Resubmissions

29-07-2024 20:26

240729-y71eqstbme 10

17-07-2024 12:19

240717-pg6dmazgjq 10

05-07-2024 16:51

240705-vc87lssapk 10

05-07-2024 14:28

240705-rs3g8azeln 1

05-07-2024 14:22

240705-rp3c2ssdmf 7

05-07-2024 11:39

240705-nsb4gszfja 10

05-07-2024 11:30

240705-nl4vxsxdrk 10

Analysis

  • max time kernel
    1010s
  • max time network
    976s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 16:51

General

  • Target

    https://github.com/RZM-CRACK-TEAM/RedLine-CRACK?tab=readme-ov-file

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 48 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • DCRat payload 19 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 50 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 48 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 52 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/RZM-CRACK-TEAM/RedLine-CRACK?tab=readme-ov-file
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc15f146f8,0x7ffc15f14708,0x7ffc15f14718
      2⤵
        PID:1448
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
        2⤵
          PID:4368
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4896
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:8
          2⤵
            PID:1020
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
            2⤵
              PID:3508
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:3936
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                2⤵
                  PID:3584
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4920
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                  2⤵
                    PID:628
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:1
                    2⤵
                      PID:3008
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                      2⤵
                        PID:1188
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                        2⤵
                          PID:2576
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6008 /prefetch:8
                          2⤵
                            PID:1520
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                            2⤵
                              PID:3308
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:700
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5576 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2744
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                              2⤵
                                PID:4392
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1
                                2⤵
                                  PID:3360
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4532 /prefetch:8
                                  2⤵
                                    PID:5096
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3168 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4412
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:1
                                    2⤵
                                      PID:2308
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:1
                                      2⤵
                                        PID:4388
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                                        2⤵
                                          PID:100
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=184 /prefetch:1
                                          2⤵
                                            PID:4628
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:1
                                            2⤵
                                              PID:3840
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:1
                                              2⤵
                                                PID:3036
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1752 /prefetch:8
                                                2⤵
                                                  PID:1048
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:1
                                                  2⤵
                                                    PID:2696
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:1
                                                    2⤵
                                                      PID:3588
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                                                      2⤵
                                                        PID:4128
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:1
                                                        2⤵
                                                          PID:5052
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,17360710556720578987,3342713092513097390,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1080 /prefetch:8
                                                          2⤵
                                                            PID:4440
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:3188
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:4388
                                                            • C:\Windows\System32\rundll32.exe
                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                              1⤵
                                                                PID:1796
                                                              • C:\Program Files\7-Zip\7zG.exe
                                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Redline-crack-by-rzt\" -ad -an -ai#7zMap28033:102:7zEvent8718
                                                                1⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                PID:3608
                                                              • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe
                                                                "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Drops file in Windows directory
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1856
                                                              • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe
                                                                "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3604
                                                              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ (English).docx" /o ""
                                                                1⤵
                                                                • Checks processor information in registry
                                                                • Enumerates system info in registry
                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1776
                                                              • C:\Windows\system32\OpenWith.exe
                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                1⤵
                                                                • Modifies registry class
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1460
                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\serviceSettings.json
                                                                  2⤵
                                                                    PID:3576
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                  1⤵
                                                                  • Enumerates system info in registry
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:744
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc0565ab58,0x7ffc0565ab68,0x7ffc0565ab78
                                                                    2⤵
                                                                      PID:364
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:2
                                                                      2⤵
                                                                        PID:4236
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:8
                                                                        2⤵
                                                                          PID:4944
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:8
                                                                          2⤵
                                                                            PID:1428
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:1
                                                                            2⤵
                                                                              PID:560
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:1
                                                                              2⤵
                                                                                PID:2696
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:1
                                                                                2⤵
                                                                                  PID:2436
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:8
                                                                                  2⤵
                                                                                    PID:628
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4132 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:8
                                                                                    2⤵
                                                                                      PID:4848
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:8
                                                                                      2⤵
                                                                                        PID:4496
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4932 --field-trial-handle=1956,i,11356033947740276792,6499535370150135188,131072 /prefetch:1
                                                                                        2⤵
                                                                                          PID:3748
                                                                                      • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                                                                        1⤵
                                                                                          PID:3220
                                                                                        • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe
                                                                                          "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe"
                                                                                          1⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          PID:3584
                                                                                          • C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe"
                                                                                            2⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Drops file in Program Files directory
                                                                                            • Drops file in Windows directory
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2868
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zb1AOIoPI9.bat"
                                                                                              3⤵
                                                                                                PID:5748
                                                                                                • C:\Windows\SysWOW64\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  4⤵
                                                                                                    PID:3760
                                                                                                    • C:\Windows\system32\w32tm.exe
                                                                                                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                      5⤵
                                                                                                        PID:4412
                                                                                                    • C:\Recovery\WindowsRE\msedge.exe
                                                                                                      "C:\Recovery\WindowsRE\msedge.exe"
                                                                                                      4⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:4024
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Panel.exe"
                                                                                                  2⤵
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:2308
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "--monitor"
                                                                                                    3⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:4032
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAj87fXg1SIkuqlji9BeulJQAAAAACAAAAAAAQZgAAAAEAACAAAABOuDILb8dtAXFcicDNx1+7gRyzvwgjf7b/Ve5XWiKCIwAAAAAOgAAAAAIAACAAAABqpTspEMK+FeuNV2Gh9LJOjmHoP56eqrS8moY0CexxFxAAAADsyc3kjMmo6gG3vdgdFcv2QAAAAJDNLgELDqfDQ/ZyzrvhrgGwCne9FsWvMdH123C8sIh6CBS/RQZChETtznIayRjWTQZ4TpDTC883oMkqhBC7dlk=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAj87fXg1SIkuqlji9BeulJQAAAAACAAAAAAAQZgAAAAEAACAAAAA2EUe2v8WJubEoD92J6fVL7b6NE1TsueYKB2ecNjJf5gAAAAAOgAAAAAIAACAAAAAHaXfn/z1BPFMsmYUj6T3Eb2m0O7Mm8T2YeWmyXDoOVhAAAAA6NPYRMM/4kCrwhTj4T9ncQAAAAGCkOQcLZmXDzZkJ+iiZA/v/zzVmgRYEj4xtFG4OktLkaruQ7srVGAP7K8oLjYUWHQHwg8pIXN4X8pTNkh8uo6c="
                                                                                                      4⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      PID:5844
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Panel.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAj87fXg1SIkuqlji9BeulJQAAAAACAAAAAAAQZgAAAAEAACAAAABOuDILb8dtAXFcicDNx1+7gRyzvwgjf7b/Ve5XWiKCIwAAAAAOgAAAAAIAACAAAABqpTspEMK+FeuNV2Gh9LJOjmHoP56eqrS8moY0CexxFxAAAADsyc3kjMmo6gG3vdgdFcv2QAAAAJDNLgELDqfDQ/ZyzrvhrgGwCne9FsWvMdH123C8sIh6CBS/RQZChETtznIayRjWTQZ4TpDTC883oMkqhBC7dlk=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAj87fXg1SIkuqlji9BeulJQAAAAACAAAAAAAQZgAAAAEAACAAAAA2EUe2v8WJubEoD92J6fVL7b6NE1TsueYKB2ecNjJf5gAAAAAOgAAAAAIAACAAAAAHaXfn/z1BPFMsmYUj6T3Eb2m0O7Mm8T2YeWmyXDoOVhAAAAA6NPYRMM/4kCrwhTj4T9ncQAAAAGCkOQcLZmXDzZkJ+iiZA/v/zzVmgRYEj4xtFG4OktLkaruQ7srVGAP7K8oLjYUWHQHwg8pIXN4X8pTNkh8uo6c=" "--monitor"
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:5800
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 10 /tr "'C:\Windows\L2Schemas\msedge.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2596
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Windows\L2Schemas\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1456
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 5 /tr "'C:\Windows\L2Schemas\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3872
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2908
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:244
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3948
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\Visualizations\RuntimeBroker.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4644
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\Visualizations\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1284
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Media Player\Visualizations\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2252
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Users\Public\SppExtComObj.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3952
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\SppExtComObj.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2424
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Users\Public\SppExtComObj.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4032
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Videos\msedge.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2196
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Users\Public\Videos\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:516
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Videos\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:8
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1036
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3200
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\Registry.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1840
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\InputMethod\SHARED\RuntimeBroker.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2044
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\InputMethod\SHARED\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2928
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\InputMethod\SHARED\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1096
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\VideoLAN\VLC\plugins\TextInputHost.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1852
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\plugins\TextInputHost.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4316
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 8 /tr "'C:\Program Files\VideoLAN\VLC\plugins\TextInputHost.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2104
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "Kurome.HostK" /sc MINUTE /mo 5 /tr "'C:\Program Files\Mozilla Firefox\Kurome.Host.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4024
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "Kurome.Host" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\Kurome.Host.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3528
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "Kurome.HostK" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\Kurome.Host.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4304
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Updates\RuntimeBroker.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3948
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Updates\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4644
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Updates\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2896
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2424
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3052
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Program Files\WindowsPowerShell\spoolsv.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1036
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\Media\Garden\sppsvc.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:372
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Media\Garden\sppsvc.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1572
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Windows\Media\Garden\sppsvc.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3324
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:4504
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1852
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1524
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2908
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:1792
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3608
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Contacts\lsass.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5248
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\lsass.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3260
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Contacts\lsass.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5684
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5124
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5128
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\msedge.exe'" /rl HIGHEST /f
                                                                                                1⤵
                                                                                                • Process spawned unexpected child process
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:5176
                                                                                              • C:\Windows\system32\OpenWith.exe
                                                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                1⤵
                                                                                                • Modifies registry class
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:5328
                                                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\serviceSettings.json
                                                                                                  2⤵
                                                                                                    PID:4796
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  "C:\Windows\system32\cmd.exe"
                                                                                                  1⤵
                                                                                                    PID:6036
                                                                                                    • C:\Windows\system32\ipconfig.exe
                                                                                                      ipconfig
                                                                                                      2⤵
                                                                                                      • Gathers network information
                                                                                                      PID:5380
                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\serviceSettings.json
                                                                                                    1⤵
                                                                                                      PID:3768
                                                                                                    • C:\Program Files\WindowsPowerShell\spoolsv.exe
                                                                                                      "C:\Program Files\WindowsPowerShell\spoolsv.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:5428
                                                                                                    • C:\Program Files\Microsoft Office\Updates\RuntimeBroker.exe
                                                                                                      "C:\Program Files\Microsoft Office\Updates\RuntimeBroker.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1920
                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe
                                                                                                      "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:2276
                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe
                                                                                                      "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\build.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:6072
                                                                                                    • C:\Program Files\VideoLAN\VLC\plugins\TextInputHost.exe
                                                                                                      "C:\Program Files\VideoLAN\VLC\plugins\TextInputHost.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:1092
                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe
                                                                                                      "C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Builder\Kurome.Builder.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:908
                                                                                                    • C:\Program Files\Mozilla Firefox\Kurome.Host.exe
                                                                                                      "C:\Program Files\Mozilla Firefox\Kurome.Host.exe"
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:5748
                                                                                                    • C:\Windows\Media\Garden\sppsvc.exe
                                                                                                      C:\Windows\Media\Garden\sppsvc.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:2420

