Analysis

  • max time kernel
    1798s
  • max time network
    1597s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-06-2024 23:01

General

  • Target

    https://www.reviversoft.com/pc-reviver/

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 61 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 45 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.reviversoft.com/pc-reviver/"
    1⤵
      PID:824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4592
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\PCReviverSetup.exe
        "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\PCReviverSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Program Files\ReviverSoft\PC Reviver\binary_archive_converter.exe
          "C:\Program Files\ReviverSoft\PC Reviver\binary_archive_converter.exe" /lcipath="C:\Program Files\ReviverSoft\PC Reviver\lci.lci"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2452
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -helper -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4428
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -install -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3900
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -language=English -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1388
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -delete_apps_if_needed -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:192
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -build_id "0" -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2936
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\ReviverSoft\PC Reviver\windowscontextmenuhandler-vc141-mt.dll"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files\ReviverSoft\PC Reviver\windowscontextmenuhandler-vc141-mt.dll"
            4⤵
            • Loads dropped DLL
            • Modifies registry class
            PID:2452
        • C:\Users\Admin\AppData\Local\Temp\nsxC352.tmp\ReviverSoftSmartMonitorSetup.exe
          C:\Users\Admin\AppData\Local\Temp\nsxC352.tmp\ReviverSoftSmartMonitorSetup.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5116
          • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
            "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" /RegServer
            4⤵
            • Executes dropped EXE
            • Modifies registry class
            • Modifies system certificate store
            • Suspicious use of SetWindowsHookEx
            PID:364
          • C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoft Smart Monitor Service.exe
            "C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoft Smart Monitor Service.exe" /Service
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3716
          • C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoftSmartMonitor.exe
            "C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoftSmartMonitor.exe" -install
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3616
          • C:\Windows\SysWOW64\sc.exe
            sc start "ReviverSoft Smart Monitor Service"
            4⤵
            • Launches sc.exe
            PID:596
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -osource ""
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4140
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -no_update -first_run_after_install -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Modifies Internet Explorer settings
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1008
          • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
            "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -splash 1008
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:4900
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -post_install -client_id "BF01D6A3-F015-4D4D-AA74-F32286310182"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Enumerates connected drives
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2832
        • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe
          "C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe" -syncSMSettings
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:5504
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3492
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4492
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1664
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:948
    • C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoft Smart Monitor Service.exe
      "C:\Program Files\ReviverSoft\Smart Monitor\ReviverSoft Smart Monitor Service.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2464
    • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
      "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3792
    • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
      "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4008
    • C:\Windows\system32\wbem\unsecapp.exe
      C:\Windows\system32\wbem\unsecapp.exe -Embedding
      1⤵
        PID:4920
      • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
        "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4232
      • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
        "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:864
      • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
        "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5280
      • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
        "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5676
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:5716
      • C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe
        "C:\Program Files\ReviverSoft\Smart Monitor\Settings.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver.exe

        Filesize

        10.4MB

        MD5

        af47a316b259fdcd5c457ba083cad7d2

        SHA1

        202facffa5b36db675fcd9d9fcaf7322a9c38c58

        SHA256

        e2576d58785769b3a92982025988055f16641b37772918caca6fd3b364956edc

        SHA512

        1437a77f18c8f54cfa6066c962b6e9454b68699ec7699fb95509a946e8bd2577f1de4b46a6ca0eb397d9de3164198c5ee6e75119e98ba087f88066b093d242e1

      • C:\Program Files\ReviverSoft\PC Reviver\PC Reviver\English.xml

        Filesize

        31KB

        MD5

        73d1962830d2176241b25a8c93e9d313

        SHA1

        e491b480c55abda79bb7b190dcb3b7d160916999

        SHA256

        973eddf557b0f8df1204a6c8cdabd2dc7b88f0de1f64fffc216a9ea9a6997b99

        SHA512

        6fa03eeedb17856695428d3ac29d606fe3d0ade3bedc1fb3e71487f11885377aae3ba5b56cd9ec76888f24ea25c924717eff38c5c8ef4d49d8396656992d0613

      • C:\Program Files\ReviverSoft\PC Reviver\Qt5Core.dll

        Filesize

        5.4MB

        MD5

        44920e86f440bfcde9bdca0c3ddd5434

        SHA1

        a11a656e4b66e9520cacc318339862e7bb1f775c

        SHA256

        6b30835b9b62835a10798de4c448f3e41a3f69c029dcedbf2635a18ed4da17cf

        SHA512

        fdcb3fecd5080a4b81d51c708025d05e0537052be3d9ac357b4d0b55497e2ff5cbd58a78f9418822eee2967262f68ec9e7996ec07238d5f68f0f15e25483abc0

