Analysis

  • max time kernel
    76s
  • max time network
    76s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-05-2024 22:10

General

  • Target

    Voice.ai-Downloader.exe

  • Size

    477KB

  • MD5

    40ffaea0c96bc8fd1ac022ecf287980b

  • SHA1

    c9ff64fecee39aa1a4f1c930d6b6ad423e1b1c14

  • SHA256

    100dba151efe66c842fde4337857fd3db4568c1e3ee008e412927e67ed72094e

  • SHA512

    cc0f2ff6b650644564d7469031c96fcaf93b9dd82318eda244abb65970d2e5697ba27bb0c62e31f4f654cc031ac7f19f0692f444674fd174f9acbc201c8944dd

  • SSDEEP

    3072:ckBGWOsTIJgIDU5A/cNo68pMABlZQ2wpFD0ra42L5GYDxJ0ytta:c1ssjH5Mp2w7g+42LUS6

Malware Config

Signatures

  • Detect ZGRat V1 4 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Drops file in Drivers directory 2 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 47 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Voice.ai-Downloader.exe
    "C:\Users\Admin\AppData\Local\Temp\Voice.ai-Downloader.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Program Files\Voice.ai\VoiceAI-Installer.exe
      "C:\Program Files\Voice.ai\VoiceAI-Installer.exe" /path "C:\Program Files\Voice.ai"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Program Files\Voice.ai\tools\vc2019.exe
        "C:\Program Files\Voice.ai\tools\vc2019.exe" /q /norestart
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Windows\Temp\{574143FE-2D4B-4784-BD6B-3A1685ACFFAF}\.cr\vc2019.exe
          "C:\Windows\Temp\{574143FE-2D4B-4784-BD6B-3A1685ACFFAF}\.cr\vc2019.exe" -burn.clean.room="C:\Program Files\Voice.ai\tools\vc2019.exe" -burn.filehandle.attached=692 -burn.filehandle.self=720 /q /norestart
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\.be\VC_redist.x64.exe
            "C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{2FC10A6B-A3A8-473B-8EA1-CB31D19F8C27} {941CEBF5-94FE-4D3B-B80F-DD5AA63DBF67} 1496
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2168
            • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
              "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={2aaf1df0-eb13-4099-9992-962bb4e596d1} -burn.filehandle.self=1000 -burn.embedded BurnPipe.{5E04FAD4-9114-4451-999D-D2859191E52F} {B4E7A024-DA0F-40CB-A452-D0AFF4745AC6} 2168
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2072
              • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
                "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.filehandle.attached=544 -burn.filehandle.self=560 -uninstall -quiet -burn.related.upgrade -burn.ancestors={2aaf1df0-eb13-4099-9992-962bb4e596d1} -burn.filehandle.self=1000 -burn.embedded BurnPipe.{5E04FAD4-9114-4451-999D-D2859191E52F} {B4E7A024-DA0F-40CB-A452-D0AFF4745AC6} 2168
                7⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1572
                • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
                  "C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{EAF67CBD-FCAF-4256-901E-5DCEC8F4E170} {3C2A76FA-EB6F-4A66-969A-7D4CEBA695E4} 1572
                  8⤵
                  • Modifies registry class
                  PID:3212
      • C:\Program Files\Voice.ai\VoiceAI.exe
        "C:\Program Files\Voice.ai\VoiceAI.exe" installdriver
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies system certificate store
        PID:4168
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe" "C:\Program Files\Voice.ai\VoiceAI.exe"
        3⤵
          PID:4860
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:3132
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      1⤵
        PID:4960
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4648
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
        1⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of WriteProcessMemory
        PID:3964
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5f0cc972-95d5-e140-90e7-231603f0571f}\voiceaidriver.inf" "9" "46b7f3743" "0000000000000158" "WinSta0\Default" "0000000000000148" "208" "c:\program files\voice.ai\voiceaidriver"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:2976
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:ed86ca11bfc96d40:VOICEAIDRIVER_SA:16.36.0.99:root\voiceaidriver," "46b7f3743" "0000000000000158" "95d6"
          2⤵
          • Drops file in Drivers directory
          • Drops file in Windows directory
          PID:2412
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Program Files\Voice.ai\VoiceAI.exe
          "C:\Program Files\Voice.ai\VoiceAI.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files\Voice.ai\debug.log" --mojo-platform-channel-handle=2580 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2 --host-process-id=3000
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:3860
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:/Program Files/Voice.ai/VoiceAI.exe" discord 3000
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:2436
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --log-file="C:\Program Files\Voice.ai\debug.log" --mojo-platform-channel-handle=3012 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 --host-process-id=3000
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:4880
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --log-file="C:\Program Files\Voice.ai\debug.log" --mojo-platform-channel-handle=3032 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 --host-process-id=3000
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:3980
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=renderer --log-severity=disable --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --autoplay-policy=no-user-gesture-required --log-file="C:\Program Files\Voice.ai\debug.log" --use-fake-ui-for-media-stream --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3392 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker --host-process-id=3000 /prefetch:1
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:2972
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=renderer --log-severity=disable --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --no-sandbox --autoplay-policy=no-user-gesture-required --log-file="C:\Program Files\Voice.ai\debug.log" --use-fake-ui-for-media-stream --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3408 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker --host-process-id=3000 /prefetch:1
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:3344
          • C:\Program Files\Voice.ai\VoiceAI.exe
            "C:\Program Files\Voice.ai\VoiceAI.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --cefsharpexitsub --log-file="C:\Program Files\Voice.ai\debug.log" --mojo-platform-channel-handle=3732 --field-trial-handle=2612,i,7030096661047451465,14357084263169654692,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 --host-process-id=3000
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1944
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004F0
        1⤵
          PID:4000

