                                                                                                    SHA512

                                                                                                    7bfe637b05d5957faed0acfb478419bc63bdb18b77d812d38cd1b2f1b31170b3a8516a15b576fcb43830f4734b9cf7f5680e29fc633b26c0de13cb67a9814f6b

                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                    MD5

                                                                                                    6fcd83aee155f5c52c69c8c4a27eec76

                                                                                                    SHA1

                                                                                                    32b613f2fbd47b5301e8e4382c249061503bacbc

                                                                                                    SHA256

                                                                                                    10b8dbad240ffa183ae51a41a289d4d49a4dd7595134f72fdc91afcd85a312f5

                                                                                                    SHA512

                                                                                                    2045ffd97a6287d0fcb37c805ef40f52766bee50dee1523e6ca4ec0440885a8ca623d69f5482886bd95ac1824fbe3cbba60ced32beb95bbf05761eabb163961d

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Panel.exe

                                                                                                    Filesize

                                                                                                    9.3MB

                                                                                                    MD5

                                                                                                    f4e19b67ef27af1434151a512860574e

                                                                                                    SHA1

                                                                                                    56304fc2729974124341e697f3b21c84a8dd242a

                                                                                                    SHA256

                                                                                                    c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

                                                                                                    SHA512

                                                                                                    a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\TCDD2DC.tmp\sist02.xsl

                                                                                                    Filesize

                                                                                                    245KB

                                                                                                    MD5

                                                                                                    f883b260a8d67082ea895c14bf56dd56

                                                                                                    SHA1

                                                                                                    7954565c1f243d46ad3b1e2f1baf3281451fc14b

                                                                                                    SHA256

                                                                                                    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

                                                                                                    SHA512

                                                                                                    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ctqENoUWTa.bat

                                                                                                    Filesize

                                                                                                    218B

                                                                                                    MD5

                                                                                                    6a6aac8c0808f0b2f7e614d1fbd4fee3

                                                                                                    SHA1

                                                                                                    7328dfaa5835774d9cf205c15e2489856e3cccca

                                                                                                    SHA256

                                                                                                    a3d0567f30178b77255e4cb115439491e5ef1c10687d409bd2d3b3901878702a

                                                                                                    SHA512

                                                                                                    4f23f96efc09c08ba7195dc9b5f39bd76a3414f6865c2223fb8f6bc3af6c8b08e23475f833401e654fb90227f221c7dfcbe82978b0ec58d5e4be87b626afe03c

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mso45F8.tmp

                                                                                                    Filesize

                                                                                                    663B

                                                                                                    MD5

                                                                                                    ed3c1c40b68ba4f40db15529d5443dec

                                                                                                    SHA1

                                                                                                    831af99bb64a04617e0a42ea898756f9e0e0bcca

                                                                                                    SHA256

                                                                                                    039fe79b74e6d3d561e32d4af570e6ca70db6bb3718395be2bf278b9e601279a

                                                                                                    SHA512

                                                                                                    c7b765b9afbb9810b6674dbc5c5064ed96a2682e78d5dffab384d81edbc77d01e0004f230d4207f2b7d89cee9008d79d5fbadc5cb486da4bc43293b7aa878041

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe

                                                                                                    Filesize

                                                                                                    1.5MB

                                                                                                    MD5

                                                                                                    fcbf03d90d4e9ce80f575452266e71d1

                                                                                                    SHA1

                                                                                                    1b067d0e057db189c71b2f7ac4ee2483ebaf0fa7

                                                                                                    SHA256

                                                                                                    2ec28f57e64fee2b2f1a40c78c079672f0dddb84da2a84fe3291bd68a4771a73

                                                                                                    SHA512

                                                                                                    9ce9962f645ab542f135d8560a7095259fe6628afcf598a58dfcf8e96b0d1dfa73e59ce13af3ff97e6c03046634dbd46a278c6535f99f99b3a6051b7bbfcf380