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                                                                                      Filesize

                                                                                                      211KB

                                                                                                      MD5

                                                                                                      151fb811968eaf8efb840908b89dc9d4

                                                                                                      SHA1

                                                                                                      7ec811009fd9b0e6d92d12d78b002275f2f1bee1

                                                                                                      SHA256

                                                                                                      043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed

                                                                                                      SHA512

                                                                                                      83aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                      Filesize

                                                                                                      168B

                                                                                                      MD5

                                                                                                      97c9b3befbef825fb26c33fa30d3f75c

                                                                                                      SHA1

                                                                                                      9aeef6873dd0ed5e828a0ccb8420bda5713aee09

                                                                                                      SHA256

                                                                                                      c4f97262837edcc1397d6a1d24879979be12890414bf35cb08956714c6a9d287

                                                                                                      SHA512

                                                                                                      dae7c632a450ec12084363f452ca93326f78ca092111bfab4db975c69ea74225bb056572eff4bd0f67d33aea25aa8f6e7dbe4958ed8807e709518cb6b72c552e

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      46112d7343f528a123da942f0d98ae8a

                                                                                                      SHA1

                                                                                                      951bf0c80842ced611b28e630d2fad31c3250182

                                                                                                      SHA256

                                                                                                      3660a2f7fca7f9b4a58b89abdb86295579ff44083a02f3eb3aebe45049a345ff

                                                                                                      SHA512

                                                                                                      903080bd6360e2e15463536e5ec8466becf9079c25ac6095ea6cd719e3a1435fcfdd3bd7bedaf9d9e0b1174aeae3aa6d10a9d50f33261cf4388231e52bee3db7

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                      Filesize

                                                                                                      2B

                                                                                                      MD5

                                                                                                      d751713988987e9331980363e24189ce

                                                                                                      SHA1

                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                      SHA256

                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                      SHA512

                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                      Filesize

                                                                                                      356B

                                                                                                      MD5

                                                                                                      90bc3efe37887beb93a1c7f4a9ec4bdb

                                                                                                      SHA1

                                                                                                      634a66c96cab4ec4f8ee9edee204b8c279a1bfd8

                                                                                                      SHA256

                                                                                                      50e9027f8fc6257de3c932a8c3762f76ff2029ff2aa2c7c32ec743c8a7b11dcf

                                                                                                      SHA512

                                                                                                      4954717bdd004a0040712c5addf18a6debd5920ef9678c60f704b2b4154750630fb28185d8cdced4b7e17f055eca85f5dd3ee05f5c4e2d5e14c51b9dfb379a2a

