Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
MalRepairToolkitSetup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MalRepairToolkitSetup.exe
Resource
win10v2004-20230915-en
General
-
Target
MalRepairToolkitSetup.exe
-
Size
6.0MB
-
MD5
23f2491a8116caf1d2b1f5b39676577f
-
SHA1
5f51b6110c8f1cdea547ff873778e24cb6b20596
-
SHA256
a44aaca64d14fa31d3752ae67fe709a3cdec6369f4547792cbe60e4a1f945bf8
-
SHA512
535ec265ba12da399e8d73f6f7305ddea1bc50a804ae8d09e219ad7819da63bc3949495eda888b66c59ef6628651b266125161187e100e1e24d668732458d187
-
SSDEEP
98304:00xNLNQWgAERBO59FQr58uXfCB52ceG6XKALJE/mQmN+fmYmVzgdgoB9H:1xNufAVucP6XKk0m9N+fmYmXoTH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" MalRepairToolkit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe," MalRepairToolkit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "2" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" MalRepairToolkit.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" MalRepairToolkit.exe -
Disables Task Manager via registry modification
-
Sets file execution options in registry 2 TTPs 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieUnatt.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msoadfsb.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msoasb.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onenotem.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PresentationHost.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\selfcert.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\splwow64.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spoolsv.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\excelcnv.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msohtmed.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powerpnt.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\graph.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ieinstal.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msosrec.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wordconv.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PrintIsolationHost.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runtimebroker.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ExtExport.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mscorsvw.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\onenote.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\orgchart.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sdxhelper.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ielowutil.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msfeedssync.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SystemSettings.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winword.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msosync.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msqry32.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ngen.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setlang.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ngentask.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PrintDialog.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\clview.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\excel.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ie4uinit.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msoxmled.exe MalRepairToolkit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe MalRepairToolkit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation MalRepairToolkitSetup.exe -
Executes dropped EXE 1 IoCs
pid Process 8 MalRepairToolkit.exe -
Loads dropped DLL 20 IoCs
