Credential Leakage f1 bull red

#Got this info from a redbull local admin, have been digging them for a while and here is some
#contact me if interested more: [email protected]

#username:password
local admin —
[email protected]: Ready6d6c16f13c23b6be50bfcPlayer=Admin7328a6a5b61bc03f1a2ac4009a48165e0aab1ee3c42
[email protected]: Tororosso_(ePuZ#R+EXt)Ga@

employee —
[email protected]:LegioneLazio1900Immobile
[email protected]
[email protected]
[email protected]
[email protected]:Rotfl12#
[email protected]:googledotcomstrongpass18at@
[email protected]
[email protected]:1Factorial!=0
[email protected]
[email protected]:c
[email protected]: (IP: 88.238.110.51) (Vidar malware log)
[email protected]: 1996@2pac_is_legend
[email protected]
[email protected]: ILOVEMichaelandElisa
[email protected]:Masteryilegend@lol
[email protected]:BenReDBull8888888
[email protected]:ciasteczkoproproszetak
[email protected]:
[email protected]: Choo4Kalai#oneormore
[email protected]:
[email protected]
[email protected]: Lekkeryoh_mamOneill1979
[email protected]:ichliebemichundmeineFamilie:))
[email protected]: Choi-lebalibdelbPantheonforzaaa

service account —
krbtgt
gmsa1
AskDS
svc_sql01
sv_resa02
[email protected]
adfsvc
MSA-App1
Service01
testsvc
RBDOM\MSLY\RTCService
RBDOM\RTCService

computer name —
RBDOMMS16-OSO1
RBDOMMS16-LDS5