Resubmissions

28/02/2025, 14:45

250228-r44veszyat 3

28/02/2025, 13:17

250228-qje5ws1jv7 10

28/02/2025, 12:52

250228-p4e5yszrt5 10

28/02/2025, 12:32

250228-pqra3ayyhz 10

Analysis

  • max time kernel
    66s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2025, 12:32

General

  • Target

    http://www.mediafire.com/file/v04wcs9dlfq5ke0/VanishRaider-main.rar/file

Malware Config

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7213845603:AAFFyxsyId9av6CCDVB1BCAM5hKLby41Dr8/sendDocument

Signatures

  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://www.mediafire.com/file/v04wcs9dlfq5ke0/VanishRaider-main.rar/file
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6faf46f8,0x7ffe6faf4708,0x7ffe6faf4718
      2⤵
        PID:4136
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:2224
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
          2⤵
            PID:3312
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
            2⤵
              PID:116
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
              2⤵
                PID:220
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:8
                2⤵
                  PID:4700
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1976
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
                  2⤵
                    PID:3488
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                    2⤵
                      PID:3044
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                      2⤵
                        PID:5232
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:1
                        2⤵
                          PID:5540
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5188 /prefetch:8
                          2⤵
                            PID:5664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:1
                            2⤵
                              PID:5672
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5684
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:1
                              2⤵
                                PID:5436
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:1
                                2⤵
                                  PID:5440
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:1
                                  2⤵
                                    PID:5940
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10082106181890340477,17846643103486182584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:1
                                    2⤵
                                      PID:5948
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3856
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4012
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:5400
                                        • C:\Program Files\7-Zip\7zG.exe
                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\VanishRaider-main\" -ad -an -ai#7zMap4958:96:7zEvent25
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          PID:6084
                                        • C:\Users\Admin\Downloads\VanishRaider-main\VanishRaider-main\vanish.exe
                                          "C:\Users\Admin\Downloads\VanishRaider-main\VanishRaider-main\vanish.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:396
                                        • C:\Users\Admin\Downloads\VanishRaider-main\VanishRaider-main\vanish.exe
                                          "C:\Users\Admin\Downloads\VanishRaider-main\VanishRaider-main\vanish.exe"
                                          1⤵
                                          • Executes dropped EXE
                                          PID:5400

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\240c3743-6bac-4f85-88be-b67ed442a3ad.tmp

                                          Filesize

                                          11KB

                                          MD5

                                          431996ead5bff21134216e18acf86c3b

                                          SHA1

                                          ea8f4d63250e55a9bf519b16ed9f0385fff09f46

                                          SHA256

                                          3bac7557f1376816dfd551b007fbc0ef9cc729355a0d48af261b42302b89263d

                                          SHA512

                                          c466553cd60fbf34aa689e8186ceea282691b2d6938d216d1fe2ecad689092761781221c6e0d3778f4786348a64e16efb2dc3bc73a66830837d1103469484b05

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          f5da507c2059b715761792e7106405f0

                                          SHA1

                                          a277fd608467c5a666cf4a4a3e16823b93c6777f

                                          SHA256

                                          8c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8

                                          SHA512

                                          01c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          3c6e13dc1762aa873320bed152204f3c

                                          SHA1

                                          38df427d38ca5ce6ce203490a9fb8461c7444e12

                                          SHA256

                                          5c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371

                                          SHA512

                                          133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

                                          Filesize

                                          214KB

                                          MD5

                                          d20fef07db1e8a9290802e00d1d65064

                                          SHA1

                                          71befda9256ed5b8cd8889f0eeab41c50d66e64e

                                          SHA256

                                          f9cb4624d03224bfce50c4c0e484418acd462c249f38b4684e72b27a1f30144d

                                          SHA512

                                          ad5b2c8df60027c6dd5104bb8c2357b04eb24d69245c607ff99a6f2a887f929428252ad793d9aaa8c903c7b1e1bf9653cd35f79747d5281e7e3d2c21fa828537

