Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe
-
Size
6.3MB
-
MD5
852d4f447f4aac4f61063ef5849e68b8
-
SHA1
8529bba312dd85254ac2240e1f57d98c0fed1766
-
SHA256
9ef8406742a277c694c6e454c16c95528377f0ba8cb56f37a7dfdd53d803c6ec
-
SHA512
19586186fa50405d2b972bd25344833db52076451e68dac985156e8bc96beea6469e9f1fae1cc7afd3f8eeef3b4d24d2b844af93888df56b927b7a266e794c59
-
SSDEEP
98304:qOKFSYln3X0qnvbXEsBc4i3dxgkVRdgjh5Fn4zj0IBTGFJZkdk3AgWcxHE9hDgPf:ynBDEsBqtxgkVRdETnooFOk3bW2k9E
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\VBCQJU\FNO.exe family_ardamax -
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\system32\drivers\SET9D68.tmp DrvInst.exe File created C:\Windows\system32\drivers\SET9D68.tmp DrvInst.exe File opened for modification C:\Windows\system32\drivers\ScreamingBAudio64.sys DrvInst.exe -
Executes dropped EXE 6 IoCs
Processes:
FNO.exeMorphVOXPro4_Install-1.exesetup.exedotnetchk.exeSBAudioInstallx64.exeMorphVOXPro.exepid process 2124 FNO.exe 2200 MorphVOXPro4_Install-1.exe 2668 setup.exe 2656 dotnetchk.exe 2456 SBAudioInstallx64.exe 752 MorphVOXPro.exe -
Loads dropped DLL 38 IoCs
Processes:
852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exeFNO.exeMorphVOXPro4_Install-1.exesetup.exemsiexec.exeMsiExec.exeMsiExec.exeMsiExec.exeMorphVOXPro.exepid process 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe 2124 FNO.exe 2124 FNO.exe 2200 MorphVOXPro4_Install-1.exe 2200 MorphVOXPro4_Install-1.exe 2200 MorphVOXPro4_Install-1.exe 2200 MorphVOXPro4_Install-1.exe 2200 MorphVOXPro4_Install-1.exe 2200 MorphVOXPro4_Install-1.exe 2668 setup.exe 2124 FNO.exe 2124 FNO.exe 2668 setup.exe 2668 setup.exe 2668 setup.exe 2668 setup.exe 2360 msiexec.exe 1612 MsiExec.exe 1612 MsiExec.exe 1612 MsiExec.exe 316 MsiExec.exe 316 MsiExec.exe 316 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 2636 MsiExec.exe 752 MorphVOXPro.exe 752 MorphVOXPro.exe 752 MorphVOXPro.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FNO.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FNO Start = "C:\\Windows\\SysWOW64\\VBCQJU\\FNO.exe" FNO.exe -
Blocklisted process makes network request 5 IoCs
Processes:
msiexec.exemsiexec.exeMsiExec.exeflow pid process 3 2360 msiexec.exe 14 1344 msiexec.exe 16 1344 msiexec.exe 17 2636 MsiExec.exe 19 2636 MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 40 IoCs
Processes:
DrvInst.exe852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exeMsiExec.exeFNO.exeSBAudioInstallx64.exeMorphVOXPro.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C7E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C7F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C80.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File created C:\Windows\SysWOW64\VBCQJU\FNO.004 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe File created C:\Windows\SysWOW64\VBCQJU\AKV.exe 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_7B21B1879692B91DD3F23589CB604185 MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\infstor.dat DrvInst.exe File created C:\Windows\SysWOW64\VBCQJU\FNO.008 FNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\60E31627FDA0A46932B0E5948949F2A5 MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_7B21B1879692B91DD3F23589CB604185 MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\ScreamingBAudio64.sys DrvInst.exe File created C:\Windows\SysWOW64\VBCQJU\FNO.exe 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76} DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt SBAudioInstallx64.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat SBAudioInstallx64.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\sbaudio-x64.inf_amd64_neutral_cede75ee029e14f7\sbaudio-x64.PNF DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA MorphVOXPro.