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57d1dc.rbs

          Filesize

          19KB

          MD5

          bff63ed979931476154e5c3d26f8dd1d

          SHA1

          5fb42da9e46ac05cf3e882feb4a0d0a5c48cd74f

          SHA256

          0b9b830de7c0e5ff02bbc861de43b6a3a2433ff06ef2423666f3ca98c3a0a543

          SHA512

          6a38d99bf6222620d070b1278edcc2b331d2388bcace8e6db310635332cfa7972d6cdc1ac0a0cb0cb7c4b9f09351c4f38e6f1be3db0cc66ebf8beada0c54c9ed

        • C:\Config.Msi\e57d1e8.rbs

          Filesize

          19KB

          MD5

          23207b4af990bc41a2fe3138817e65f7

          SHA1

          a7a7bd219cade836e338ab8d11fb4a9a95fdeb67

          SHA256

          20f5970004fe732d05c54cdc1a4c55b6dfd0f04696d170da0732e2bbc5e5aebf

          SHA512

          9352d74b460ddf22ee00893fdb05c37872b118cee3251fcc8c9513fe088dfbc0fa3f844df90f1a725ed199d6eae62e9951ae0f376c4d6917bebfc72a77179899

        • C:\Config.Msi\e57d1ef.rbs

          Filesize

          21KB

          MD5

          d3f4562a755a0a8b3e92e026e839d14f

          SHA1

          d34112d23a1c9ae1a5e056260b2fb0e73c6aea08

          SHA256

          898d0f5a759f1bd2cce2f368474038b1adebc8f088060d120b66551597602835

          SHA512

          652ce76b6ede3f1f59380e9a1be621eefefd9936630cb5aa63ab9ba7ba18c5d45ec6269f720a3b5a7071d359b7f0e36e82d198a47dfe90ea973118c4e8de1e06

        • C:\Config.Msi\e57d1fe.rbs

          Filesize

          21KB

          MD5

          c1266af6d6b24daafb2db2634cd2fcd4

          SHA1

          54afe0a2f802131a36b77676754d5e58a911500c

          SHA256

          5ebb9ea420ec539cff510eb667ab418ac7fa0c1115eb670d0416714a782e8ffc

          SHA512

          50a769f11dbbb2e2d074920508433bb7db9ccac93dac4a8d3d6b03ef599abc364a494a90ab18e352815bba4348f91077f43e4a4928934bd3b48be816b038122c