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\serviceSettings.json

                                                                                                    Filesize

                                                                                                    74B

                                                                                                    MD5

                                                                                                    5b0a7c8b2ed5d0e217b1a60188732bd3

                                                                                                    SHA1

                                                                                                    69c9533cae0ab8c9c7566edf7dc51e3fbae5ecf8

                                                                                                    SHA256

                                                                                                    7010eaf0b085414f6c95ec08c010073c7d05c4e58e24547f54f5c5f7539020f8

                                                                                                    SHA512

                                                                                                    52809263f22949eb4a5eee4e7d39a053421aed4f4c3bce828a31091a9c8a8653ba967cc1618c0c8235a3e01b554a890e9a525d3ae3d4676ea1ac79a21870ad53

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                                    Filesize

                                                                                                    239B

                                                                                                    MD5

                                                                                                    fb4ddcf2ac7250f7b8279a83629ee7b7

                                                                                                    SHA1

                                                                                                    8b93c3ab95e597c5efb356f74567065c9931d502

                                                                                                    SHA256

                                                                                                    9412ca31f73f39f39e9df24f0272bdcb9d99700c8a220d195909e5e5095ab930

                                                                                                    SHA512

                                                                                                    9ccf4f76aa9b97077d5bd6db0a2e1bce393021409289336694fed74cc934cce7d61e098919627ac257173cacf87cfd8a880ae3f7387a38c86d53e062c9f7ffb1

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                                                                                    Filesize

                                                                                                    16B

                                                                                                    MD5

                                                                                                    d29962abc88624befc0135579ae485ec

                                                                                                    SHA1

                                                                                                    e40a6458296ec6a2427bcb280572d023a9862b31

                                                                                                    SHA256

                                                                                                    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

                                                                                                    SHA512

                                                                                                    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

                                                                                                    Filesize

                                                                                                    2B

                                                                                                    MD5

                                                                                                    f3b25701fe362ec84616a93a45ce9998

                                                                                                    SHA1

                                                                                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                                                    SHA256

                                                                                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                                                    SHA512

                                                                                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    abccbd29d6018eac14ad03d0a2eeb898

                                                                                                    SHA1

                                                                                                    d5e335aa97ff4db23c559898cff0f8591c674d52

                                                                                                    SHA256

                                                                                                    9bf4907e8394c3e25ed88202fad8117519c04b90a1b0b03fe8a8f65ff6246810

                                                                                                    SHA512

                                                                                                    67d8a1fde545870097e89fc540fea0b293651079e3c6f9db2a4591239e30a72ed8c225647055a434520156bce1dd84c0eaefa9f93dc775afdbf2679e52a5ede7

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    c28ff196c8636d5f4766cc654cd1c217

                                                                                                    SHA1

                                                                                                    fed53d21b5a6edd55258d71911495f14b1857033

                                                                                                    SHA256

                                                                                                    89ed670d91e9b7ac52ca30d630cdb123875047a2af05589049a2d0d75aadb365

                                                                                                    SHA512

                                                                                                    6b179add2445d2d5f6a5d5aff809cbe17de51f79ed6da78db620f42a1c247bd9c1dbc67744ea53e58a98b892645223935232e0bd1eef0a30a81ce345c78d490d

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    8655ddb2e4a790cb333fba9284ea3bea

                                                                                                    SHA1

                                                                                                    60f72cf1bf55b48cdb15ee4c96ee4a29c652809e

                                                                                                    SHA256

                                                                                                    b919214f5d09caee73b90cd8344d7ae112ca54cd4cbe84a3d5ea11862ef05674

                                                                                                    SHA512

                                                                                                    fbf786d13a3463c1984fce00096489c482267c35b8995a3ab863846c6a31d8b3fbb2290f0ebde6013fc2d2d124032a66a936105029b1de63032cfe0aa4a32499