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA MorphVOXPro.exe File created C:\Windows\SysWOW64\VBCQJU\FNO.002 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D47DBD2F9E3365FBBE008D71FB06716F_4DD1053BCC726DA41115FFF4C7D6E9CC MsiExec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SBAudio-x64.cat DrvInst.exe File created C:\Windows\System32\DriverStore\INFCACHE.0 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat SBAudioInstallx64.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D47DBD2F9E3365FBBE008D71FB06716F_4DD1053BCC726DA41115FFF4C7D6E9CC MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C7F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C80.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\sbaudio-x64.inf_amd64_neutral_cede75ee029e14f7\sbaudio-x64.PNF DrvInst.exe File opened for modification C:\Windows\SysWOW64\VBCQJU\FNO.008 FNO.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\sbaudio-x64.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File created C:\Windows\SysWOW64\VBCQJU\App_Nov_02_2024__11_20_15.html FNO.exe File created C:\Windows\SysWOW64\VBCQJU\FNO.001 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VBCQJU\ FNO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5 MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{5855d180-fee5-6996-9fa2-5620e941ea76}\SET9C7E.tmp DrvInst.exe -
Drops file in Program Files directory 30 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\alias_audition.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\ScreamingBAudio64.sys msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphDriverInstallClass.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\alias_next.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\morphon.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\sbaudio-x64.cat msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\sfx_prev.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphDriverInstallClass.InstallState MsiExec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphDriverUninstall2.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBSSettings.xml msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\sfx_audition.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudio-x64.inf msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\sbaudio-x86.cat msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphSupport.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\muteon.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudio-x86.inf msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphDSP.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\EULA.rtf msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\alias_prev.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphDriverInstallHelper.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\OggVorbis.dll msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudioInstallx64.exe msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\sfx_next.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\GoToSleep.wav msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphVOXPro.exe msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\morphoff.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\muteoff.ogg msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\Interop.SpeechLib.DLL msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\ScreamingBAudio.sys msiexec.exe File created C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\Interop.IWshRuntimeLibrary.dll msiexec.exe -
Drops file in Windows directory 31 IoCs
Processes:
msiexec.exeDrvInst.exeDrvInst.exeSBAudioInstallx64.exeDrvInst.exedescription ioc process File created C:\Windows\Installer\f777d1c.msi msiexec.exe File opened for modification C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_6FEFF9B68218417F98F549.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\oem2.inf DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\setupact.log DrvInst.exe File created C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_782962480EF130D54240D3.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.app.log SBAudioInstallx64.exe File opened for modification C:\Windows\INF\setupapi.ev2 DrvInst.exe File opened for modification C:\Windows\setuperr.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI8F95.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8FE4.tmp msiexec.exe File created C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_F1977320CE89883406EB64.exe msiexec.exe File created C:\Windows\Installer\f777d1f.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\f777d1c.msi msiexec.exe File created C:\Windows\Installer\f777d1d.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_6FEFF9B68218417F98F549.exe msiexec.exe File opened for modification C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_782962480EF130D54240D3.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\f777d1d.ipi msiexec.exe File opened for modification C:\Windows\Installer\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\_F1977320CE89883406EB64.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI90CF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9266.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log SBAudioInstallx64.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MorphVOXPro.exeFNO.exesetup.exemsiexec.exeMsiExec.exeMsiExec.execmd.exe852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exeMorphVOXPro4_Install-1.exedotnetchk.exeMsiExec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MorphVOXPro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FNO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MorphVOXPro4_Install-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dotnetchk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MorphVOXPro.exeDrvInst.exeSBAudioInstallx64.exeDrvInst.exeDrvInst.exeMsiExec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties MorphVOXPro.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Speakers (High Definition Audio\WaveOutId = "0" MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A762-90C8-11D0-BD43-00A0C911CE86}\Microphone (Screaming Bee Audio\CLSID = "{E30629D2-27E5-11CE-875D-00608CB78066}" MorphVOXPro.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A762-90C8-11D0-BD43-00A0C911CE86}\Line In (High Definition Audio \FilterData = 02000000000020000000000000000000 MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound: Speakers (High Definition Audio Device) MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MorphVOXPro.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device\FriendlyName = "Default DirectSound Device" MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software MorphVOXPro.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A762-90C8-11D0-BD43-00A0C911CE86}\Microphone (Screaming Bee Audio\ClassManagerFlags = "2" MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates MorphVOXPro.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device\CLSID = "{79376820-07D0-11CF-A24D-0020AFD79767}" MorphVOXPro.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\GDIPlus\FontCachePath = "C:\\Users\\Admin\\AppData\\Local" MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum MorphVOXPro.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates SBAudioInstallx64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates SBAudioInstallx64.exe -