pid Process 736 MalRepairToolkitSetup.exe 736 MalRepairToolkitSetup.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4548 MsiExec.exe 4568 MsiExec.exe 4568 MsiExec.exe 4568 MsiExec.exe 4568 MsiExec.exe 736 MalRepairToolkitSetup.exe 4568 MsiExec.exe 4548 MsiExec.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" MalRepairToolkit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "\"%1\" %*" MalRepairToolkit.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" MalRepairToolkit.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: MalRepairToolkitSetup.exe File opened (read-only) \??\B: MalRepairToolkitSetup.exe File opened (read-only) \??\R: MalRepairToolkitSetup.exe File opened (read-only) \??\O: MalRepairToolkitSetup.exe File opened (read-only) \??\S: MalRepairToolkitSetup.exe File opened (read-only) \??\X: MalRepairToolkitSetup.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: MalRepairToolkitSetup.exe File opened (read-only) \??\U: MalRepairToolkitSetup.exe File opened (read-only) \??\A: MalRepairToolkitSetup.exe File opened (read-only) \??\K: MalRepairToolkitSetup.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: MalRepairToolkitSetup.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: MalRepairToolkitSetup.exe File opened (read-only) \??\Z: MalRepairToolkitSetup.exe File opened (read-only) \??\J: MalRepairToolkitSetup.exe File opened (read-only) \??\L: MalRepairToolkitSetup.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: MalRepairToolkitSetup.exe File opened (read-only) \??\H: MalRepairToolkitSetup.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: MalRepairToolkitSetup.exe File opened (read-only) \??\Y: MalRepairToolkitSetup.exe File opened (read-only) \??\Z: MalRepairToolkitSetup.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: MalRepairToolkitSetup.exe File opened (read-only) \??\S: MalRepairToolkitSetup.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: MalRepairToolkitSetup.exe File opened (read-only) \??\L: MalRepairToolkitSetup.exe File opened (read-only) \??\R: MalRepairToolkitSetup.exe File opened (read-only) \??\E: MalRepairToolkitSetup.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: MalRepairToolkitSetup.exe File opened (read-only) \??\G: MalRepairToolkitSetup.exe File opened (read-only) \??\V: MalRepairToolkitSetup.exe File opened (read-only) \??\I: MalRepairToolkitSetup.exe File opened (read-only) \??\N: MalRepairToolkitSetup.exe File opened (read-only) \??\X: MalRepairToolkitSetup.exe File opened (read-only) \??\M: MalRepairToolkitSetup.exe File opened (read-only) \??\U: MalRepairToolkitSetup.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\K: MalRepairToolkitSetup.exe File opened (read-only) \??\M: MalRepairToolkitSetup.exe File opened (read-only) \??\Q: MalRepairToolkitSetup.exe File opened (read-only) \??\T: MalRepairToolkitSetup.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: MalRepairToolkitSetup.exe File opened (read-only) \??\T: MalRepairToolkitSetup.exe File opened (read-only) \??\P: MalRepairToolkitSetup.exe File opened (read-only) \??\W: MalRepairToolkitSetup.exe File opened (read-only) \??\E: MalRepairToolkitSetup.exe File opened (read-only) \??\N: MalRepairToolkitSetup.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\PsExec.exe msiexec.exe File created C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\Siticone.UI.dll msiexec.exe File created C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\MalRepairToolkit.exe msiexec.exe File created C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\MalRepairToolkit.exe.config msiexec.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Installer\e5825e4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI26EC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI28B3.