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt.zip

                                                                                                    Filesize

                                                                                                    21.7MB

                                                                                                    MD5

                                                                                                    1118549e87cbad92e6959506172d8c5d

                                                                                                    SHA1

                                                                                                    a5598c8355d03dc1ed03b0f7842d478d6a9e17fe

                                                                                                    SHA256

                                                                                                    54b542bd706838bc61c23ef8189935fc74e0099b14e509d33649b43ff108d85f

                                                                                                    SHA512

                                                                                                    029527677e3a316a0929a111701c87c5fe6c11ecc361a3c009de75ee06d110245d0f250fca836a1aa0a90f86237e3102bcdf60ed645a9b42ad04bd50793aa09c

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe

                                                                                                    Filesize

                                                                                                    137KB

                                                                                                    MD5

                                                                                                    cf38a4bde3fe5456dcaf2b28d3bfb709

                                                                                                    SHA1

                                                                                                    711518af5fa13f921f3273935510627280730543

                                                                                                    SHA256

                                                                                                    c47b78e566425fc4165a83b2661313e41ee8d66241f7bea7723304a6a751595e

                                                                                                    SHA512

                                                                                                    3302b270ee028868ff877fa291c51e6c8b12478e7d873ddb9009bb68b55bd3a08a2756619b4415a76a5b4167abd7c7c3b9cc9f44c32a29225ff0fc2f94a1a4cc

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Mono.Cecil.dll

                                                                                                    Filesize

                                                                                                    350KB

                                                                                                    MD5

                                                                                                    de69bb29d6a9dfb615a90df3580d63b1

                                                                                                    SHA1

                                                                                                    74446b4dcc146ce61e5216bf7efac186adf7849b

                                                                                                    SHA256

                                                                                                    f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                                                                                    SHA512

                                                                                                    6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\stub.dll

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                    MD5

                                                                                                    625ed01fd1f2dc43b3c2492956fddc68

                                                                                                    SHA1

                                                                                                    48461ef33711d0080d7c520f79a0ec540bda6254

                                                                                                    SHA256

                                                                                                    6824c2c92eb7cee929f9c6b91e75c8c1fc3bfe80495eba4fa27118d40ad82b2b

                                                                                                    SHA512

                                                                                                    1889c7cee50092fe7a66469eb255b4013624615bac3a9579c4287bf870310bdc9018b0991f0ad7a9227c79c9bd08fd0c6fc7ebe97f21c16b7c06236f3755a665

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe

                                                                                                    Filesize

                                                                                                    119KB

                                                                                                    MD5

                                                                                                    4fde0f80c408af27a8d3ddeffea12251

                                                                                                    SHA1

                                                                                                    e834291127af150ce287443c5ea607a7ae337484

                                                                                                    SHA256

                                                                                                    1b644cdb1c7247c07d810c0ea10bec34dc5600f3645589690a219de08cf2dedb

                                                                                                    SHA512

                                                                                                    3693aeaa2cc276060b899f21f6f57f435b75fec5bcd7725b2dd79043b341c12ebc29bd43b287eb22a3e31fd2b50c4fa36bf020f9f3db5e2f75fe8cc747eca5f5

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe.config

                                                                                                    Filesize

                                                                                                    189B

                                                                                                    MD5

                                                                                                    5a7f52d69e6fca128023469ae760c6d5

                                                                                                    SHA1

                                                                                                    9d7f75734a533615042f510934402c035ac492f7

                                                                                                    SHA256

                                                                                                    498c7f8e872f9cef0cf04f7d290cf3804c82a007202c9b484128c94d03040fd0

                                                                                                    SHA512

                                                                                                    4dc8ae80ae9e61d2801441b6928a85dcf9d6d73656d064ffbc0ce9ee3ad531bfb140e9f802e39da2a83af6de606b115e5ccd3da35d9078b413b1d1846cbd1b4f