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      0b25884124df12d3d0a687f4bcd2ebf5

                                                                                                      SHA1

                                                                                                      fec8534e900620759300a7ab0350731ccbc2a219

                                                                                                      SHA256

                                                                                                      f4efc052d3a0735bbb6518f35f8bf4e4ab3dcb11952a95f6e07dc83be93512cc

                                                                                                      SHA512

                                                                                                      a8a6c4e78cb2a278925c27c9d05f7f0079d58bb0d893db78ed865599e95114602a3843454a4183357e22a735fdf1e2cc36cd58f83761aa7dde0f8b2d4c680af1

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      03a495109896c9d55f7ed7f5b0a09b40

                                                                                                      SHA1

                                                                                                      f1d88a2a059b93ccd334c8335579e67ed4369aaa

                                                                                                      SHA256

                                                                                                      522627deb3ee13005f0de58b5c6b8a60fe1eb3cd43bef6ce9d4f68d8e2294f93

                                                                                                      SHA512

                                                                                                      6250637e655adc7a49622e234151ca30d34644d7314db7ea35d00a4624fbf28e357034da59ea430e96ce3bf1e549a4bb5cfd9d354528404c1ca5ac6de0b95e32

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      498c5603ece01f07efd1bc06d4efaecc

                                                                                                      SHA1

                                                                                                      a38ed995b78797fd5a841ba789b8090150d72bf4

                                                                                                      SHA256

                                                                                                      a63671edc452d7a7aee0b58c6cbfeb45455273998c61aad0b9f46f228d120b01

                                                                                                      SHA512

                                                                                                      9a97c1a640a82cd16067c8804ba2ce16a4b88aa776e400f23b93286759f466069523fadc417e03c26dd78b40a67b16373954f9107746ef4c06a4fc957c0f8ac1

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                      Filesize

                                                                                                      16KB

                                                                                                      MD5

                                                                                                      4e483316bb4e360276774bc983b5ff7f

                                                                                                      SHA1

                                                                                                      662a22529be3a8f0bf2c69af548b6c2c8e74172a

                                                                                                      SHA256

                                                                                                      88545fbc1f0e84e60f6b2b4bc1528ef9a81e0205a326e1772c1a597308febb31

                                                                                                      SHA512

                                                                                                      e759015220283ab8c35fa57b2752d2282e73a49946dd910df165106b11d9790bfa5eeb9684a837413dbf744f1b846c1f057a6f0db627f902f073b769e41e1f5e

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                      Filesize

                                                                                                      285KB

                                                                                                      MD5

                                                                                                      a3710cebccd69090ee64f1f8503cc001

                                                                                                      SHA1

                                                                                                      a67314e55bb74ab68a7615e534cde6121df3df57

                                                                                                      SHA256

                                                                                                      6fee7d09ad34457b51d3b16aacf03a6f612378e3e48ec5837c7ea8bc531bad22

                                                                                                      SHA512

                                                                                                      b5ade9813d5038f057789d27d835b90b4b51342f1f2c0c93742ece980309941a653c313a7d60b8da0a1b1daafb83f24b1ff5e0b8aa34f1a38f763806de1957dc

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                      Filesize

                                                                                                      285KB

                                                                                                      MD5

                                                                                                      fef547f6381059141902130e3965c701

                                                                                                      SHA1

                                                                                                      e5da032738f62e1c04c63e590d28f245a9112ef2

                                                                                                      SHA256

                                                                                                      6ccae50057fa06935a33df7fc6807d56b052cdd81f8e323cfa26d21de702f6a0

                                                                                                      SHA512

                                                                                                      41a81820f51ee1e3ca41080875f0df27a4f2340b39e5c70a44e4fa35c94a3ba111a5d2c059bef76ad5c480e493e4da43c13c258a07016d21b622e0b3e16d38f8

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                                                                      Filesize

                                                                                                      264KB

                                                                                                      MD5

                                                                                                      af7f3d69dbc92bc52319ea94794204c6

                                                                                                      SHA1

                                                                                                      155ce2d152221d582364adf1165f01fa592449c9

                                                                                                      SHA256

                                                                                                      08b274571f4394ed53222556784bccd6fb80cbbb1c58d472c30f977ebe309d42

                                                                                                      SHA512

                                                                                                      14b17403032c46dfe1a0e1f1e98dcf51fa5e4a90fc14a14062e04da381ac4cf421402f577e619c3bce828354cb832529566abfdab400f9ab5d6426d52c45b43d

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Kurome.Host.exe.log

                                                                                                      Filesize

                                                                                                      484B

                                                                                                      MD5

                                                                                                      49bddeedfc82481ba9d2c17cfce37675

                                                                                                      SHA1

                                                                                                      5a45bfedf3a990883bfc1a1fa2affbe5db94b6fb

                                                                                                      SHA256

                                                                                                      ab656bebc4d9c75956304be395323a41c282c748ae8e8ab2e46e0031f1cb8578

                                                                                                      SHA512

                                                                                                      9fa56622319d5e6fccacb2b7f5c5bda48a871e282b6d488822dd8e8349288626d6cc5960eb891df2a6268e67daac3c88e2d4bee450b4981d56789799551c6a24

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      3c78617ec8f88da19254f9ff03312175

                                                                                                      SHA1

                                                                                                      344e9fed9434d924d1c9f05351259cbc21e434d3

                                                                                                      SHA256

                                                                                                      3cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed

                                                                                                      SHA512

                                                                                                      5b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      152B

                                                                                                      MD5

                                                                                                      09c7ae658385f6de986103443217840b

                                                                                                      SHA1

                                                                                                      298d880503edce4413337c09d3525f27a2edcd28

                                                                                                      SHA256

                                                                                                      91e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7

                                                                                                      SHA512

                                                                                                      4e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000030

                                                                                                      Filesize

                                                                                                      19KB

                                                                                                      MD5

                                                                                                      39b7e0d992290c41da06068bfbfc7c77

                                                                                                      SHA1

                                                                                                      f6a4d0d93047d6cadf48b2bb752f89bc9bbf6806

                                                                                                      SHA256

                                                                                                      92d3d1073c33cb7ee8711bde6ac3c519b2b5f0044e5a2582aba96b14ccfef01d

                                                                                                      SHA512

                                                                                                      c67131ea3093c9863d3c7dffc37cf54d4b17bee7abae3fda9195535bb8a736ab19115fdd14591c7fd1966014891f9b140b8763695a80207756bf01c534388a1b