        • C:\Program Files\Voice.ai\AudioConverter.dll

          Filesize

          425KB

          MD5

          1dbdc883fe4375e343e574bf085c0148

          SHA1

          e2235e18bcb3cececcdc6024426de2437596e8c4

          SHA256

          67271bdbe5fbc4f77fb9ec5c206da226e76245e1fbf48753156e9dcb6e5b946f

          SHA512

          43242a0697b497a24f2b80533658d4ed9c85f37925bec471aa8b5646bfdefd9d996ab896c2d63f21ff648fc5494b24a35e4f6717041c9c97c09ca585285682a8

        • C:\Program Files\Voice.ai\CefSharp.dll

          Filesize

          1.0MB

          MD5

          69f79d227400c5c5a17e4fe6b5719009

          SHA1

          d7ace396db95eced9b4f98badc4282f359999d28

          SHA256

          7be25c5ddbbad217fcb40dbef92ba783bb8a155d3db48cde5a4c32e13761cbf7

          SHA512

          49262793c3b64fd454522381856761e456999d36e84ee228a894cefa4e19473302e9d7941d49b3a4d6faed98b136a18d60fb1dfdeaf4119f6fddb4c82da6f24c

        • C:\Program Files\Voice.ai\DriverManager.dll

          Filesize

          82KB

          MD5

          0ca711f575bca2fae56fd952d9af1276

          SHA1

          d53d175ddc924431707b8a6e4e4e834094a5fc6e

          SHA256

          a789ea2806ebb04f8f9fb59c2ee0d407b64e5c33042ca7cd68aeee2fed6b0ea0

          SHA512

          513de025729d4eb9f9edcbf42b5f5012321ecf1383ce2af0dd6e71b881e72f310d937b59df28cb9e416a79c4294a629da07be68a1c1622f0f1f499c8babbebc1

        • C:\Program Files\Voice.ai\VoiceAI.exe

          Filesize

          3.9MB

          MD5

          0473d284b2db13ffa1544854870561dd

          SHA1

          6aa3dc4437cc084228009c120798ca766fee596e

          SHA256

          cd3704d37f1127da9504b6186cdd4a0cd21f3d8445e78c9aad33d080538091d1

          SHA512

          3e077ea5487f0eecc587688cc773b77edd78fe5f643b994f854bcc9f7356262199af96996005b02e074ac3eb5613aaf0b38e1e21d2dd4ff49dda058cedfd0783

        • C:\Program Files\Voice.ai\VoiceAIDriver\VoiceAIDriver.inf

          Filesize

          14KB

          MD5

          fa4ddfa2231dc2c50e26794ae7356e0b

          SHA1

          463f4c2ac4f7505f2361c7853505b19fbe08f257

          SHA256

          a3554efa382a84130393a4d8656b31f06b20b9387e27fcba978162213fb7be90

          SHA512

          be11de31cdea93320a03892b572b17985a66d8b8483d1568afcba9d6cd73cfc8f86c628736d9c8649cb9af0acba17dc26c14fef55b2951520236f650b5a55946

        • C:\Program Files\Voice.ai\meta

          Filesize

          23B

          MD5

          6997abf8c138e85961f89ee82ae53532

          SHA1

          32e7d5b03035f8e6597493168003890c0a3ed29a

          SHA256

          0fbae5806b1bc5bf6f68ae6bc0975be1ec56e27edcb4a572792246e2aa8d1ccf

          SHA512

          b176783b0c4c6503d8274484b7584acd8d7a9a29b73da63f9a01184f54e7fc7aef330301c6b97a717aa22bc96547aa8156dd432c5b15107e4b23cfa7b23da17a

        • C:\Program Files\Voice.ai\tools\vc2019.exe

          Filesize

          24.1MB

          MD5

          4a85bfd44f09ef46679fafcb1bab627a

          SHA1

          7741a5cad238ce3e4ca7756058f2a67a57fee9d1

          SHA256

          37ed59a66699c0e5a7ebeef7352d7c1c2ed5ede7212950a1b0a8ee289af4a95b

          SHA512

          600e61332416b23ef518f4252df0000c03612e8b0680eab0bdf589d9c855539b973583dc4ce1faab5828f58653ed85a1f9196eb1c7bbf6d2e3b5ab3e83253f98