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.WCF.dll

                                                                                                    Filesize

                                                                                                    123KB

                                                                                                    MD5

                                                                                                    e3d39e30e0cdb76a939905da91fe72c8

                                                                                                    SHA1

                                                                                                    433fc7dc929380625c8a6077d3a697e22db8ed14

                                                                                                    SHA256

                                                                                                    4bfa493b75361920e6403c3d85d91a454c16ddda89a97c425257e92b352edd74

                                                                                                    SHA512

                                                                                                    9bb3477023193496ad20b7d11357e510ba3d02b036d6f35f57d061b1fc4d0f6cb3055ae040d78232c8a732d9241699ddcfac83cc377230109bf193736d9f92b8

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                    MD5

                                                                                                    a3ec05d5872f45528bbd05aeecf0a4ba

                                                                                                    SHA1

                                                                                                    68486279c63457b0579d86cd44dd65279f22d36f

                                                                                                    SHA256

                                                                                                    d4797b2e4957c9041ba32454657f5d9a457851c6b5845a57e0e5397707e7773e

                                                                                                    SHA512

                                                                                                    b96b582bb26cb40dbb2a0709a6c88acd87242d0607d548473e3023ffa0a6c9348922a98a4948f105ea0b8224a3930af1e698c6cee3c36ca6a83df6d20c868e8e

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe.config

                                                                                                    Filesize

                                                                                                    186B

                                                                                                    MD5

                                                                                                    9070d769fd43fb9def7e9954fba4c033

                                                                                                    SHA1

                                                                                                    de4699cdf9ad03aef060470c856f44d3faa7ea7f

                                                                                                    SHA256

                                                                                                    cbaf2ae95b1133026c58ab6362af2f7fb2a1871d7ad58b87bd73137598228d9b

                                                                                                    SHA512

                                                                                                    170028b66c5d2db2b8c90105b77b0b691bf9528dc9f07d4b3983d93e9e37ea1154095aaf264fb8b5e67c167239697337cc9e585e87ef35faa65a969cac1aa518

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ (English).docx

                                                                                                    Filesize

                                                                                                    30KB

                                                                                                    MD5

                                                                                                    a973ea85439ddfe86379d47e19da4dca

                                                                                                    SHA1

                                                                                                    78f60711360ddd46849d128e7a5d1b68b1d43f9f

                                                                                                    SHA256

                                                                                                    c197833a3fd69e98fbf2b02e9da232ff2867e1e684d420fd3975188c0e0e202b

                                                                                                    SHA512

                                                                                                    4a3fad33cccb15ea2d98bc30141744ba6709afec52d429ac0916aa656f4b611fdeda4b37812f0a72b90de000fc5c0f95bb445e5df67fc4ba6f93de5ce55df510

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ.txt

                                                                                                    Filesize

                                                                                                    19KB

                                                                                                    MD5

                                                                                                    53fc20e1e68a5619f7ff2df8e99d42c4

                                                                                                    SHA1

                                                                                                    7a8ddc81d16aaab533411810acfad1546c30dc2f

                                                                                                    SHA256

                                                                                                    fc7ceb47aa8796614f098406452ea67cb58929ded1d4c6bd944d4d34921bba0b

                                                                                                    SHA512

                                                                                                    c1ad4f2dfd50528d613e9fe3f55da0bbb5c8442b459d9c3c989b75014c827306f72f2eb6ecbcd92ff11546e12087c09685b12a7dc258c5ea85c15ba5cc002d8c

                                                                                                  • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe

                                                                                                    Filesize

                                                                                                    16.4MB

                                                                                                    MD5

                                                                                                    1246b7d115005ce9fcc96848c5595d72

                                                                                                    SHA1

                                                                                                    fa3777c7fe670cea2a4e8267945c3137091c64b5

                                                                                                    SHA256

                                                                                                    f01393937f06be201400703d1dbfb35397c4a5162f16278ba9d9bb63ddcbcc78

                                                                                                    SHA512

                                                                                                    5bf90904cf74a8c3775498578d856dd9f4837077928cd7ce24e4a6ccec00827bcfb28c2079498ba682a4f53204d7ad2bb8de2489005c429dc968e75e26d29101