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                      MD5

                                                                                                      d6185ba30e5d3655b5652fe114885b09

                                                                                                      SHA1

                                                                                                      0106e6a072cd04e58c55e1c5f6123da638620e61

                                                                                                      SHA256

                                                                                                      4ce72746e5b7887192e645974ec6ddce7ea49fc69b02fcf1d29c46ee133ab3d4

                                                                                                      SHA512

                                                                                                      43542fbfd2c56bbd85df853249d1a0b6955d353c9009b78912e240a9ab89968444b1de4f65995b330a0f8905c8983a26500df608bb898e838190b554b8d7d24a

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      905b79d0ad67679f9a58e810970e54fa

                                                                                                      SHA1

                                                                                                      a90f3233ac4700be657efebd847f933a9a356282

                                                                                                      SHA256

                                                                                                      537869f27b68cf44f29542f3a9f979ed94657d6353c9ddc46827c4e2bc2a1ac5

                                                                                                      SHA512

                                                                                                      cca0cffc9ec1558c9ed27a8cba51646e5852c5d7fd87ae37ba7e14d8ad8ff64589cba2ab20913d91dfb53e55da35e702050f0c5cc394e1f19ec4243266c9ea35

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      670B

                                                                                                      MD5

                                                                                                      da4bcb8d2794e3c216c772f87d73705e

                                                                                                      SHA1

                                                                                                      f237504e3d219cc5de7d0146cea7e2a5e9ddd3bb

                                                                                                      SHA256

                                                                                                      cbb69dc99885d7f3c47e2a8a770fc28af2e2ca801aa900baf7782083c95d38fb

                                                                                                      SHA512

                                                                                                      30865f403c52af00d0157e292e9f65a6385f7291ed57225903a0643a8056db66df8dece149f97084618c17923ad0002e55a18240d096bdafc9acedb62151bd17

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                      MD5

                                                                                                      3c09494fd50e80c14ea1a3af75e7538d

                                                                                                      SHA1

                                                                                                      825d898d4e6efb5fb59ae5dd59476fa4dc95e8b2

                                                                                                      SHA256

                                                                                                      8460b2c03cf39341b44f12c9f2e5060b40001aae3dec44aba0cf59b9dc62af70

                                                                                                      SHA512

                                                                                                      b2045a4576940618d343de2201086c705f631b6d12417b2260f6081598d72360ec3e99894e76a0385d448c2101af70e2c00545e46f815b46403e277f1e75fe2c

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      b8ca4275ce92211da7128711cd45c778

                                                                                                      SHA1

                                                                                                      398ee9fe734e268305dea94389f551ca819f6f04

                                                                                                      SHA256

                                                                                                      c8ade6c8b1a29f7dc8efc36beb35a284baef72ced81dcc75b0d2b68e05d536ef

                                                                                                      SHA512

                                                                                                      a301136dbc92b4fdaaff1118793618d1ae625f06caa232d0d6f068b4d3744a34767b7c18391c188624b06f6eadc8cd3bf753e4235b4c898eb3665b769305dd0e

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      4dd00a595464636e26b2dae0480c3633

                                                                                                      SHA1

                                                                                                      47bd26dbfce3a53c1f2580201b68b1e482eba2d4

                                                                                                      SHA256

                                                                                                      bd0c6b6086d814834a69b012a91a2196cb3c2d2c615e52ac0262df1b790bee77

                                                                                                      SHA512

                                                                                                      ed10490e7f027bd4e90e3b0ebd5391ec7cb112c8820360b17c2d7c4dd0bb358ba539b9df89c75ca5de963ba5dc516e1872aab4e1014d415048043087eb99d66a

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      3c1d299f012e1bcafab6f299396d5e5f

                                                                                                      SHA1

                                                                                                      40e34e6d492610fbaa98822d439884517578c595

                                                                                                      SHA256

                                                                                                      fc35ebb0207ce38c22567fafb89662ef079976443bf1b185575b71810162ff5a

                                                                                                      SHA512

                                                                                                      a9f9696b23fb8b0cf898e325fff70a2de679dd5dd133a6a0f0ef3103554102d33f50eeaeeff224857ada62eaf0c9d78d0617139c7981398828f2a414d6e57536

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      8KB

                                                                                                      MD5

                                                                                                      3b3ad3a3569ff25565dd00086e5f50cb

                                                                                                      SHA1

                                                                                                      55501c66a9e9d93012a08fe999b40e0978b013b6

                                                                                                      SHA256

                                                                                                      441011c2bb980ee9d6f6c7c1926a9bfa51c9fbff6c9600b78320e90757f7d991

                                                                                                      SHA512

                                                                                                      92343b963d9d4119dc8a21e24fbcaece27839661726f8b446f3025920ceb25ce754f1a67f0b0f8d1d760b2d8836e105f055cb6684664f3aaad7ff66f46ecc7cc

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      87d68cba7a367e08a54fac586f7ade1e

                                                                                                      SHA1

                                                                                                      e4fc069f4e0d01ceae35317ef5052ced0895ef0c

                                                                                                      SHA256

                                                                                                      9bd1b549aa9e2b40d833c70f52efc5476d73cbfd04fc43805ea86d0ade630b75

                                                                                                      SHA512

                                                                                                      6d4f101eaa4351d3fc8d6fa315f9bed251262fd82692467d7968702e2ee86021b1077aae0f203406f2304fca7f002b4a828a19450c8170ef9ffc83d88c947caf

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      0c56007bf1e7a3877580c36299dc5cae

                                                                                                      SHA1

                                                                                                      3b7e44810d7f02f10bd92f7d73b2abdd969ea4cf

                                                                                                      SHA256

                                                                                                      faa7f06d6b3e9ae113d522c1a3dcbc34a70162ba16fdeeb287b398b4b8f69056

                                                                                                      SHA512

                                                                                                      240f0324ec77d27a24df1132ee9dc9df7fa355ab87906c10bd45f382e073f5ae8b8a5087693515d76fb929df341f519db9ad15ca7cde3d2987b07ac8bcac675a

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      49be73d19f6e6a969726f6c9e22debf1

                                                                                                      SHA1

                                                                                                      cd35b7a9269b4fe61861991c7eecfc177bd2aa50

                                                                                                      SHA256

                                                                                                      eba1c0e473261a8b7fe685515a6a6b94a78f7e7b673426f3e966e239e01cf005

                                                                                                      SHA512

                                                                                                      82628ec38029bfefe292056f49167bf4ea9c0ff0e588ecc21dc2e980b4ead94f0beb2d6574ca6f2d8a59f3083678552841c6a5739de37f4e198fab9a65d0dea5

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      58e0a26c959fdb61fd6056abf6e72797

                                                                                                      SHA1

                                                                                                      861411d31e6a8cb4931d29597c4928f3c266711f

                                                                                                      SHA256

                                                                                                      607d1e195e281074203ebb2be52b3a04d5a19a14ac2397cef8fcd38ce6c5faf2

                                                                                                      SHA512

                                                                                                      96ca14e7964b1453827857f590e3169ce9cf5cfbbcbc52ad0b1bf73dec96a93aacb3368c8b3fea257fcb1f30e30ba36a9f65db52029b5bf02f8825d6fad60d6f