Modifies registry class 33 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4A75A88547E4D724D8C0AA81BE4E937F msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\Version = "67305481" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\ProductIcon = "C:\\Windows\\Installer\\{588A57A4-4E74-427D-8D0C-AA18EBE439F7}\\_6FEFF9B68218417F98F549.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\luiE669.tmp\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\Clients = 3a0000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphVOXPro.exe\MorphVOXPro,Version="4.3.9.20651",Culture="neutral",PublicKeyToken="14A89F21EFE9C134",ProcessorArchitecture="x86" = 5d0034006f004e00440055005d004b00470039002a0024006d0077002a002500440079004e0078003e007200690038006a0049006b00790076004f006a0077006d0045002600400024005f0057007600570000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|Interop.IWshRuntimeLibrary.dll msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4A75A88547E4D724D8C0AA81BE4E937F\DefaultFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\BD0827B3A65E8834EBD87072B5CBEEF6 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphVOXPro.exe msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|Interop.SpeechLib.DLL msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphDriverInstallClass.dll msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphDriverUninstall2.dll\MorphDriverUninstall2,Version="3.5.3839.28451",Culture="neutral",PublicKeyToken="14A89F21EFE9C134",ProcessorArchitecture="x8 = 5d0034006f004e00440055005d004b00470039002a0024006d0077002a002500440079004e0078003e0057006a004100450065002c006100610039007600770046006e004800300045006f0068005a00690000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\InstanceType = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphDriverInstallClass.dll\MorphDriverInstallClass,Version="3.1.3839.28450",Culture="neutral",PublicKeyToken="14A89F21EFE9C134",ProcessorArchitecture = 5d0034006f004e00440055005d004b00470039002a0024006d0077002a002500440079004e0078003e006c007b00620024005e007a00320076002d0056006c00770026003400290025006e0028006b00240000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\AdvertiseFlags = "388" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|Interop.SpeechLib.DLL\Interop.SpeechLib,Version="5.0.0.0",Culture="neutral",PublicKeyToken="14A89F21EFE9C134",ProcessorArchitecture="MSIL" = 5d0034006f004e00440055005d004b00470039002a0024006d0077002a002500440079004e0078003e007b004a00210053004d007900470059005f005500350030005500350029005e0026006a007600770000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|Interop.IWshRuntimeLibrary.dll\Interop.IWshRuntimeLibrary,Version="1.0.0.0",Culture="neutral",PublicKeyToken="14A89F21EFE9C134",ProcessorArchitecture= = 5d0034006f004e00440055005d004b00470039002a0024006d0077002a002500440079004e0078003e0046006a0070004a00610077003700610075007200290060006d00510040005f007a0054004f00390000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\BD0827B3A65E8834EBD87072B5CBEEF6\4A75A88547E4D724D8C0AA81BE4E937F msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\luiE669.tmp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Assemblies\C:|Program Files (x86)|Screaming Bee|MorphVOX Pro|MorphDriverUninstall2.dll msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\ProductName = "MorphVOX Pro" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\PackageName = "MorphVOXPro.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\PackageCode = "D03D9C8B79F2F884490B61D8BB3F4AF1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4A75A88547E4D724D8C0AA81BE4E937F\SourceList\Media msiexec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
FNO.exeMorphVOXPro4_Install-1.exemsiexec.exepid process 2124 FNO.exe 2124 FNO.exe 2200 MorphVOXPro4_Install-1.exe 1344 msiexec.exe 1344 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