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI3009.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC4A0BD5-EB59-47FF-8195-918D044206DA}\squaretilesdk.exe msiexec.exe File opened for modification C:\Windows\Installer\e5825e2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2835.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E33.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{AC4A0BD5-EB59-47FF-8195-918D044206DA} msiexec.exe File created C:\Windows\Installer\{AC4A0BD5-EB59-47FF-8195-918D044206DA}\squaretilesdk.exe msiexec.exe File created C:\Windows\Installer\e5825e2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2B35.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies Control Panel 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Colors MalRepairToolkitSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Colors MalRepairToolkit.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Colors MalRepairToolkit.exe Key deleted \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Colors MalRepairToolkit.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Colors MalRepairToolkit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Mouse\SwapMouseButtons = "0" MalRepairToolkit.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\Vichingo455\\Malware Repair Toolkit 1.0.0\\install\\44206DA\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9EA5CBE3493696744AF2BB9A25BC0B3A msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5DB0A4CA95BEFF74185919D8402460AD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\ProductName = "Malware Repair Toolkit" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\PackageCode = "0328A8B75D2187B44839573B8BFC9B9C" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9EA5CBE3493696744AF2BB9A25BC0B3A\5DB0A4CA95BEFF74185919D8402460AD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\PackageName = "MalRepairToolkitSetup.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Vichingo455\\Malware Repair Toolkit 1.0.0\\install\\44206DA\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" MalRepairToolkit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5DB0A4CA95BEFF74185919D8402460AD\RunAsTIExt msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5DB0A4CA95BEFF74185919D8402460AD\ProductIcon = "C:\\Windows\\Installer\\{AC4A0BD5-EB59-47FF-8195-918D044206DA}\\squaretilesdk.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "\"%1\" %*" MalRepairToolkit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\5DB0A4CA95BEFF74185919D8402460AD\MainFeature msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 496 msiexec.exe 496 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 496 msiexec.exe Token: SeCreateTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeAssignPrimaryTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeLockMemoryPrivilege 736 MalRepairToolkitSetup.exe Token: SeIncreaseQuotaPrivilege 736 MalRepairToolkitSetup.exe Token: SeMachineAccountPrivilege 736 MalRepairToolkitSetup.exe Token: SeTcbPrivilege 736 MalRepairToolkitSetup.exe Token: SeSecurityPrivilege 736 MalRepairToolkitSetup.exe Token: SeTakeOwnershipPrivilege 736 MalRepairToolkitSetup.exe Token: SeLoadDriverPrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemProfilePrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemtimePrivilege 736 MalRepairToolkitSetup.exe Token: SeProfSingleProcessPrivilege 736 MalRepairToolkitSetup.exe Token: SeIncBasePriorityPrivilege 736 MalRepairToolkitSetup.exe Token: SeCreatePagefilePrivilege 736 MalRepairToolkitSetup.exe Token: SeCreatePermanentPrivilege 736 MalRepairToolkitSetup.exe Token: SeBackupPrivilege 736 MalRepairToolkitSetup.exe Token: SeRestorePrivilege 