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      aff46fb8c58e2c24f19a835e9839ba51

                                                                                                      SHA1

                                                                                                      38d6ba25185247753e19d11ac5e89b70cb33a064

                                                                                                      SHA256

                                                                                                      d1bb9040b0b121acc183a6ba9c84153131453d8f99f8f2c3c467506bce39fa85

                                                                                                      SHA512

                                                                                                      5a4d11a3500e88003d11c4a4f5f8c9fe7ce4a2956b762e5e2e439965230744357ce24184ef7f53a74bfea04de22b220dd1e7c2a126ddad4370e32c8492980003

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57dd31.TMP

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      242e781dd3f09d9132f0dceeb4404def

                                                                                                      SHA1

                                                                                                      008bb591e2270e2576eae8444b9d34cfc8418054

                                                                                                      SHA256

                                                                                                      85e28ee6fe3883fba7ea8ec3fce2d6765aa48836dac043e8ea6d585520ca5e0d

                                                                                                      SHA512

                                                                                                      851b90c4e1f7cbf8f11314eb5b7d142ba80022ebec61011c95d9a81cdb8de7ae2891a76744d7af4a3e15ddd9199bc71c21c7a7162c92880a712796e1a4007b6b

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\8a15f119-9904-41df-a401-aabdda4034f1\0

                                                                                                      Filesize

                                                                                                      16.7MB

                                                                                                      MD5

                                                                                                      4a47f956d4e5b86c3a6721a3e4189071

                                                                                                      SHA1

                                                                                                      434fcc846c0b2aed6e71b96b4a22df0739e29356

                                                                                                      SHA256

                                                                                                      ddd595420854f182eadbaeb91f9e2541a20fb431b67f3bbd062e1220b817c43e

                                                                                                      SHA512

                                                                                                      7c51c70d299c9578d11fd4177a0bb17bffa30287c6ae2d9f26d82b726cfde46c32cce2be620d6128c6a6790b1e5f06176c552274239186fd17f5280fd6f1659f

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                                      SHA1

                                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                      SHA256

                                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                      SHA512

                                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      11KB

                                                                                                      MD5

                                                                                                      9910badcb98fbc3ce7757cf8933b471e

                                                                                                      SHA1

                                                                                                      8d99de69d03732f5ab9459329418c241f133beee

                                                                                                      SHA256

                                                                                                      f712036156618de5ac1d37ab9abe7181df6e13f62738a5707572b4b9a9e6b29e

                                                                                                      SHA512

                                                                                                      fea1f68b3917c350a9925c9202c59fe2ce566dce7b8ac57629ad743b455a1e0fe080c92271222c172b0eeb581f90ac18f8dd9159fdc325862f04283cd2da6456

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      2d7ac482f8400e5f5a741712f451eaf0

                                                                                                      SHA1

                                                                                                      6c2a4fac9863fc26534af4427aded23a732f630a

                                                                                                      SHA256

                                                                                                      3dc819d497e2748f86ccb5036981e76e0e4f6d86df7f66cc6fe393add21173ef

                                                                                                      SHA512

                                                                                                      e522ce3189c31bae81bb3d7be13beaaf386134519391d7f23f2f78e9df0e473cf39dc04d9f4e10c0a24c8483b37b58cdef849d7caaca3314172c939eca4d47e9

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      11KB

                                                                                                      MD5

                                                                                                      c7dd0358674aea74e6f7529ede50885a

                                                                                                      SHA1

                                                                                                      9194cc9b3c8148572d06a1a49a5a5531f478aadc

                                                                                                      SHA256

                                                                                                      7e0c84b4c1bb9b3c9136396259d0234f88fa69ffa828fed2935cec5a904fbb32

                                                                                                      SHA512

                                                                                                      c46f50af637ac553eea9487e5d2eb60b5ef3943b61eaa52d4603700f6c4c73184f6eaf5b7f4bac3dfe6c048968249846c2c838d385a99c4e29512fbd772432ce

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      12ba29263f47b9a247ab3a05a1cf4dac

                                                                                                      SHA1

                                                                                                      88a33e7e19ca973aa771a687f08b923a52ea103c

                                                                                                      SHA256

                                                                                                      5b52d4dc4b4d15b6f8a97943148f0dbaa217c748b6b6233cf25882b1ceb0af6a

                                                                                                      SHA512

                                                                                                      95e30a1251f1f1c6915bedc07f5799cb3c58ee1da97ba0b69424b96c105953bf07c4266d45c1a565fb423cbf0913645d5863c2913b445574f958384ab4820128

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                      Filesize

                                                                                                      12KB

                                                                                                      MD5

                                                                                                      c7ec87d828e81381b43ccd76a239c5bc

                                                                                                      SHA1

                                                                                                      40bc4560a4688c35df0a6ecf4a98f161b43ddd84

                                                                                                      SHA256

                                                                                                      d631bfae0c5d7ef97e55382b38405b653ea60d479ef9d908eb68f0ca8f3a2858

                                                                                                      SHA512

                                                                                                      5dd7e43500df60086324f2c36cc8513b65196180257b85037d40d55da912f78563b77c92f752138d79930bd9a7bb0cbda2015ccaa05953d34ba66fd64266cc84

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                      MD5

                                                                                                      18771e5603e9606571cd62aa5048c555

                                                                                                      SHA1

                                                                                                      e55c76b80a6fc743459f4252fcb96227d27a34ba

                                                                                                      SHA256

                                                                                                      fdf8a90a27ef79121e4c1cc833e60241e195785d6b9acad4d22df5c90b78115f

                                                                                                      SHA512

                                                                                                      83bb6bc574d452416537e7786aec63eb2f8fd7a43ed72efe6b4d5887eb70050da57a69ff95171ed061435d427a1332a868399c9900328c337c7d217c17989fe3

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Panel.exe

                                                                                                      Filesize

                                                                                                      9.3MB

                                                                                                      MD5

                                                                                                      f4e19b67ef27af1434151a512860574e

                                                                                                      SHA1

                                                                                                      56304fc2729974124341e697f3b21c84a8dd242a

                                                                                                      SHA256

                                                                                                      c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

                                                                                                      SHA512

                                                                                                      a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mssurrogateProvider_protected.exe

                                                                                                      Filesize

                                                                                                      1.5MB

                                                                                                      MD5

                                                                                                      fcbf03d90d4e9ce80f575452266e71d1

                                                                                                      SHA1

                                                                                                      1b067d0e057db189c71b2f7ac4ee2483ebaf0fa7

                                                                                                      SHA256

                                                                                                      2ec28f57e64fee2b2f1a40c78c079672f0dddb84da2a84fe3291bd68a4771a73

                                                                                                      SHA512

                                                                                                      9ce9962f645ab542f135d8560a7095259fe6628afcf598a58dfcf8e96b0d1dfa73e59ce13af3ff97e6c03046634dbd46a278c6535f99f99b3a6051b7bbfcf380