FNO.exemsiexec.exemsiexec.exedescription pid process Token: 33 2124 FNO.exe Token: SeIncBasePriorityPrivilege 2124 FNO.exe Token: SeShutdownPrivilege 2360 msiexec.exe Token: SeIncreaseQuotaPrivilege 2360 msiexec.exe Token: SeRestorePrivilege 1344 msiexec.exe Token: SeTakeOwnershipPrivilege 1344 msiexec.exe Token: SeSecurityPrivilege 1344 msiexec.exe Token: SeCreateTokenPrivilege 2360 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2360 msiexec.exe Token: SeLockMemoryPrivilege 2360 msiexec.exe Token: SeIncreaseQuotaPrivilege 2360 msiexec.exe Token: SeMachineAccountPrivilege 2360 msiexec.exe Token: SeTcbPrivilege 2360 msiexec.exe Token: SeSecurityPrivilege 2360 msiexec.exe Token: SeTakeOwnershipPrivilege 2360 msiexec.exe Token: SeLoadDriverPrivilege 2360 msiexec.exe Token: SeSystemProfilePrivilege 2360 msiexec.exe Token: SeSystemtimePrivilege 2360 msiexec.exe Token: SeProfSingleProcessPrivilege 2360 msiexec.exe Token: SeIncBasePriorityPrivilege 2360 msiexec.exe Token: SeCreatePagefilePrivilege 2360 msiexec.exe Token: SeCreatePermanentPrivilege 2360 msiexec.exe Token: SeBackupPrivilege 2360 msiexec.exe Token: SeRestorePrivilege 2360 msiexec.exe Token: SeShutdownPrivilege 2360 msiexec.exe Token: SeDebugPrivilege 2360 msiexec.exe Token: SeAuditPrivilege 2360 msiexec.exe Token: SeSystemEnvironmentPrivilege 2360 msiexec.exe Token: SeChangeNotifyPrivilege 2360 msiexec.exe Token: SeRemoteShutdownPrivilege 2360 msiexec.exe Token: SeUndockPrivilege 2360 msiexec.exe Token: SeSyncAgentPrivilege 2360 msiexec.exe Token: SeEnableDelegationPrivilege 2360 msiexec.exe Token: SeManageVolumePrivilege 2360 msiexec.exe Token: SeImpersonatePrivilege 2360 msiexec.exe Token: SeCreateGlobalPrivilege 2360 msiexec.exe Token: SeCreateTokenPrivilege 2360 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2360 msiexec.exe Token: SeLockMemoryPrivilege 2360 msiexec.exe Token: SeIncreaseQuotaPrivilege 2360 msiexec.exe Token: SeMachineAccountPrivilege 2360 msiexec.exe Token: SeTcbPrivilege 2360 msiexec.exe Token: SeSecurityPrivilege 2360 msiexec.exe Token: SeTakeOwnershipPrivilege 2360 msiexec.exe Token: SeLoadDriverPrivilege 2360 msiexec.exe Token: SeSystemProfilePrivilege 2360 msiexec.exe Token: SeSystemtimePrivilege 2360 msiexec.exe Token: SeProfSingleProcessPrivilege 2360 msiexec.exe Token: SeIncBasePriorityPrivilege 2360 msiexec.exe Token: SeCreatePagefilePrivilege 2360 msiexec.exe Token: SeCreatePermanentPrivilege 2360 msiexec.exe Token: SeBackupPrivilege 2360 msiexec.exe Token: SeRestorePrivilege 2360 msiexec.exe Token: SeShutdownPrivilege 2360 msiexec.exe Token: SeDebugPrivilege 2360 msiexec.exe Token: SeAuditPrivilege 2360 msiexec.exe Token: SeSystemEnvironmentPrivilege 2360 msiexec.exe Token: SeChangeNotifyPrivilege 2360 msiexec.exe Token: SeRemoteShutdownPrivilege 2360 msiexec.exe Token: SeUndockPrivilege 2360 msiexec.exe Token: SeSyncAgentPrivilege 2360 msiexec.exe Token: SeEnableDelegationPrivilege 2360 msiexec.exe Token: SeManageVolumePrivilege 2360 msiexec.exe Token: SeImpersonatePrivilege 2360 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
msiexec.exeMorphVOXPro.exepid process 2360 msiexec.exe 752 MorphVOXPro.exe 752 MorphVOXPro.exe 2360 msiexec.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
MorphVOXPro.exepid process 752 MorphVOXPro.exe 752 MorphVOXPro.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
FNO.exeMorphVOXPro.exepid process 2124 FNO.exe 2124 FNO.exe 2124 FNO.exe 2124 FNO.exe 752 MorphVOXPro.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exeMorphVOXPro4_Install-1.exesetup.exemsiexec.exeMsiExec.exeFNO.exedescription pid process target process PID 2072 wrote to memory of 2124 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe FNO.exe PID 2072 wrote to memory of 2124 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe FNO.exe PID 2072 wrote to memory of 2124 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe FNO.exe PID 2072 wrote to memory of 2124 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe FNO.