                                                                                                  • C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll

                                                                                                    Filesize

                                                                                                    3.4MB

                                                                                                    MD5

                                                                                                    059d51f43f1a774bc5aa76d19c614670

                                                                                                    SHA1

                                                                                                    171329bf0f48190cf4d59ce106b139e63507457d

                                                                                                    SHA256

                                                                                                    2eaf3d548927ebd243362f7bcb906bb1bbff3961223fb9521cb2846b6b8d523d

                                                                                                    SHA512

                                                                                                    a299cb18c8a47fc27c46db0011266b7fa273852b302374eb98a54034e1281150af8e54e58f76a384d3b92fbcb1a67fc0452cabe592a379e15cce2c5f9a4b6cb7

                                                                                                  • \??\pipe\LOCAL\crashpad_2904_ORIMWRMIBBZBZDJI

                                                                                                    MD5

                                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                                    SHA1

                                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                    SHA256

                                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                    SHA512

                                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                  • memory/432-10303-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/432-10304-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/432-10343-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/1440-9165-0x0000000005EE0000-0x0000000005EEA000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/1440-9161-0x0000000005830000-0x00000000058C2000-memory.dmp

                                                                                                    Filesize

                                                                                                    584KB

                                                                                                  • memory/1440-9156-0x0000000000DD0000-0x0000000000DF8000-memory.dmp

                                                                                                    Filesize

                                                                                                    160KB

                                                                                                  • memory/1440-9169-0x0000000006400000-0x000000000645E000-memory.dmp

                                                                                                    Filesize

                                                                                                    376KB

                                                                                                  • memory/1912-333-0x00000000055E0000-0x0000000005606000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/1912-339-0x0000000005890000-0x00000000058DC000-memory.dmp

                                                                                                    Filesize

                                                                                                    304KB

                                                                                                  • memory/1912-322-0x0000000000D10000-0x0000000000D34000-memory.dmp

                                                                                                    Filesize

                                                                                                    144KB

                                                                                                  • memory/1912-328-0x0000000005920000-0x0000000005C82000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.4MB

                                                                                                  • memory/1912-329-0x0000000005C90000-0x0000000005E0C000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.5MB

                                                                                                  • memory/1912-334-0x0000000006430000-0x0000000006A48000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.1MB

                                                                                                  • memory/1912-335-0x00000000056D0000-0x00000000056E2000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/1912-336-0x0000000005770000-0x00000000057AC000-memory.dmp

                                                                                                    Filesize

                                                                                                    240KB

                                                                                                  • memory/1912-337-0x0000000005820000-0x0000000005886000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1912-338-0x00000000060A0000-0x0000000006326000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.5MB

                                                                                                  • memory/1912-340-0x0000000005EE0000-0x0000000005FAE000-memory.dmp

                                                                                                    Filesize

                                                                                                    824KB

                                                                                                  • memory/1912-341-0x0000000006B60000-0x0000000006C6A000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.0MB

                                                                                                  • memory/1912-342-0x0000000005E70000-0x0000000005E98000-memory.dmp

                                                                                                    Filesize

                                                                                                    160KB

                                                                                                  • memory/1912-345-0x0000000006C70000-0x0000000006CA0000-memory.dmp

                                                                                                    Filesize

                                                                                                    192KB

                                                                                                  • memory/1912-344-0x0000000006A50000-0x0000000006B50000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1912-343-0x0000000006000000-0x0000000006050000-memory.dmp