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                                      Filesize

                                                                                                      315B

                                                                                                      MD5

                                                                                                      700b5aa7b5ab13ad3a87e12b8316052a

                                                                                                      SHA1

                                                                                                      557ecde34351ece506d1944ef86bcc3b1449cf96

                                                                                                      SHA256

                                                                                                      22e808b6b1dfe96f3f225fcab29ce83cedb760da4ca01e63d95be18c4035b3bf

                                                                                                      SHA512

                                                                                                      e12303a65f30d611c3c527e4782f92047e1dacb461a24603c9bee593698c8086d3fff7115d60145f85fa27733b94d48e9fa50207613112c2b7b9f5aa9f4c892c

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      d29962abc88624befc0135579ae485ec

                                                                                                      SHA1

                                                                                                      e40a6458296ec6a2427bcb280572d023a9862b31

                                                                                                      SHA256

                                                                                                      a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

                                                                                                      SHA512

                                                                                                      4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

                                                                                                      Filesize

                                                                                                      2B

                                                                                                      MD5

                                                                                                      f3b25701fe362ec84616a93a45ce9998

                                                                                                      SHA1

                                                                                                      d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                                                      SHA256

                                                                                                      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                                                      SHA512

                                                                                                      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      47760dfdafaf4256024421b636d2a79f

                                                                                                      SHA1

                                                                                                      386fac08b621b53258142f5a92e9a9ba3b344624

                                                                                                      SHA256

                                                                                                      83246aab3fefb6da29ceecdba18c0c3e3c856699d93f690abf4ab3abb6edc23c

                                                                                                      SHA512

                                                                                                      270fc69019306088fa0a2fec2dcd999a2a9d9e9b68dd75d9b8b7a36feda8a13f5c3304a671c0df121fd78d27c1ceb2f043fd76be1220430acaf79b03177b100b

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      25a803d000a732427e14829f4af79969

                                                                                                      SHA1

                                                                                                      44e5a584886279b120b25a3207a33f5ba5d36f47

                                                                                                      SHA256

                                                                                                      d56233e7f0a08263f07f397d2bd4686b646221a2e1bbd386be4f88a692c85a7d

                                                                                                      SHA512

                                                                                                      e4b07d98fad4702664bb2ea614298a13d2b55b2c1bcf383f14a40821e35b7a900429c5bb82a5c93ab888bc6680add9e6dadabe16965e8a5c896181eeac9b6d61

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt.zip

                                                                                                      Filesize

                                                                                                      21.7MB

                                                                                                      MD5

                                                                                                      1118549e87cbad92e6959506172d8c5d

                                                                                                      SHA1

                                                                                                      a5598c8355d03dc1ed03b0f7842d478d6a9e17fe

                                                                                                      SHA256

                                                                                                      54b542bd706838bc61c23ef8189935fc74e0099b14e509d33649b43ff108d85f

                                                                                                      SHA512

                                                                                                      029527677e3a316a0929a111701c87c5fe6c11ecc361a3c009de75ee06d110245d0f250fca836a1aa0a90f86237e3102bcdf60ed645a9b42ad04bd50793aa09c

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe

                                                                                                      Filesize

                                                                                                      119KB

                                                                                                      MD5

                                                                                                      4fde0f80c408af27a8d3ddeffea12251

                                                                                                      SHA1

                                                                                                      e834291127af150ce287443c5ea607a7ae337484

                                                                                                      SHA256

                                                                                                      1b644cdb1c7247c07d810c0ea10bec34dc5600f3645589690a219de08cf2dedb

                                                                                                      SHA512

                                                                                                      3693aeaa2cc276060b899f21f6f57f435b75fec5bcd7725b2dd79043b341c12ebc29bd43b287eb22a3e31fd2b50c4fa36bf020f9f3db5e2f75fe8cc747eca5f5

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.Host.exe.config

                                                                                                      Filesize

                                                                                                      189B

                                                                                                      MD5

                                                                                                      5a7f52d69e6fca128023469ae760c6d5

                                                                                                      SHA1

                                                                                                      9d7f75734a533615042f510934402c035ac492f7

                                                                                                      SHA256

                                                                                                      498c7f8e872f9cef0cf04f7d290cf3804c82a007202c9b484128c94d03040fd0

                                                                                                      SHA512

                                                                                                      4dc8ae80ae9e61d2801441b6928a85dcf9d6d73656d064ffbc0ce9ee3ad531bfb140e9f802e39da2a83af6de606b115e5ccd3da35d9078b413b1d1846cbd1b4f

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Host\Kurome.WCF.dll

                                                                                                      Filesize

                                                                                                      123KB

                                                                                                      MD5

                                                                                                      e3d39e30e0cdb76a939905da91fe72c8

                                                                                                      SHA1

                                                                                                      433fc7dc929380625c8a6077d3a697e22db8ed14

                                                                                                      SHA256

                                                                                                      4bfa493b75361920e6403c3d85d91a454c16ddda89a97c425257e92b352edd74

                                                                                                      SHA512

                                                                                                      9bb3477023193496ad20b7d11357e510ba3d02b036d6f35f57d061b1fc4d0f6cb3055ae040d78232c8a732d9241699ddcfac83cc377230109bf193736d9f92b8

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe

                                                                                                      Filesize

                                                                                                      2.2MB

                                                                                                      MD5

                                                                                                      a3ec05d5872f45528bbd05aeecf0a4ba

                                                                                                      SHA1

                                                                                                      68486279c63457b0579d86cd44dd65279f22d36f

                                                                                                      SHA256

                                                                                                      d4797b2e4957c9041ba32454657f5d9a457851c6b5845a57e0e5397707e7773e

                                                                                                      SHA512

                                                                                                      b96b582bb26cb40dbb2a0709a6c88acd87242d0607d548473e3023ffa0a6c9348922a98a4948f105ea0b8224a3930af1e698c6cee3c36ca6a83df6d20c868e8e

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Kurome.Loader\Kurome.Loader.exe.config

                                                                                                      Filesize

                                                                                                      186B

                                                                                                      MD5

                                                                                                      9070d769fd43fb9def7e9954fba4c033

                                                                                                      SHA1

                                                                                                      de4699cdf9ad03aef060470c856f44d3faa7ea7f

                                                                                                      SHA256

                                                                                                      cbaf2ae95b1133026c58ab6362af2f7fb2a1871d7ad58b87bd73137598228d9b

                                                                                                      SHA512

                                                                                                      170028b66c5d2db2b8c90105b77b0b691bf9528dc9f07d4b3983d93e9e37ea1154095aaf264fb8b5e67c167239697337cc9e585e87ef35faa65a969cac1aa518