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2072 wrote to memory of 2200 2072 852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe MorphVOXPro4_Install-1.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2200 wrote to memory of 2668 2200 MorphVOXPro4_Install-1.exe setup.exe PID 2668 wrote to memory of 2656 2668 setup.exe dotnetchk.exe PID 2668 wrote to memory of 2656 2668 setup.exe dotnetchk.exe PID 2668 wrote to memory of 2656 2668 setup.exe dotnetchk.exe PID 2668 wrote to memory of 2656 2668 setup.exe dotnetchk.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 2668 wrote to memory of 2360 2668 setup.exe msiexec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 1612 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 316 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 1344 wrote to memory of 2636 1344 msiexec.exe MsiExec.exe PID 2636 wrote to memory of 2456 2636 MsiExec.exe SBAudioInstallx64.exe PID 2636 wrote to memory of 2456 2636 MsiExec.exe SBAudioInstallx64.exe PID 2636 wrote to memory of 2456 2636 MsiExec.exe SBAudioInstallx64.exe PID 2636 wrote to memory of 2456 2636 MsiExec.exe SBAudioInstallx64.exe PID 2636 wrote to memory of 752 2636 MsiExec.exe MorphVOXPro.exe PID 2636 wrote to memory of 752 2636 MsiExec.exe MorphVOXPro.exe PID 2636 wrote to memory of 752 2636 MsiExec.exe MorphVOXPro.exe PID 2636 wrote to memory of 752 2636 MsiExec.exe MorphVOXPro.exe PID 2124 wrote to memory of 2668 2124 FNO.exe cmd.exe PID 2124 wrote to memory of 2668 2124 FNO.exe cmd.exe PID 2124 wrote to memory of 2668 2124 FNO.exe cmd.exe PID 2124 wrote to memory of 2668 2124 FNO.exe cmd.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\852d4f447f4aac4f61063ef5849e68b8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\VBCQJU\FNO.exe"C:\Windows\system32\VBCQJU\FNO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\VBCQJU\FNO.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\MorphVOXPro4_Install-1.exe"C:\Users\Admin\AppData\Local\Temp\MorphVOXPro4_Install-1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\luiE669.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\luiE669.tmp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\VSDE7DF.tmp\DotNetFX\dotnetchk.exe"C:\Users\Admin\AppData\Local\Temp\VSDE7DF.tmp\DotNetFX\dotnetchk.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\Admin\AppData\Local\Temp\luiE669.tmp\MorphVOXPro.msi"4⤵
- Loads dropped DLL
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2360
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E9D7C029AD1C335274F1B254055CC185 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2ED0C138E1C0848171A7DE0E1289A85E2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6BDDE368D9E48E17CB0BC991D0BBD0B1 M Global\MSI00002⤵
- Loads dropped DLL
- Blocklisted process makes network request
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudioInstallx64.exe"C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudioInstallx64.exe" i "C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\SBAudio-x64.inf" "*ScreamingBAudio"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2456
-
-
C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphVOXPro.exe"C:\Program Files (x86)\Screaming Bee\MorphVOX Pro\MorphVOXPro.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:752
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2092
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003B8" "0000000000000598"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:684
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{4e00f37b-14c5-3be6-9a08-90797aa3a527}\sbaudio-x64.inf" "9" "6892a7cef" "00000000000003F4" "WinSta0\Default" "0000000000000598" "208" "c:\program files (x86)\screaming bee\morphvox pro"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1616