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          1KB

          MD5

          41899fb113d050926076f808946530fe

          SHA1

          01641b0f78d93f110ce79cea4f1168d0489fb698

          SHA256

          357746c690dd3c63ea3d5b0c7f49e12e8d6b56ff4fb9ca4e7d964fbe6bfdd0a4

          SHA512

          90d8f12538f0f0f5f516aa6f5c819fa76f45be23391ea36bfdb36bf8cc31a34a63855ae1fd046126194119e644de086f1af7c9f604ed3b1ab830d2d08e0e9bba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

          Filesize

          471B

          MD5

          759ceaf45e7df3917a40365daee30714

          SHA1

          a79d16c3fbb151f10d8ad58a3ccf316ee80355e3

          SHA256

          97bd3bcec9b59ca9fb5f3adca914992de556a876d47045e24543da56073f3dc1

          SHA512

          0ca69ffbfa8b96cb60aa5f43617326886b13ef7c69623241cd87fd67605a7e13b5ef1bf040584f6a92b190637a3795bfe0c5eac9d348a47ebcc264d73c5102cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

          Filesize

          727B

          MD5

          62af5c9799d1414a7c65acdf6314317d

          SHA1

          e771b110bcf62cb5a1109859bb5f12187f76293c

          SHA256

          b5a2c4e070f26aa983c09e89c571c2635bffb45a0f03d4472090f722ea78bc92

          SHA512

          cc1081876b37831293ef96562a1ce7f088bb23f53db86c867aa127e8c3a8710131f7f3b8a2c9512e35a5d54e565c346394edafe1dbbcbc64a8b409ab56201cfa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          724B

          MD5

          8202a1cd02e7d69597995cabbe881a12

          SHA1

          8858d9d934b7aa9330ee73de6c476acf19929ff6

          SHA256

          58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

          SHA512

          97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          7b64ebd297ba3e5a3dbeec67bed340a3

          SHA1

          66ca4f0ff71d9cc2e298c7717994983df368f103

          SHA256

          157c92db12e0caf25b49166b96f4f831b59243ad5048f3c6db8f295987269da3

          SHA512

          917da04e8417f5adb325c7589d2915370b40d0ef3fddc0303ce0e43dc82b97a4c090fb3cb06f3547097898b2032c99e5031e24c01a9b6df4b4329ba3d33cd246

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

          Filesize

          400B

          MD5

          634353000a2f7e559c41884ecdcec632

          SHA1

          ea58453da0639a1a00cc415b03a1c196ef77de21

          SHA256

          68ed29b77a5222d5d4bc93c7caddc283690478a66319800fd80a445f6066b99d

          SHA512

          4ca241d4e0ed3ab4b8954a6498f16ab7dddd977bc2ec25ce77d6befe0090bbec7ea7213664bd30706ed1470bf19b9eaaab8bacc7bc35857a5de28e5a6e18dea1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

          Filesize

          412B

          MD5

          f21129e82e3131c7d1b802ffd25dedfd

          SHA1

          f7d513aae59feefaceb98f028f393565442ae12c

          SHA256

          a4a6d6ee86b21306c7560cbe9b6009dd240871cadcf23c727d6cd57d76f07c37

          SHA512

          7bf9884a37ae82904b1a84ad2a1f14e443d4aa9f78a9b45e3dac8e97a425f30325ade151c1e37f3d7c4a40e33a1d833e1bf38138c5bc00411e9b5600e0d21a19

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

          Filesize

          392B

          MD5

          ab446911a75372ee2dee6a150e0ab1e2

          SHA1

          c7f07f2c4ea1eec73b0479c59a7cb8bfa82dbc7d

          SHA256

          99a4f63611585385c361e569498525787a21e0ccc61b1111b52bebb5a27135c4

          SHA512

          91cd295a2158dff9300f288057774e9ad4c25e5e1cbfea12ec621cb87866eb5512e0a5b00a5d055046f7e4a36a8bcd083dfac6f885eb8a4eafe5bda031090f5b