                                                                                                    Filesize

                                                                                                    320KB

                                                                                                  • memory/2120-9700-0x0000000000420000-0x000000000085C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2120-9703-0x0000000000420000-0x000000000085C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2120-9706-0x0000000000420000-0x000000000085C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2120-9709-0x0000000000420000-0x000000000085C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2432-9820-0x0000000000EE0000-0x000000000131C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2432-9843-0x0000000000EE0000-0x000000000131C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2432-9818-0x0000000000EE0000-0x000000000131C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2432-9819-0x0000000000EE0000-0x000000000131C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2508-10167-0x00000000007A0000-0x0000000000BDC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2508-10140-0x00000000007A0000-0x0000000000BDC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2508-10139-0x00000000007A0000-0x0000000000BDC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2508-10136-0x00000000007A0000-0x0000000000BDC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2512-9550-0x00000000004E0000-0x000000000091C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2512-9549-0x00000000004E0000-0x000000000091C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2512-9571-0x00000000004E0000-0x000000000091C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2512-9551-0x00000000004E0000-0x000000000091C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/2740-9202-0x0000000000330000-0x000000000034E000-memory.dmp

                                                                                                    Filesize

                                                                                                    120KB

                                                                                                  • memory/3136-315-0x0000000000EF0000-0x0000000001126000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.2MB

                                                                                                  • memory/3136-316-0x0000000008150000-0x0000000008760000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.1MB

                                                                                                  • memory/3836-368-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-372-0x00007FF8599D0000-0x00007FF8599E0000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-366-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-956-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-367-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-370-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-371-0x00007FF8599D0000-0x00007FF8599E0000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-369-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-959-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-958-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/3836-957-0x00007FF85C230000-0x00007FF85C240000-memory.dmp

                                                                                                    Filesize

                                                                                                    64KB

                                                                                                  • memory/4784-9490-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4784-9477-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4784-9476-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4784-9478-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4872-9702-0x0000000000300000-0x000000000073C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4872-9701-0x0000000000300000-0x000000000073C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4872-9725-0x0000000000300000-0x000000000073C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4872-9705-0x0000000000300000-0x000000000073C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4888-9704-0x0000000000140000-0x000000000057C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4888-9723-0x0000000000140000-0x000000000057C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/4888-9699-0x0000000000140000-0x000000000057C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5212-962-0x0000000000400000-0x0000000001470000-memory.dmp

                                                                                                    Filesize

                                                                                                    16.4MB

                                                                                                  • memory/5492-9618-0x00000000206C0000-0x00000000206DA000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/5492-9083-0x0000000021BA0000-0x0000000021BEF000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/5528-10300-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5528-10301-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5528-10302-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5528-10341-0x00000000007B0000-0x0000000000BEC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5556-1032-0x00000000001B0000-0x00000000005EC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5556-3021-0x00000000001B0000-0x00000000005EC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5556-1030-0x00000000001B0000-0x00000000005EC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5556-1036-0x00000000001B0000-0x00000000005EC000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5556-1094-0x0000000006440000-0x00000000064A6000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/5556-1038-0x00000000064C0000-0x0000000006A64000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/5620-1045-0x000000001ADB0000-0x000000001AF50000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.6MB

                                                                                                  • memory/5620-1151-0x000000001F0A0000-0x000000001F0BC000-memory.dmp

                                                                                                    Filesize

                                                                                                    112KB

                                                                                                  • memory/5620-1114-0x000000001E4E0000-0x000000001E842000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.4MB

                                                                                                  • memory/5620-1078-0x000000001DE00000-0x000000001DF42000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.3MB

                                                                                                  • memory/5620-1066-0x000000001DA30000-0x000000001DB72000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.3MB

                                                                                                  • memory/5620-1168-0x000000001F2D0000-0x000000001F44C000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.5MB

                                                                                                  • memory/5620-1127-0x000000001E850000-0x000000001EDF4000-memory.dmp

                                                                                                    Filesize

                                                                                                    5.6MB

                                                                                                  • memory/5620-1043-0x000000001ADB0000-0x000000001AF50000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.6MB

                                                                                                  • memory/5620-1095-0x000000001DB60000-0x000000001DB6A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/5620-1065-0x000000001DA30000-0x000000001DB72000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.3MB