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "sbaudio-x64.inf:SBAudio.NTAMD64:SBEE_Audio:2.0.3.0:screamingb\audio&ver2:*screamingbaudio" "6892a7cef" "00000000000003F4" "00000000000005E0" "00000000000005F8"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD57837b58f8e22bfd1b6f83a85e90b4618
SHA19e85afe6b32c60c35786cac56f5bb340156131d8
SHA256e3be7f86405a582b9e6bfbb552c2acb91713d615f7278f43c90d34d172e96a6f
SHA512adb87fb621e6756c9ee8c7fb5d155862220c51cb2520350c24ad885f6c5844d0b549602b095b9d39590e80c4ce3089cd9291aeb7fd512da6c99ff7c88fc6d808
-
Filesize
53KB
MD594890b280164e74bacac5f0cca722957
SHA16f3821343e06174a5ca1ad1ca87007d04582c0ba
SHA25661bc5b6cb3f3653cf36790cdb1caa6112716ce8062f595cfc4ced655c0ac5e75
SHA5128231e18b065507a330856bc4ee9646bc927803c585ce552f71ef2394131e119062cdbc91427527b5a5e92cd9fd400beb30c5c7cb9e88cdd7b50d2d3664413c8a
-
Filesize
14KB
MD581e8fc57bda495ce4cbf7347ce8b6431
SHA183b1b3c86a3064c1c70b39f102231f61398fb784
SHA256e042103c1bce5ce0a1af8308a17ae79ef3c415dffca4980f61b914cda71161bb
SHA5129adc66acc19bf9936c7543d1a0baf7524fcc9d4b65220b848a4a7009bf25aaa1eb62a28f750f6cc3720e7669edafba309415a9e8ab232afb6aacb43f4076df36
-
Filesize
70KB
MD5f3f8bf4e2ed2b7363dcf9c45d748d328
SHA12dc013bf257b10eb7bb3538cc2c11b87276ce561
SHA256fb5ea5469d1e61fa199dad6bfa30e17b26f8fc29df6e65c03532017700990bac
SHA512843b09bcebe03b7971fe1f9ec2cfaadc198d7a9996db05ee0b787ea49630d37c9fb57fb335ed3d79cf0950f279aa3a06ff213c9988b39a12722f5929b7305884
-
Filesize
5.4MB
MD53eddcfa9d7d3496b9bd3cc5876eed4a5
SHA1f6d95a0876293947b86941ebc8ccab5b841b027b
SHA25629e368872a7a6e2235ff97450d3b6231c3c363f8025ff753b570a969791e21ff
SHA512e79fe726fac1593019b7bb49ff2941e461b953274ac5d59a97fa39c0a30a17d328c3948a1848917a99cae8b9d12299e172129d5e9ab90bdc4c9a39493fa18535
-
Filesize
3KB
MD524b34f2a52988e4e4a60120647353cfa
SHA13fb81ff5aacaf1fc6ffa970aca5fe26dc4828603
SHA2568fa1f1f58bccbed09bbd41f354bd3981731a8e4a749dd0c9b81537cea87af9a8
SHA512901b9258c1aeb22cf4bba823f47190775cb97cf5a79c47306a364f13de167de606472ce4127a168603f948ab97c51bda014ee1c3acb75d24ac21b4c6329c57dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4DD39726D4B55AC3B4119B35A893323C_B3A886FA3C8164A3F02FCB44EE73FFCA
Filesize404B
MD5664b2327b5e2ad29e6ef3a69f3b869c5
SHA13306f23b86c2a8f5feb3435799bd122c1dc9813a
SHA2563444c333da2831b92fa69d74aaaefb15ceeb895a51e053d67aa093e76ec7e5e7
SHA5121425a5a97241654da79f4d94644a94f6cad9e9ea31114d0a01bd1971b6fc1fef22f2f44c31124b76cdf83bb5cea7c8af46c948bf3a89de75ef8454ec2a9abdbf
-
Filesize
123B
MD517af548f88a3199aa8a63a72201f470f
SHA14e64bb20a2f54d778ed684aa21abebad63a5c2c0
SHA256a558dbe555749cd3bdd62060fdbba72720c4f4a186d5870b977ed2acf9721d9e
SHA51208bdbc75f5fd4d9ec85c53253e4030ce7245b20ecc95e032835609c7c43a07d6c9e7776f48c5494a788a543240c0649a9f1a34a0e514ebc4dda5730953647338
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
222KB
MD5fb4ed24de182178cac3cd3870a4ba5b6
SHA138b168fbe97b72a5de5eaef16535ea1aed964e1b
SHA2565070b4cdf7e2f95535f3340a3a0d9bce496478d0bd445b470dd67278a910c578
SHA51203ffa685a28333cc7d8eb4a0fdd8c5dce85ca1126bcdefebda83a91586b98ae559d56074b943a6df0ec011eaa58b6841026ffb8b42e08b74351b0118011d3c9a
-
Filesize
5.0MB
MD515b3a804efbf15a9aea2bc0be1de70d6
SHA1b2209f7fa7940df3785701b10fb3a37efe114a3e
SHA2562811da99c134a951686c8420869368b6d2413faebd445e33bb754b2ec3d3e349
SHA512bb74e835ac5ca2933548e648654eb0a88c63eb364e554825715e57450a8b722543084a202a21337d52493ab58717f51c2a70c97e5b303a44e914dc7c5d8d0d80
-
Filesize
5.1MB
MD5b53e5e973c4eafe272f2a4bf53a0343b
SHA12fc88d6519789af0e7a75ba7b394bc26349cef55
SHA256c0ca185450341bc714859cf24a85a9e6a2d31650427ab8101026a91ff455a6cf
SHA512098044422bfd064ee96761e458e675a2454d41ae07bc55d294ece79e72b64c5199260ec98ff76f8c8827d3ad2a6483ac807267414f1dd52e845a62997a82c010
-
Filesize
60KB
MD546b24723e5126a6f7a3a7d6facee18a7
SHA11cbcaa27406d66115814231977b970a805726a2c