736 MalRepairToolkitSetup.exe Token: SeShutdownPrivilege 736 MalRepairToolkitSetup.exe Token: SeDebugPrivilege 736 MalRepairToolkitSetup.exe Token: SeAuditPrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemEnvironmentPrivilege 736 MalRepairToolkitSetup.exe Token: SeChangeNotifyPrivilege 736 MalRepairToolkitSetup.exe Token: SeRemoteShutdownPrivilege 736 MalRepairToolkitSetup.exe Token: SeUndockPrivilege 736 MalRepairToolkitSetup.exe Token: SeSyncAgentPrivilege 736 MalRepairToolkitSetup.exe Token: SeEnableDelegationPrivilege 736 MalRepairToolkitSetup.exe Token: SeManageVolumePrivilege 736 MalRepairToolkitSetup.exe Token: SeImpersonatePrivilege 736 MalRepairToolkitSetup.exe Token: SeCreateGlobalPrivilege 736 MalRepairToolkitSetup.exe Token: SeCreateTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeAssignPrimaryTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeLockMemoryPrivilege 736 MalRepairToolkitSetup.exe Token: SeIncreaseQuotaPrivilege 736 MalRepairToolkitSetup.exe Token: SeMachineAccountPrivilege 736 MalRepairToolkitSetup.exe Token: SeTcbPrivilege 736 MalRepairToolkitSetup.exe Token: SeSecurityPrivilege 736 MalRepairToolkitSetup.exe Token: SeTakeOwnershipPrivilege 736 MalRepairToolkitSetup.exe Token: SeLoadDriverPrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemProfilePrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemtimePrivilege 736 MalRepairToolkitSetup.exe Token: SeProfSingleProcessPrivilege 736 MalRepairToolkitSetup.exe Token: SeIncBasePriorityPrivilege 736 MalRepairToolkitSetup.exe Token: SeCreatePagefilePrivilege 736 MalRepairToolkitSetup.exe Token: SeCreatePermanentPrivilege 736 MalRepairToolkitSetup.exe Token: SeBackupPrivilege 736 MalRepairToolkitSetup.exe Token: SeRestorePrivilege 736 MalRepairToolkitSetup.exe Token: SeShutdownPrivilege 736 MalRepairToolkitSetup.exe Token: SeDebugPrivilege 736 MalRepairToolkitSetup.exe Token: SeAuditPrivilege 736 MalRepairToolkitSetup.exe Token: SeSystemEnvironmentPrivilege 736 MalRepairToolkitSetup.exe Token: SeChangeNotifyPrivilege 736 MalRepairToolkitSetup.exe Token: SeRemoteShutdownPrivilege 736 MalRepairToolkitSetup.exe Token: SeUndockPrivilege 736 MalRepairToolkitSetup.exe Token: SeSyncAgentPrivilege 736 MalRepairToolkitSetup.exe Token: SeEnableDelegationPrivilege 736 MalRepairToolkitSetup.exe Token: SeManageVolumePrivilege 736 MalRepairToolkitSetup.exe Token: SeImpersonatePrivilege 736 MalRepairToolkitSetup.exe Token: SeCreateGlobalPrivilege 736 MalRepairToolkitSetup.exe Token: SeCreateTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeAssignPrimaryTokenPrivilege 736 MalRepairToolkitSetup.exe Token: SeLockMemoryPrivilege 736 MalRepairToolkitSetup.exe Token: SeIncreaseQuotaPrivilege 736 MalRepairToolkitSetup.exe Token: SeMachineAccountPrivilege 736 MalRepairToolkitSetup.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 736 MalRepairToolkitSetup.exe 736 MalRepairToolkitSetup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 736 MalRepairToolkitSetup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 496 wrote to memory of 4548 496 msiexec.exe 89 PID 496 wrote to memory of 4548 496 msiexec.exe 89 PID 496 wrote to memory of 4548 496 msiexec.exe 89 PID 736 wrote to memory of 4284 736 MalRepairToolkitSetup.exe 97 PID 736 wrote to memory of 4284 736 MalRepairToolkitSetup.exe 97 PID 736 wrote to memory of 4284 736 MalRepairToolkitSetup.exe 97 PID 496 wrote to memory of 2844 496 msiexec.exe 105 PID 496 wrote to memory of 2844 496 msiexec.exe 105 PID 496 wrote to memory of 4568 496 msiexec.exe 107 PID 496 wrote to memory of 4568 496 msiexec.exe 107 PID 496 wrote to memory of 4568 496 msiexec.exe 107 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer MalRepairToolkit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "2" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "1" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "1" MalRepairToolkit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "1" MalRepairToolkit.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe"C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Enumerates connected drives