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\VoiceAI.exe.log

          Filesize

          1KB

          MD5

          b4e91d2e5f40d5e2586a86cf3bb4df24

          SHA1

          31920b3a41aa4400d4a0230a7622848789b38672

          SHA256

          5d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210

          SHA512

          968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J6994X5U\user-event[1].json

          Filesize

          16B

          MD5

          7363e85fe9edee6f053a4b319588c086

          SHA1

          a15e2127145548437173fc17f3e980e3f3dee2d0

          SHA256

          c955e57777ec0d73639dca6748560d00aa5eb8e12f13ebb2ed9656add3908f97

          SHA512

          a2fd24056e3ec2f1628f89eb2f1b36a9fc2437ae58d34190630fe065df2bbedaf9bd8aee5f8949a002070052ca68cc6c0167214dd55df289783cff682b808d85

        • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_amd64_20240514221332_000_vcRuntimeMinimum_x64.log

          Filesize

          3KB

          MD5

          1aa58af75ca07a65b859b82221187e18

          SHA1

          e0eab6253a99aebe47f6e78a37cec7950d68b9f0

          SHA256

          b33b96f969641fac7e3a332e64b106f3bd312b665c9c39b395f2792767b7dd06

          SHA512

          2741722a2a2e78644e778bc1196fe805388e622a92a1df9d0c1822c04d659184b8443f3dac6c8d556b83ed056f5729d9a550e46c211feb16c3ce74461c8d97b0

        • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_amd64_20240514221332_001_vcRuntimeAdditional_x64.log

          Filesize

          2KB

          MD5

          6fb3b0dce8d8fcca68840bb90dd65bb6

          SHA1

          f2eed738f25142849c1dfe2eaefaf47a9ad72435

          SHA256

          18bf19e688384b387d2a93efa38a626a12f866d42ef9f1a0cc096db33fcb26eb

          SHA512

          73639ab35ac3cbd413aa109ce185b26e19b9a3ec548d15c480d06d52b3cdbff85cf4e485ff0bb159a9eff81cefa4a19552537db92346dc7f59d31ce7ee809a91

        • C:\Users\Admin\AppData\Local\Temp\nsi41BD.tmp\INetC.dll

          Filesize

          21KB

          MD5

          2b342079303895c50af8040a91f30f71

          SHA1

          b11335e1cb8356d9c337cb89fe81d669a69de17e

          SHA256

          2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

          SHA512

          550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

        • C:\Users\Admin\AppData\Local\Temp\nsi41BD.tmp\System.dll

          Filesize

          12KB

          MD5

          792b6f86e296d3904285b2bf67ccd7e0

          SHA1

          966b16f84697552747e0ddd19a4ba8ab5083af31

          SHA256

          c7a20bcaa0197aedddc8e4797bbb33fdf70d980f5e83c203d148121c2106d917

          SHA512

          97edc3410b88ca31abc0af0324258d2b59127047810947d0fb5e7e12957db34d206ffd70a0456add3a26b0546643ff0234124b08423c2c9ffe9bdec6eb210f2c

        • C:\Users\Admin\AppData\Local\Temp\nsi41BD.tmp\nsProcess.dll

          Filesize

          4KB

          MD5

          05450face243b3a7472407b999b03a72

          SHA1

          ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

          SHA256

          95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

          SHA512

          f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b

        • C:\Users\Admin\AppData\Local\Temp\nsw8A9E.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          f5b0c649b0cfc103fb113d013d48cacb

          SHA1

          f89286966000cb053b7e94100c76ec6d1129af07

          SHA256

          a87bd092fa5bc00661525455b9f866b68c14c29224520c4e38f56f47234cfc1e

          SHA512

          e184101a03ee1c8896efb0029a02a23e46d422bc0f250ef15349c8214d44156afe2b5f739d8a2339bc2d1c05984fc55651c36c71897cd4b14f41dd37a25cfb01