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                          Filesize

                                          912B

                                          MD5

                                          1ebd7a1f894c4c6840ebfe5f515d0147

                                          SHA1

                                          144e1d1ff5a061157b9cc7bb94151153ee757bbe

                                          SHA256

                                          5d6f3a8c73ffe7c4f2f1048faafb419c9a64294a15fb857bd02914b9295c5efc

                                          SHA512

                                          c3a827f8312d62a6dded86ff3f2ba89719f9f58f966c8ad60878affbd671d588b6b7f22a405c2cef7b7db41d4b5ce1b925c37b80ede5f98b2d4ca58fc56396ae

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          3dec40bb0e514367f8b143256a6bcff8

                                          SHA1

                                          4595b4d1739669923750b743fb86a8b79caf8180

                                          SHA256

                                          08abddd08f5c2ddac643cf0a944f0c9b91c2b845e789979528cf2844e513b5d1

                                          SHA512

                                          2543b254945d50d7015ee647220922731954ecfb6a44238eed242f2ed483799a5ab17a426fee22cdac3d2b0ead56564cdd52021ae2e441c1c3fb3cccec887dec

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          8KB

                                          MD5

                                          d5a5af0ae2eb95e50bdb99a85e899aa6

                                          SHA1

                                          4f11f3760ab3a19484404bd220b09c1fe9c3d67c

                                          SHA256

                                          418160e4608a2c8e713f0cb8a8b90d37c715f7f173a996e3ca32a32dec1338e3

                                          SHA512

                                          a9c70a31fdab009d24d0ddbfde805f473f2d4b50fd1db0d8d7c4234574a46574145d4422a557cfc4cdd95ef6863b726d3677e520666a4f5c554ba0181c8f105d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          8KB

                                          MD5

                                          4e1122bd9bcace22d63c41178cc6fcee

                                          SHA1

                                          24e55b89d1c3dfa838435ffb3cc73a448c749f77

                                          SHA256

                                          d05023485cb1b9c2043c9f68b175f07b77f5cf396712ed18a5a1a6b62879c009

                                          SHA512

                                          bd35b1d3d0e2847b369ce6963345435b7a0aa78f9c3650f0bf31b89a96363036d6ffbb1ec020b1e2654cd6249dd76e63a13ebda705f98a96a1dc6a9f8488759a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          6752a1d65b201c13b62ea44016eb221f

                                          SHA1

                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                          SHA256

                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                          SHA512

                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0

                                          Filesize

                                          44KB

                                          MD5

                                          9e95f2b8ce25ab9f237a8cbe2554683d

                                          SHA1

                                          fbd78d5586970067b91648b0531208c5d632eced

                                          SHA256

                                          751ad033e1b4787ee7fce1092c354f40a60616c701e044aa2ba06692525e650e

                                          SHA512

                                          f256a46023501cbcdde4c570c74bbc6e87a3d675c5076551cadb1705de928533c20c22d2557cf8291898828ec9cb954cd463ada4ed5c054dd793d70da597c63c

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          0851cc0fb97a4b1360c5fef52603296a

                                          SHA1

                                          1811bf17df60ddf2a1a914678aa9746ab5e36d07

                                          SHA256

                                          72d2eb83ce2f8db1dd5d9abe3939b452ef4fe8bcf521103bff1322328decfc76

                                          SHA512

                                          6009c1c1756939e25cab7b2c40246b99c89839de47f1b6824d31db3eb1bd0a48f39349b9ca30436149d4039bcf7a2f1063067c92b7732f835ebe8ee2d2e51b87