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe"C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe" /i "C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\MalRepairToolkitSetup.msi" AI_EUIMSI=1 APPDIR="C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit" SHORTCUTDIR="C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malware Repair Toolkit" SECONDSEQUENCE="1" CLIENTPROCESSID="736" CHAINERUIPROCESSID="736Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="MainFeature,RunAsTIExt" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" AI_DETECTED_INTERNET_CONNECTION="1" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1695918177 " AI_EXTEND_GLASS="26" AI_EXTENDER_IMAGES="GlassBackgroundSmall" TARGETDIR="C:\" AI_SETUPEXEPATH_ORIGINAL="C:\Users\Admin\AppData\Local\Temp\MalRepairToolkitSetup.exe" AI_INSTALL="1"2⤵
- Enumerates connected drives
PID:4284
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8C62E4AA256A14574E10B1AB9532A52B C2⤵
- Loads dropped DLL
PID:4548
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2844
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 265DE8A71CFD78D7DC185539512CDE312⤵
- Loads dropped DLL
PID:4568
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4160
-
C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\MalRepairToolkit.exe"C:\Program Files (x86)\Vichingo455\Malware Repair Toolkit\MalRepairToolkit.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Sets file execution options in registry
- Executes dropped EXE
- Modifies system executable filetype association
- Checks whether UAC is enabled
- Modifies Control Panel
- Modifies registry class
- System policy modification
PID:8
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57b7aa2d150d7dad34d9ba1fc294fde78
SHA15230676118f94f99c53cbe7d4d35149aa26d4073
SHA256920be69a83b592a3c61dfc7c97ab02a6b03c0bc163ed74a6b5e1fd56274bdc3b
SHA512e8c586c6dcad6f20db74e76ac92069d8a220ca4cf06c82729d8cbdfbc00e11de21258a7b559ec7f005c9e567ce9c57e7e8dc32c14af707110597b73d22b05d54
-
Filesize
410KB
MD5e29d935c2416c74a58fdf60e21b65af2
SHA14368c0142656f6d995b719e026aba2e660b51355
SHA2567e57fb0bb8192c120a2135ffce5b54f8fe64374a5e0afa705547569b1939020e
SHA5128ef903322ec8169f6cf4de08e1ba9a8a6e0047b89d33656c9ef478b553f4baf33f0ce182fb3a73cd6fa480145f517e1ded8cfbd74c3b063eb0892b510256c498
-
Filesize
410KB
MD5e29d935c2416c74a58fdf60e21b65af2
SHA14368c0142656f6d995b719e026aba2e660b51355
SHA2567e57fb0bb8192c120a2135ffce5b54f8fe64374a5e0afa705547569b1939020e
SHA5128ef903322ec8169f6cf4de08e1ba9a8a6e0047b89d33656c9ef478b553f4baf33f0ce182fb3a73cd6fa480145f517e1ded8cfbd74c3b063eb0892b510256c498
-
Filesize
178B
MD55471f52322053839dafe0a6cb899f97a
SHA1df4bcfc0518ac43b40f3793aadcbbad98dae4cc1
SHA256b019fe7e793a781f26dc79e4189a6b4c81686ef0b2c1bf455562ca5e9ec6bd2b
SHA51262ca2723113e5172a129b374e0303c2b786edf484a868dc87a88b744ed7f10c4e64cec4311475a2ddbcfef6a6543bdc70ea79ccc80f60fd70bd6d1cb3ac0e70e
-
Filesize
1.3MB
MD5750c58af2e56b6addecffcf152520ab8
SHA114995e7f1d12498606d9d209d78d55fe6fd87802
SHA25627c56a28cbde094157206da1bfcd7a395111ab97b8a5ff600b11c2175dcefb26
SHA5122179790e23f61b3dfea828457f8609279c70b1e071cddc73b1dbda02caa664e0aae2553fc24a4956f9e89c477d66b1a704bde26fa23bc6db26c19e18db00abb5
-
Filesize
9KB
MD522f47b8e2a1dbe9726bc16559e6a7ef8