                                                                                                  • memory/5620-1037-0x00007FF879E00000-0x00007FF87A8C1000-memory.dmp

                                                                                                    Filesize

                                                                                                    10.8MB

                                                                                                  • memory/5620-1054-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                  • memory/5620-1055-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                  • memory/5620-1128-0x000000001F000000-0x000000001F092000-memory.dmp

                                                                                                    Filesize

                                                                                                    584KB

                                                                                                  • memory/5620-1044-0x000000001ADB0000-0x000000001AF50000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.6MB

                                                                                                  • memory/5620-1057-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                  • memory/5620-1059-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                  • memory/5620-1070-0x000000001DA30000-0x000000001DB72000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.3MB

                                                                                                  • memory/5620-1061-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                    Filesize

                                                                                                    20KB

                                                                                                  • memory/5620-1108-0x000000001DB70000-0x000000001DB7A000-memory.dmp

                                                                                                    Filesize

                                                                                                    40KB

                                                                                                  • memory/5752-5068-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5752-5038-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/5752-5039-0x0000000000B50000-0x0000000000F8C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB

                                                                                                  • memory/6044-5071-0x0000000021BD0000-0x0000000021C6C000-memory.dmp

                                                                                                    Filesize

                                                                                                    624KB

                                                                                                  • memory/6044-5079-0x0000000021E70000-0x0000000021EBF000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/6044-4953-0x00000000207C0000-0x00000000207FC000-memory.dmp

                                                                                                    Filesize

                                                                                                    240KB

                                                                                                  • memory/6044-4951-0x0000000020050000-0x0000000020668000-memory.dmp

                                                                                                    Filesize

                                                                                                    6.1MB

                                                                                                  • memory/6044-5098-0x0000000024660000-0x0000000024678000-memory.dmp

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                  • memory/6044-5083-0x00000000256C0000-0x0000000025A29000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.4MB

                                                                                                  • memory/6044-5082-0x0000000024610000-0x0000000024632000-memory.dmp

                                                                                                    Filesize

                                                                                                    136KB

                                                                                                  • memory/6044-5081-0x00000000245E0000-0x0000000024610000-memory.dmp

                                                                                                    Filesize

                                                                                                    192KB

                                                                                                  • memory/6044-4950-0x000000001FE30000-0x000000001FE4A000-memory.dmp

                                                                                                    Filesize

                                                                                                    104KB

                                                                                                  • memory/6044-4936-0x000000001FBA0000-0x000000001FE26000-memory.dmp

                                                                                                    Filesize

                                                                                                    2.5MB

                                                                                                  • memory/6044-4954-0x0000000020800000-0x0000000020812000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/6044-4935-0x000000001FB30000-0x000000001FB96000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/6044-5058-0x0000000024530000-0x0000000024580000-memory.dmp

                                                                                                    Filesize

                                                                                                    320KB

                                                                                                  • memory/6044-5057-0x0000000024580000-0x00000000245CA000-memory.dmp

                                                                                                    Filesize

                                                                                                    296KB

                                                                                                  • memory/6044-4952-0x00000000206B0000-0x00000000207B0000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/6044-5080-0x0000000024EF0000-0x0000000024FFA000-memory.dmp

                                                                                                    Filesize

                                                                                                    1.0MB

                                                                                                  • memory/6044-5034-0x0000000020A40000-0x0000000020AB4000-memory.dmp

                                                                                                    Filesize

                                                                                                    464KB

                                                                                                  • memory/6044-4985-0x00000000208A0000-0x00000000208DA000-memory.dmp

                                                                                                    Filesize

                                                                                                    232KB

                                                                                                  • memory/6044-5000-0x0000000020990000-0x0000000020A40000-memory.dmp

                                                                                                    Filesize

                                                                                                    704KB

                                                                                                  • memory/6044-4971-0x0000000020840000-0x0000000020852000-memory.dmp

                                                                                                    Filesize

                                                                                                    72KB

                                                                                                  • memory/6132-10423-0x00000000004E0000-0x000000000091C000-memory.dmp

                                                                                                    Filesize

                                                                                                    4.2MB