        • C:\Users\Admin\AppData\Local\Voice.ai\Cache\Local Storage\leveldb\CURRENT

          Filesize

          16B

          MD5

          46295cac801e5d4857d09837238a6394

          SHA1

          44e0fa1b517dbf802b18faf0785eeea6ac51594b

          SHA256

          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

          SHA512

          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

        • C:\Users\Admin\AppData\Local\Voice.ai\Cache\Session Storage\MANIFEST-000001

          Filesize

          41B

          MD5

          5af87dfd673ba2115e2fcf5cfdb727ab

          SHA1

          d5b5bbf396dc291274584ef71f444f420b6056f1

          SHA256

          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

          SHA512

          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

        • C:\Windows\System32\vcruntime140.dll

          Filesize

          95KB

          MD5

          7415c1cc63a0c46983e2a32581daefee

          SHA1

          5f8534d79c84ac45ad09b5a702c8c5c288eae240

          SHA256

          475ab98b7722e965bd38c8fa6ed23502309582ccf294ff1061cb290c7988f0d1

          SHA512

          3d4b24061f72c0e957c7b04a0c4098c94c8f1afb4a7e159850b9939c7210d73398be6f27b5ab85073b4e8c999816e7804fef0f6115c39cd061f4aaeb4dcda8cf

        • C:\Windows\Temp\{574143FE-2D4B-4784-BD6B-3A1685ACFFAF}\.cr\vc2019.exe

          Filesize

          635KB

          MD5

          9bd591625766a7330708b2c6380dc1d7

          SHA1

          18018a3d12278187a8dc26eae538a799511bbdfc

          SHA256

          21503f265452414f3960b33ba000ab2cbe0a335901e3a585b0935ac4806fdd79

          SHA512

          58c90b7889d92f31e76d0559258023cb4693982288721c3c7fcd820e40f6c1ee972d9ffd3c95016c2126314a260da5faabdeb1a8528eb23d469a7ecbe391c1a5

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\.ba\logo.png

          Filesize

          1KB

          MD5

          d6bd210f227442b3362493d046cea233

          SHA1

          ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

          SHA256

          335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

          SHA512

          464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\.ba\wixstdba.dll

          Filesize

          191KB

          MD5

          eab9caf4277829abdf6223ec1efa0edd

          SHA1

          74862ecf349a9bedd32699f2a7a4e00b4727543d

          SHA256

          a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

          SHA512

          45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\cab2C04DDC374BD96EB5C8EB8208F2C7C92

          Filesize

          5.4MB

          MD5

          6ce5097b19cf57527651840bb438adf3

          SHA1

          49d0b725e5819a076562fd007490eca0bbb69003

          SHA256

          f24a3bc5df7e7c07c0d13f46348c989eae7f597f428b20cc9044bba47785b7f0

          SHA512

          9152301c4f87018d166b624d73919fc2da7e7ef74b2c1ecf8ad01c31c2b2239013cc3bc22237c81940ae96a5fd1b3698d260c3d3e0a9d0318cdc053e28328d83

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\cab5046A8AB272BF37297BB7928664C9503

          Filesize

          879KB

          MD5

          8e288dd0b5e0468ed8ae01ee566e77e8

          SHA1

          fbd11237ae3300a2202444d339601d1ac6bbf310

          SHA256

          c80addc870825e9a1aa9281e105e583973ec2846bbd74f1e97cb60911ba7a2e1

          SHA512

          facc72bdcdd5de47c0d18ecb5288962b04d9e4924a9a07ee807a3bf0eaa77eac05f086906b680bcf97c3bad5fab0038b47c0e09cd2bbec1d0709eba015bc1c04

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\vcRuntimeAdditional_x64

          Filesize

          180KB

          MD5

          e6df9f55e20905f77b136844a3844dd6

          SHA1

          b7c1fb12bda508a62fdd9ffa9e870cae50605aaa

          SHA256

          f8745f3523ea73806d591fa4e666e86c30c7e5240a07211a0c11a7633d16c4f0

          SHA512

          7c71c2b9a7d3d768d1686cb037362efb9e38c50b652bfaeb22cf86c6c47a85962f9893cbf5e2f86880c9c8fc8bc0278edeb47088813e022ef05d7db15efc0713