SHA1ed6a4aace45a0d41976932aa751d7ff7808b804f
SHA25695ebf0c53bfc4560a16587f3e13e7c0d9864c66317844e6e2b202c56467bba8b
SHA512287b20db94610a7671f83c8de74d319130300aaac70a753cf2acd89c13922ad11e9432feda6b24337779ef85a8aa3d44c1d04ca32a0d01a51061ce3137854c32
-
Filesize
3KB
MD51227bfff63d4150a4c5bf4ca11ba91d6
SHA14470b6e50385da5588e32a6dcb571fe47ee90d32
SHA2568af4cf03cbab6d7c25d2aa732cc64d4b953650d89fdc37ac866bf97022266e04
SHA512fcd1ab314bb44e2380adc22b2549f60b318c6de404bcfbd6f2f4862753eb3271bc23e81636d5d43e57f72ca985e1164e1c7c54719554ef3bef377ceabed8394d
-
Filesize
18KB
MD5f5a120b564fc7823d1c269b7a6e70473
SHA11b85466c12f83b7872214f787390614df50eaddb
SHA256c178ed81de4aa8b049efcf0670c10cf2043a51c6be1144ee95d09c1c2afd6087
SHA51296d285759f8a8c5d17d7cac4ef224995dfa09554a3687c7f34e63651888c98a9c60095cd1a71c82030781ff6e7d58b7d49068bd9f53126ff7b775579d3368ace
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
875KB
MD501ab8034f722cbac50b8bcfc36e5b2e8
SHA1b25868af5713e37c398b712f19692edd7db2d858
SHA256e5c41b1af4d865b1b4b09a9fcb99a1f6eb2b2a75b148f4390298aff1ea348689
SHA51225e24e4d691b1fecc6991997ace400682bb812d48374f95a14e21a9045d7905f4630f4672e88b41afd7933b11fb81c10935e49aba337b15924cfc7e814ca2558
-
Filesize
875KB
MD501ab8034f722cbac50b8bcfc36e5b2e8
SHA1b25868af5713e37c398b712f19692edd7db2d858
SHA256e5c41b1af4d865b1b4b09a9fcb99a1f6eb2b2a75b148f4390298aff1ea348689
SHA51225e24e4d691b1fecc6991997ace400682bb812d48374f95a14e21a9045d7905f4630f4672e88b41afd7933b11fb81c10935e49aba337b15924cfc7e814ca2558
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
875KB
MD501ab8034f722cbac50b8bcfc36e5b2e8
SHA1b25868af5713e37c398b712f19692edd7db2d858
SHA256e5c41b1af4d865b1b4b09a9fcb99a1f6eb2b2a75b148f4390298aff1ea348689
SHA51225e24e4d691b1fecc6991997ace400682bb812d48374f95a14e21a9045d7905f4630f4672e88b41afd7933b11fb81c10935e49aba337b15924cfc7e814ca2558
-
Filesize
875KB
MD501ab8034f722cbac50b8bcfc36e5b2e8
SHA1b25868af5713e37c398b712f19692edd7db2d858
SHA256e5c41b1af4d865b1b4b09a9fcb99a1f6eb2b2a75b148f4390298aff1ea348689
SHA51225e24e4d691b1fecc6991997ace400682bb812d48374f95a14e21a9045d7905f4630f4672e88b41afd7933b11fb81c10935e49aba337b15924cfc7e814ca2558
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
4.8MB
MD577d6c08c6448071b47f02b41fa18ed37
SHA1e7fdb62abdb6d4131c00398f92bc72a3b9b34668
SHA256047e2df9ccf0ce298508ee7f0db0abcb2ff9cff9916b6e8a1fbd806b7a9d064b
SHA512e1aeb8e8b441d755a119f45a465ca5660678f4131984322252bfb6d2cec52e7ee54d65a64b98429b23915eb5707b04b5cd62a85446c60de8842314130a926dbd
-
C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\MalRepairToolkit.exe
Filesize410KB
MD5e29d935c2416c74a58fdf60e21b65af2
SHA14368c0142656f6d995b719e026aba2e660b51355
SHA2567e57fb0bb8192c120a2135ffce5b54f8fe64374a5e0afa705547569b1939020e
SHA5128ef903322ec8169f6cf4de08e1ba9a8a6e0047b89d33656c9ef478b553f4baf33f0ce182fb3a73cd6fa480145f517e1ded8cfbd74c3b063eb0892b510256c498
-
C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\MalRepairToolkit.exe.config
Filesize178B
MD55471f52322053839dafe0a6cb899f97a
SHA1df4bcfc0518ac43b40f3793aadcbbad98dae4cc1
SHA256b019fe7e793a781f26dc79e4189a6b4c81686ef0b2c1bf455562ca5e9ec6bd2b
SHA51262ca2723113e5172a129b374e0303c2b786edf484a868dc87a88b744ed7f10c4e64cec4311475a2ddbcfef6a6543bdc70ea79ccc80f60fd70bd6d1cb3ac0e70e
-
C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\MalRepairToolkitSetup.msi
Filesize3.0MB
MD5667e6f73e7f5927109eb0cc54c54143d
SHA169853891994e81b3251c3bb4ceab361e4d9fd7eb
SHA2561a70333730223914febc44d720f22746888b338ff032a9442af8cebb330c8c4d
SHA512ad8fa0d956e4b8e3a5ec2974ff8e31709e758b5d2598a3f79c9b212a3a6d9094af5110652c72a8ee1d150b345aac073eeff0823d406c86128c3acaeb8f8b5844
-