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\FAQ (English).docx

                                                                                                      Filesize

                                                                                                      30KB

                                                                                                      MD5

                                                                                                      a973ea85439ddfe86379d47e19da4dca

                                                                                                      SHA1

                                                                                                      78f60711360ddd46849d128e7a5d1b68b1d43f9f

                                                                                                      SHA256

                                                                                                      c197833a3fd69e98fbf2b02e9da232ff2867e1e684d420fd3975188c0e0e202b

                                                                                                      SHA512

                                                                                                      4a3fad33cccb15ea2d98bc30141744ba6709afec52d429ac0916aa656f4b611fdeda4b37812f0a72b90de000fc5c0f95bb445e5df67fc4ba6f93de5ce55df510

                                                                                                    • C:\Users\Admin\Downloads\Redline-crack-by-rzt\Redline-crack-by-rzt\Panel\RedLine_20_2\Panel\panel.exe

                                                                                                      Filesize

                                                                                                      16.4MB

                                                                                                      MD5

                                                                                                      1246b7d115005ce9fcc96848c5595d72

                                                                                                      SHA1

                                                                                                      fa3777c7fe670cea2a4e8267945c3137091c64b5

                                                                                                      SHA256

                                                                                                      f01393937f06be201400703d1dbfb35397c4a5162f16278ba9d9bb63ddcbcc78

                                                                                                      SHA512

                                                                                                      5bf90904cf74a8c3775498578d856dd9f4837077928cd7ce24e4a6ccec00827bcfb28c2079498ba682a4f53204d7ad2bb8de2489005c429dc968e75e26d29101

                                                                                                    • C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll

                                                                                                      Filesize

                                                                                                      3.4MB

                                                                                                      MD5

                                                                                                      059d51f43f1a774bc5aa76d19c614670

                                                                                                      SHA1

                                                                                                      171329bf0f48190cf4d59ce106b139e63507457d

                                                                                                      SHA256

                                                                                                      2eaf3d548927ebd243362f7bcb906bb1bbff3961223fb9521cb2846b6b8d523d

                                                                                                      SHA512

                                                                                                      a299cb18c8a47fc27c46db0011266b7fa273852b302374eb98a54034e1281150af8e54e58f76a384d3b92fbcb1a67fc0452cabe592a379e15cce2c5f9a4b6cb7

                                                                                                    • \??\pipe\LOCAL\crashpad_1788_PUESNFHKHGARATDP

                                                                                                      MD5

                                                                                                      d41d8cd98f00b204e9800998ecf8427e

                                                                                                      SHA1

                                                                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                      SHA256

                                                                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                      SHA512

                                                                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                    • memory/1092-9574-0x0000000000CE0000-0x000000000111C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1092-9583-0x0000000000CE0000-0x000000000111C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1092-9573-0x0000000000CE0000-0x000000000111C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1092-9575-0x0000000000CE0000-0x000000000111C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1776-382-0x00007FFBE4E10000-0x00007FFBE4E20000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-385-0x00007FFBE27D0000-0x00007FFBE27E0000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-384-0x00007FFBE4E10000-0x00007FFBE4E20000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-383-0x00007FFBE4E10000-0x00007FFBE4E20000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-381-0x00007FFBE4E10000-0x00007FFBE4E20000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-380-0x00007FFBE4E10000-0x00007FFBE4E20000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1776-386-0x00007FFBE27D0000-0x00007FFBE27E0000-memory.dmp

                                                                                                      Filesize

                                                                                                      64KB

                                                                                                    • memory/1856-331-0x00000000075D0000-0x0000000007BE0000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.1MB

                                                                                                    • memory/1856-330-0x0000000000530000-0x0000000000766000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.2MB

                                                                                                    • memory/1920-9489-0x0000000000990000-0x0000000000DCC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1920-9490-0x0000000000990000-0x0000000000DCC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1920-9491-0x0000000000990000-0x0000000000DCC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/1920-9499-0x0000000000990000-0x0000000000DCC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2276-9516-0x00000000061F0000-0x000000000624E000-memory.dmp

                                                                                                      Filesize

                                                                                                      376KB

                                                                                                    • memory/2276-9515-0x0000000005710000-0x000000000571A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2276-9514-0x00000000055F0000-0x0000000005682000-memory.dmp

                                                                                                      Filesize

                                                                                                      584KB

                                                                                                    • memory/2276-9513-0x0000000000BE0000-0x0000000000C08000-memory.dmp

                                                                                                      Filesize

                                                                                                      160KB

                                                                                                    • memory/2308-1302-0x000000001DB70000-0x000000001DB7A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2308-1290-0x000000001DB60000-0x000000001DB6A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2308-1252-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                      Filesize

                                                                                                      20KB

                                                                                                    • memory/2308-1254-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                      Filesize

                                                                                                      20KB

                                                                                                    • memory/2308-1262-0x000000001DA50000-0x000000001DB92000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.3MB

                                                                                                    • memory/2308-1227-0x000000001ABE0000-0x000000001AD80000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.6MB

                                                                                                    • memory/2308-1225-0x000000001ABE0000-0x000000001AD80000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.6MB

                                                                                                    • memory/2308-1224-0x00007FFBE66E0000-0x00007FFBE71A1000-memory.dmp

                                                                                                      Filesize

                                                                                                      10.8MB

                                                                                                    • memory/2308-1226-0x000000001ABE0000-0x000000001AD80000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.6MB

                                                                                                    • memory/2308-1247-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                      Filesize

                                                                                                      20KB

                                                                                                    • memory/2308-1250-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                      Filesize

                                                                                                      20KB

                                                                                                    • memory/2308-1275-0x000000001DE20000-0x000000001DF62000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.3MB

                                                                                                    • memory/2308-1267-0x000000001DA50000-0x000000001DB92000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.3MB

                                                                                                    • memory/2308-1263-0x000000001DA50000-0x000000001DB92000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.3MB

                                                                                                    • memory/2308-1248-0x0000000180000000-0x0000000180005000-memory.dmp

                                                                                                      Filesize

                                                                                                      20KB

                                                                                                    • memory/2308-1315-0x000000001E850000-0x000000001EDF4000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.6MB

                                                                                                    • memory/2308-1316-0x000000001F000000-0x000000001F092000-memory.dmp

                                                                                                      Filesize

                                                                                                      584KB

                                                                                                    • memory/2308-1312-0x000000001E4E0000-0x000000001E842000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.4MB

                                                                                                    • memory/2308-1339-0x000000001F2B0000-0x000000001F2CC000-memory.dmp

                                                                                                      Filesize

                                                                                                      112KB

                                                                                                    • memory/2308-1294-0x000000001DB60000-0x000000001DB6A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2308-1292-0x000000001DB60000-0x000000001DB6A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2308-1289-0x000000001DB60000-0x000000001DB6A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2308-1354-0x000000001F2D0000-0x000000001F44C000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.5MB