        • C:\Windows\Temp\{84F473F9-1295-426A-987C-F067BACCF892}\vcRuntimeMinimum_x64

          Filesize

          180KB

          MD5

          143a2b9f1c0ebc3421b52e9adcb4db2e

          SHA1

          06e01b8cc855fd9a31f99b430f8c8745e706c677

          SHA256

          5d0416e45819d555ad27e5efc1aeeb465cbb8e2937b3221852bea0f7d9c3a954

          SHA512

          7e17309cdaa856bd1bf17535e0f65db585226262a1c9ffcaadb19eb0822a578ad9036487870b97fc86b7167848f69d495aa51c380ba9890a71f8f9a94061fa05

        • \??\c:\PROGRA~1\voice.ai\VOICEA~1\voiceaidriver.sys

          Filesize

          71KB

          MD5

          90e4c7c347839c09c8f7f45de3f4fda1

          SHA1

          18c5a6fae8c9292702d62e9ad2da1e24336f72c6

          SHA256

          74c4c2f122d48548019314fe15a331b81bfc10408b0d6f471dee94e37fe3c1bc

          SHA512

          2cf37738f112026eeb68636423e619be5e34cae7734ab1cab5d8cc799af7509d2ffca09b566cbe46bb47f54981042099e857660acc2ab24558715408c011bd58

        • \??\c:\program files\voice.ai\voiceaidriver\VoiceAIDriver.cat

          Filesize

          12KB

          MD5

          26f1832c761580eab272ae065f644005

          SHA1

          bdd7eb53423659de315d88ad5bb557ffdf5593a5

          SHA256

          bae9e5bbff837d0ebb43ca1ff1a275474d8e50832a590a957afc8d3ee1e5f560

          SHA512

          a0c5c4fa7dcc9d4347a521863b9ba4fd2f5eda4d49f70498c4e89c54b59b7773835796e0cc83470c191e1231c69885d22efe823a3a96b2b971ccd1473e2630eb

        • memory/1572-498-0x0000000000F80000-0x0000000000FF7000-memory.dmp

          Filesize

          476KB

        • memory/2072-499-0x0000000000F80000-0x0000000000FF7000-memory.dmp

          Filesize

          476KB

        • memory/3000-667-0x000001CC22D80000-0x000001CC22D8A000-memory.dmp

          Filesize

          40KB

        • memory/3000-670-0x000001CC22DB0000-0x000001CC22DC0000-memory.dmp

          Filesize

          64KB

        • memory/3000-669-0x000001CC22DD0000-0x000001CC22DE2000-memory.dmp

          Filesize

          72KB

        • memory/3000-668-0x000001CC3B8B0000-0x000001CC3B92C000-memory.dmp

          Filesize

          496KB

        • memory/3000-671-0x000001CC3BC50000-0x000001CC3BE11000-memory.dmp

          Filesize

          1.8MB

        • memory/3000-672-0x000001CC3E0A0000-0x000001CC3E262000-memory.dmp

          Filesize

          1.8MB

        • memory/3000-743-0x000001CC3F510000-0x000001CC3F580000-memory.dmp

          Filesize

          448KB

        • memory/3000-744-0x000001CC40250000-0x000001CC40778000-memory.dmp

          Filesize

          5.2MB

        • memory/3212-461-0x0000000000F80000-0x0000000000FF7000-memory.dmp

          Filesize

          476KB

        • memory/3860-689-0x00000224F7A10000-0x00000224F7B2C000-memory.dmp

          Filesize

          1.1MB

        • memory/4168-557-0x000002077BCE0000-0x000002077BDE4000-memory.dmp

          Filesize

          1.0MB

        • memory/4168-551-0x0000020760FB0000-0x000002076139C000-memory.dmp

          Filesize

          3.9MB

        • memory/4168-555-0x000002077B890000-0x000002077B8FC000-memory.dmp

          Filesize

          432KB