SHA256d14b73d7a21be2a97dcea3e6a997fc846406bf2c699370acd769aa7f097aaec2
SHA512f3ad9a1ae3f55058bfc256441d62b4110b38e1f2b3328e09ad47805f1c312cdf67b313e5f5a67d19fa128e0082d08dd79f1fff6ea3fc49bf544b733a827b626d
-
Filesize
102KB
MD5b011a4a55df9c8d2f8113445c059ee0e
SHA1e6e733724a3c3c45093feaaa9d0578a41b0b0d2b
SHA256b0f73ec2b4eedc632cb1a314edcd855bf0ba50cdedae138746a606934a20eb0f
SHA512df1dfb1edcc0f95ea819cc6dfe0da47e2294f249ad5a1a9cc7fc4520e35a6abf92b3b41681c44267373839fe2e36cbcd98474ec4b6cdaa31040f455ea3d0eadc
-
Filesize
485KB
MD5b905540561802896d1609a5709c38795
SHA1a265f7c1d428ccece168d36ae1a5f50abfb69e37
SHA256ce666ce776c30251bb1b465d47826c23efaa86ec5ee50b2a4d23a4ceb343ed53
SHA5127663654f134f47a8092bae1f3f9d46732d2541ab955e7604d43a0def1e61e2bc039a6753e94d99f1d04b69f55a86f1fb937513671019f1bdf100edb97b24badc
-
Filesize
61KB
MD543a9733e89a458d638ffb6a2a475d557
SHA1f19a7513a53208e6b9295acff974181b593675a4
SHA2568d093cbce69e6d77abec376639a2814653873db3d49d270effc5536de51a5930
SHA5125e5fa1e02deba80eb8098e6e2ed89ac29a7c5204a713ed6725a0ca070c5da19670171ba1e1fbe38aab5cc5f15061ca8c1a66060fdd633a3270d1609135d4052e
-
Filesize
43KB
MD5f195701cf2c54d6ceadad943cf5135b8
SHA19beb03fc097fc58d7375b0511b87ced98a423a08
SHA256177c1dcc7f13158445f0b99713e9cad205da86e764940a48d43dc375565b0dec
SHA512f78def1ab431bb2b7b647ec76c063c30a87cabd22605f94cbe4fbb6f757fd54ddf7861d3842a0e369abfce94b68d41dec0fe2322a74f67d9875f561f92b20025
-
Filesize
1KB
MD5a66cd6f8075ca7e165aa66d6a2cb6dc2
SHA1d20e7735ee697e4c9a6e5babfbb7ea03a2b9c1fc
SHA256b6db1985cfc190a3e8c9dbd67e83174000d396f5617a2204055a9d653b673dd4
SHA5129b992c3cd4cace9cde7c036c040e3e97771cc6deb5a00dc7816e5f76039b257c2225166f5e634556d0d0a7b0749f98e8c0de46f15342aa82b7b3cad91efcc3e4
-
Filesize
1KB
MD50b55ce0261890e8167f42cbd950aa54c
SHA1d8eb47b7d011c6ba874101eec3e6df6e035d3739
SHA256b19983594b03ec727d7f0c1ce04a98899b229a1296292434d0ca9ff1eb198b4c
SHA5122898590decb1abd24dae99ea8b5e4c9afabe7e81bea5ae18c30b636aeec15b29a08dd79870765fba6e5848f07c2c0bf6c900d0e6f40d1e3ade4bf6eedc414af4
-
Filesize
38KB
MD58b56bdce6a303dde63d63440d1cf9ad1
SHA1c51b124eea04b6388b313bd3494891cff5b394cf
SHA25666a4356c29d00a1b8a95975c073ae4e6d2a90cbf3b143fe9b83b96bec0805d46
SHA512e02d9b221e3d94325b540eea2c0d35d089150f406e0ba35e37234644c1359880572abb7cfce61da64582129e7214a55f48a85bcc1352366b1844e497e22b2108
-
Filesize
7KB
MD554edf263c49e02cd6b6794d7a8d312be
SHA130ccf63aa2b614263a4c38f9bfdba812d6d85996
SHA256c9c37745986d6e1505ad6647aa4cfd0c2b258d54a6d402f2b9983f228c604c9d
SHA5123eef4442a5b7e037eab909687158b75cee546a901748eede414cf1ea155bce7f3276a744d0d2c085e9d2b28978dab3c427587b80de96185ba0fe9d9696c0e5b9
-
Filesize
55KB
MD5f6fe452fca855571d55c0540c2210cc7
SHA1e9ceef78724e91c764324268e0f41beab18a39d6
SHA2562f02a87aec74ffbe2d77132a2ece3fc6b47c604f694cfc2fd18d127790b6e874
SHA5129b6ffe1ec72c6313ce410bf795b029da408839338d8f5a8d0124f5ed816cd5a36a877bca1eed10a148f3e11813b6eb14448ff815a3a12b9a387e092915dc8ec7
-
Filesize
86KB
MD5289df668f70cd5cdfe36fea4b491fa28
SHA16d78099c40542b11771389fa38938724905167f2
SHA2562e643745991bac3e5ec460b0bbbe2002f433c77a82514122b31708302ecc9306
SHA512b7d115d34f9e4ad73f89c04221855b3f3c6dac4b009c7d5b268cfcf651ea4cbd9588ab7a690392b1d1a4afae3b47d3d20bf1ff4f98a2bbfefed1c4cef7d04499
-
Filesize
476KB
MD53481b4721a4d1a5797685619f3ba2b80
SHA18aa8e3fb49f7e73012f9e12f80b95f3ac72f3728
SHA25638dbabae225d93cebde5087128a7376be4a0528dc8e60b22081fba71c9f18b92
SHA512a95b4b4e9068f69d489291a302b7ab8fa255de646400a3ca315decbf5f89446bbba1e906b2d8493ebc474e7d06b869af363ba6ffa624218322e9ca30b775f998
-
Filesize
1.7MB
MD5d95623e481661c678a0546e02f10f24c
SHA1b6949e68a19b270873764585eb1e82448d1e0717
SHA256cecfadce6fb09b3977c20d15fb40f8f66a1d7e488a4794451d048a598c3417da
SHA512dee02644d92ed30e88bb10e9dcdba97abd9949b230059ec20cf5d93061f9cdb77b1e793e5f69d0b51595c30077c3ddd093348d22b070ce898ccefe28b8062591