C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\MalRepairToolkitSetup.msi
Filesize3.0MB
MD5667e6f73e7f5927109eb0cc54c54143d
SHA169853891994e81b3251c3bb4ceab361e4d9fd7eb
SHA2561a70333730223914febc44d720f22746888b338ff032a9442af8cebb330c8c4d
SHA512ad8fa0d956e4b8e3a5ec2974ff8e31709e758b5d2598a3f79c9b212a3a6d9094af5110652c72a8ee1d150b345aac073eeff0823d406c86128c3acaeb8f8b5844
-
Filesize
429KB
MD5cb8a14388e1da3956849d638af50fe9d
SHA1a0ee0761602470e24bcea5f403e8d1e8bfa29832
SHA25608c6e20b1785d4ec4e3f9956931d992377963580b4b2c6579fd9930e08882b1c
SHA51229730d61aa433131487b62850980bb3f558adbee773f774c50c6b4da39297a33f4a070ff8d394190ded9f39eb59eafbf23ea4c15190f1d76c2d5ba2b586ba718
-
C:\Users\Admin\AppData\Roaming\Vichingo455\Malware Repair Toolkit 1.0.0\install\44206DA\Siticone.UI.dll
Filesize1.3MB
MD5750c58af2e56b6addecffcf152520ab8
SHA114995e7f1d12498606d9d209d78d55fe6fd87802
SHA25627c56a28cbde094157206da1bfcd7a395111ab97b8a5ff600b11c2175dcefb26
SHA5122179790e23f61b3dfea828457f8609279c70b1e071cddc73b1dbda02caa664e0aae2553fc24a4956f9e89c477d66b1a704bde26fa23bc6db26c19e18db00abb5
-
Filesize
205KB
MD531daf181536165ef11461c18d98d04da
SHA19310a5837eb30fd3994f644b9913a88f945c4f98
SHA2560e38b521210b476057892fa2085ee60d1fb79b8c77cceffdaa0e2ef5d63b0f09
SHA512b10f62e3c1fec62c17ef00234c4f8c6fa1937cf2a3f63a1439fefe1daee3699135486fc303d1dc3b7e75d90048cf65300d3e0ded0b7d336ea08e9c9696ad6131
-
Filesize
205KB
MD531daf181536165ef11461c18d98d04da
SHA19310a5837eb30fd3994f644b9913a88f945c4f98
SHA2560e38b521210b476057892fa2085ee60d1fb79b8c77cceffdaa0e2ef5d63b0f09
SHA512b10f62e3c1fec62c17ef00234c4f8c6fa1937cf2a3f63a1439fefe1daee3699135486fc303d1dc3b7e75d90048cf65300d3e0ded0b7d336ea08e9c9696ad6131
-
Filesize
205KB
MD531daf181536165ef11461c18d98d04da
SHA19310a5837eb30fd3994f644b9913a88f945c4f98
SHA2560e38b521210b476057892fa2085ee60d1fb79b8c77cceffdaa0e2ef5d63b0f09
SHA512b10f62e3c1fec62c17ef00234c4f8c6fa1937cf2a3f63a1439fefe1daee3699135486fc303d1dc3b7e75d90048cf65300d3e0ded0b7d336ea08e9c9696ad6131
-
Filesize
205KB
MD531daf181536165ef11461c18d98d04da
SHA19310a5837eb30fd3994f644b9913a88f945c4f98
SHA2560e38b521210b476057892fa2085ee60d1fb79b8c77cceffdaa0e2ef5d63b0f09
SHA512b10f62e3c1fec62c17ef00234c4f8c6fa1937cf2a3f63a1439fefe1daee3699135486fc303d1dc3b7e75d90048cf65300d3e0ded0b7d336ea08e9c9696ad6131
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
575KB
MD58c1a778e0754301c97a660dbf3e8303b
SHA1f489c45cde796de0d23ee862948f5e50379dee60
SHA256000b773a448b107cbf3268fea3a0eec388daa71c5f911979c5d21f0cd8d6da54
SHA512010e76ed659f73cc263ce9b2d2635d775b296c10e53ba133fba6aacde02ed409b19f4c4e2ba6df7730ddc8669c818e99773f25854a1916ccf8acf9e459482fea
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
436KB
MD55788efa607d26332d6d7f5e6a1f6bd6f
SHA1e7749843cc3e89bc81649087de4ad44c93d48bc6
SHA2569fc2608c9e5ef5a88dd91c82660fa297144ba6bbf4602140d638de7233a4625d
SHA512ce472ca4f956da4160cfd9b9051455974e24dd8b23a0b7b197afd1f7552e37980809e523bedc0d4c2f4c9cb6ef300b221e6404e6e6a1b789b67756550ddd2104
-
Filesize
23.0MB
MD579f5d830fa6a6c4f0b4da881cade4e7a
SHA199add54be376448cbf3503fa8db70212e3de1f89
SHA256bc27b5e5fa111528e269b1254eb0c839673cd5a76cc88968a0dc1a5c3e369154
SHA512a6226a57ff438e0d430d9193a3e153435ea1605d3be044064bdc714c2f71d8ba45cea102e91ca77867a9aa2e2ab9a6d912ce6d4a1815f1c437396b621c2d532a
-
\??\Volume{6814a8cd-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{3ab0b5ae-4930-4662-9c61-04da474f2a9b}_OnDiskSnapshotProp
Filesize5KB
MD50fcc5fb48de76e7bbd4e49d85e6a8c2f
SHA1788e02376f7c25232ed960389a0e03e0587da3a3
SHA2563e0b13e7971b67bfa5d7a873f40375823f43a60f7b1d458675c0fb69221382e4
SHA512005d3698e83ed9d37495f1e0fdffac32bb27a2e6a6a54c380d36ca136dff8c12a1f5abf54b42eb7bfa73c494ab0aeb9b5eb79db2739fda450e1a1e530bd70852