                                                                                                    • memory/2420-9619-0x0000000000880000-0x0000000000CBC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2420-9633-0x0000000000880000-0x0000000000CBC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2420-9621-0x0000000000880000-0x0000000000CBC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2420-9620-0x0000000000880000-0x0000000000CBC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2868-3213-0x0000000000B00000-0x0000000000F3C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2868-1209-0x0000000000B00000-0x0000000000F3C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2868-1220-0x0000000006090000-0x0000000006634000-memory.dmp

                                                                                                      Filesize

                                                                                                      5.6MB

                                                                                                    • memory/2868-1216-0x0000000000B00000-0x0000000000F3C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2868-1215-0x0000000000B00000-0x0000000000F3C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/2868-1238-0x0000000006CB0000-0x0000000006D16000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/3584-1146-0x0000000000400000-0x0000000001470000-memory.dmp

                                                                                                      Filesize

                                                                                                      16.4MB

                                                                                                    • memory/3604-346-0x00000000000F0000-0x0000000000114000-memory.dmp

                                                                                                      Filesize

                                                                                                      144KB

                                                                                                    • memory/3604-353-0x0000000004FF0000-0x000000000516C000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.5MB

                                                                                                    • memory/3604-358-0x0000000005790000-0x0000000005DA8000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.1MB

                                                                                                    • memory/3604-366-0x0000000005220000-0x0000000005248000-memory.dmp

                                                                                                      Filesize

                                                                                                      160KB

                                                                                                    • memory/3604-365-0x0000000005EC0000-0x0000000005FCA000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.0MB

                                                                                                    • memory/3604-364-0x0000000005290000-0x000000000535E000-memory.dmp

                                                                                                      Filesize

                                                                                                      824KB

                                                                                                    • memory/3604-368-0x0000000005DB0000-0x0000000005EB0000-memory.dmp

                                                                                                      Filesize

                                                                                                      1024KB

                                                                                                    • memory/3604-369-0x0000000005FD0000-0x0000000006000000-memory.dmp

                                                                                                      Filesize

                                                                                                      192KB

                                                                                                    • memory/3604-352-0x0000000004C80000-0x0000000004FE2000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.4MB

                                                                                                    • memory/3604-367-0x00000000053B0000-0x0000000005400000-memory.dmp

                                                                                                      Filesize

                                                                                                      320KB

                                                                                                    • memory/3604-359-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/3604-363-0x0000000005170000-0x00000000051BC000-memory.dmp

                                                                                                      Filesize

                                                                                                      304KB

                                                                                                    • memory/3604-362-0x0000000005400000-0x0000000005686000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.5MB

                                                                                                    • memory/3604-361-0x0000000004C00000-0x0000000004C66000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/3604-360-0x0000000004B50000-0x0000000004B8C000-memory.dmp

                                                                                                      Filesize

                                                                                                      240KB

                                                                                                    • memory/3604-357-0x00000000049C0000-0x00000000049E6000-memory.dmp

                                                                                                      Filesize

                                                                                                      152KB

                                                                                                    • memory/4024-5257-0x0000000000950000-0x0000000000D8C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/4024-5237-0x0000000000950000-0x0000000000D8C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/4024-5158-0x0000000000950000-0x0000000000D8C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/4032-5157-0x00000000206C0000-0x00000000206FC000-memory.dmp

                                                                                                      Filesize

                                                                                                      240KB

                                                                                                    • memory/4032-5153-0x000000001F780000-0x000000001F79A000-memory.dmp

                                                                                                      Filesize

                                                                                                      104KB

                                                                                                    • memory/4032-5278-0x0000000021B30000-0x0000000021B48000-memory.dmp

                                                                                                      Filesize

                                                                                                      96KB

                                                                                                    • memory/4032-5139-0x000000001FB10000-0x000000001FD96000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.5MB

                                                                                                    • memory/4032-5263-0x00000000252C0000-0x0000000025629000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.4MB

                                                                                                    • memory/4032-5202-0x0000000020890000-0x0000000020940000-memory.dmp

                                                                                                      Filesize

                                                                                                      704KB

                                                                                                    • memory/4032-5155-0x000000001FFA0000-0x00000000205B8000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.1MB

                                                                                                    • memory/4032-5262-0x0000000021AE0000-0x0000000021B02000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/4032-5261-0x0000000025090000-0x00000000250C0000-memory.dmp

                                                                                                      Filesize

                                                                                                      192KB

                                                                                                    • memory/4032-5260-0x0000000021BF0000-0x0000000021CFA000-memory.dmp

                                                                                                      Filesize

                                                                                                      1.0MB

                                                                                                    • memory/4032-5259-0x00000000219E0000-0x0000000021A2F000-memory.dmp

                                                                                                      Filesize

                                                                                                      316KB

                                                                                                    • memory/4032-5253-0x0000000021B50000-0x0000000021BEC000-memory.dmp

                                                                                                      Filesize

                                                                                                      624KB

                                                                                                    • memory/4032-5252-0x0000000024390000-0x00000000243E0000-memory.dmp

                                                                                                      Filesize

                                                                                                      320KB

                                                                                                    • memory/4032-5251-0x0000000024340000-0x000000002438A000-memory.dmp

                                                                                                      Filesize

                                                                                                      296KB

                                                                                                    • memory/4032-5236-0x0000000020F20000-0x0000000020F94000-memory.dmp

                                                                                                      Filesize

                                                                                                      464KB

                                                                                                    • memory/4032-5138-0x000000001FAA0000-0x000000001FB06000-memory.dmp

                                                                                                      Filesize

                                                                                                      408KB

                                                                                                    • memory/4032-5187-0x00000000207A0000-0x00000000207DA000-memory.dmp

                                                                                                      Filesize

                                                                                                      232KB

                                                                                                    • memory/4032-5156-0x00000000205C0000-0x00000000206C0000-memory.dmp

                                                                                                      Filesize

                                                                                                      1024KB

                                                                                                    • memory/4032-5159-0x0000000020700000-0x0000000020712000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/4032-5173-0x0000000020740000-0x0000000020752000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/5428-9448-0x00000000006B0000-0x0000000000AEC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5428-9438-0x00000000006B0000-0x0000000000AEC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5428-9437-0x00000000006B0000-0x0000000000AEC000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5748-9618-0x0000000000430000-0x000000000086C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5748-9617-0x0000000000430000-0x000000000086C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5748-9616-0x0000000000430000-0x000000000086C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5748-9630-0x0000000000430000-0x000000000086C000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.2MB

                                                                                                    • memory/5800-9345-0x0000000000740000-0x000000000075A000-memory.dmp

                                                                                                      Filesize

                                                                                                      104KB

                                                                                                    • memory/6072-9553-0x0000000000B80000-0x0000000000B9E000-memory.dmp

                                                                                                      Filesize

                                                                                                      120KB