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_3

                                          Filesize

                                          4.0MB

                                          MD5

                                          a7b3ce5a4be327e500c08ad906d81bb2

                                          SHA1

                                          87bce2b2a02786c997dae06511867ac34589bd94

                                          SHA256

                                          eebafeab9c2b1ebd33001cca045a11f725a826c786b1f15b1a685448ae3948fa

                                          SHA512

                                          bfcf56ed3cd7a9025345578667361c221298bffddd837a24bfa7dd97ffd385c6f544433afa69a7cd0b71b5c2b57574203d5e13c3d15a8b377fd5029381019acd

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Browser

                                          Filesize

                                          120B

                                          MD5

                                          a397e5983d4a1619e36143b4d804b870

                                          SHA1

                                          aa135a8cc2469cfd1ef2d7955f027d95be5dfbd4

                                          SHA256

                                          9c70f766d3b84fc2bb298efa37cc9191f28bec336329cc11468cfadbc3b137f4

                                          SHA512

                                          4159ea654152d2810c95648694dd71957c84ea825fcca87b36f7e3282a72b30ef741805c610c5fa847ca186e34bde9c289aaa7b6931c5b257f1d11255cd2a816

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                          Filesize

                                          11B

                                          MD5

                                          838a7b32aefb618130392bc7d006aa2e

                                          SHA1

                                          5159e0f18c9e68f0e75e2239875aa994847b8290

                                          SHA256

                                          ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                          SHA512

                                          9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          b89bdc5cd045f0a128ed69e93596a34b

                                          SHA1

                                          30195ea00497b5ddc37084b9d76143ad7c41ff0a

                                          SHA256

                                          2b0caf0a679e2ce128cf6582ea40d1d566bc157b8a6ba24755120a7561f8541e

                                          SHA512

                                          d00f485e04467e8bc2607de5ab7f96eea7158ed96d0ec780d882c8a3f5a33357e3a8a88a168d9df5216624dbdf40c2143fc7db7a7acc56018b6c6f5fdabbfe89

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          11KB

                                          MD5

                                          f7f9c8cb20d71a7bf3b4dca8a5a245e9

                                          SHA1

                                          bc43ed6e074effac573c4757c7eebb6ac673a392

                                          SHA256

                                          cd3682b51fc49abb25bf20c0f516ded0fef42282ca63666d72eced232b179bd3

                                          SHA512

                                          16245fc4906afe5dd154218e3e7492f9c6d2f8f2e29c3d1e8a50c0f8b43fb6a5fd40d838e0e9933646de8a1b427a12029c97c24d3933b007ae9feb98b21881ef

                                        • C:\Users\Admin\Downloads\VanishRaider-main.rar

                                          Filesize

                                          61KB

                                          MD5

                                          3d15d9b5d05223d0b812f1f51eb05ecb

                                          SHA1

                                          7f0f19e7128f546193685be6efe39a2ec61d8175

                                          SHA256

                                          c39552926a046eca64dab7cafbc9002ae22d592cba749fa03b6416b4a299431d

                                          SHA512

                                          7c65b4fddf10687c119718d136e45c570c4a5f9bb2ddbb23731813b5975d79a91ec062d7722909ede8ced4ac5a6fdb654ca9f1780546f50400f5de095f088ef1

                                        • C:\Users\Admin\Downloads\VanishRaider-main\VanishRaider-main\vanish.exe

                                          Filesize

                                          137KB

                                          MD5

                                          ac59764dee7fcebe61b0a9d70f87c1e1

                                          SHA1

                                          4faba8946b946a6eeb121561417ae13e4ec8c606

                                          SHA256

                                          c6487e1da77c82d40628312680ad43343cff5b92462ffeeffed30f46b23625ab

                                          SHA512

                                          b71f1dbc069ee6612b0d6a136d77080f919958e7a6bcdf65260e04ac5efc484042aca0716dda8199970bf7f2d0f4864a4888e3b0dcfd1ef858c615f839c3ac65

                                        • memory/396-219-0x00000208FEE20000-0x00000208FEE48000-memory.dmp

                                          Filesize

                                          160KB