      • C:\Program Files\ReviverSoft\PC Reviver\Qt5Svg.dll

        Filesize

        330KB

        MD5

        75e3e6b1d5ebefcb1db9ff3220221375

        SHA1

        242be3b19a7a42adc1b5076003e3d6cefc294f8b

        SHA256

        5365458d8f6e59d107f78500a4ac8b76733c258bc3482addf1eb3cbe92fd813b

        SHA512

        87c5c713e4466cc64f9cc8db3861acee9526a6f926ddd15873d56ad230dc764ebf60b0e5bafc88b2bf98e61fa7f4374640a37ffd79eecc9c006b84d62b3ac880

      • C:\Program Files\ReviverSoft\PC Reviver\Qt5Widgets.dll

        Filesize

        5.3MB

        MD5

        09c432ff643d60321e92e53f45b2d005

        SHA1

        3fef17a3e909f4eadc0f917d37d5846f4ecda87a

        SHA256

        2da4c5564adbacf25988fe60b3588f0c8a0042b2f6441e9d9f494659395275d4

        SHA512

        7e158ccce82c61c3ee82cb3004c01f14bbffc0f09f06b993f9a3f9c7b20fbf09a44df8619eebcbbfa7ad1635cf84b498ca576467be1c0a1f94837141ae5776aa

      • C:\Program Files\ReviverSoft\PC Reviver\binary_archive_converter.exe

        Filesize

        830KB

        MD5

        fefa9226563c672f4d72deab72b9e710

        SHA1

        8f155e2086a9b4e124a1fbfdb69c76298633fb92

        SHA256

        e3cfe3b67a74b253aa7e09fcecd9eb7bc015e27cdf992d8aef7df57c4bb9145c

        SHA512

        2eea0ba2de3f9c57a098c0e7ed2f973e76f8ce9fbea4965dcca5d744d1eb6fa9703e648d0b245dc1e1764072088880dd6cc85e3dfe07e9d31fb1fa214e46fb15

      • C:\ProgramData\ReviverSoft\PC Reviver\PCReviver.ini

        Filesize

        75B

        MD5

        d31a9c440132fce2c393b32f090d8079

        SHA1

        0beb401b0b97354292f10bb69c140d52ea7d0298

        SHA256

        4e9313792fe485d1544def957c92b975c582a24de2649c78adbc60abbea7de5c

        SHA512

        8462fdd71ef946c7141e1f682e2a5022f1771630679fddee253b221f1d89279929fd2bf8be382e83b71a436818c1716f0191c51b413dbd30c791cf3eecb76176

      • C:\ProgramData\ReviverSoft\PC Reviver\S-1-5-21-3968772205-1713802336-1776639840-1000\Driver Updater\scanStatisticInfo.lock

        Filesize

        25B

        MD5

        e77b1706cd22431864ae28d3ae97c105

        SHA1

        34c0718a18c8693d7a72f1dac6c69b9fc224dc24

        SHA256

        fad1c8273b7cd47c34d9bdc49e753dbfae9d1cc6aef4eb891a91bb710abffba5

        SHA512

        7fcbe7b1dc36cb7f4aaf51a3ecbff6d07bd31eb675bb4e01f8d0070b4052a9cdd752c509c4e849432394e225cfa03cbe4d5c0deb7a1fd15578ec75c8ffc0b970

      • C:\ProgramData\ReviverSoft\PC Reviver\S-1-5-21-3968772205-1713802336-1776639840-1000\PCReviver.ini.gq1008

        Filesize

        604B

        MD5

        65b656082e0f63a6e0df4b2c960db5c2

        SHA1

        b85d8403d5c2fed6f35a6f95acb438efc586241c

        SHA256

        5f6c8920180731b6558863f73d135de3ac9f5d980383c9c66bb58ba22366c0b6

        SHA512

        cbba388e436d7d109ed0edccc32017cd2ea39d2b9d08fd0f8c46a6e813ce0dcac5bc475541f57a2a9fb7a905fccd9c07eb90ceed22be5fb574a5e3e4e2e083f1

      • C:\ProgramData\ReviverSoft\PC Reviver\S-1-5-21-3968772205-1713802336-1776639840-1000\Registry Cleaner\scan.ini.Uh2832

        Filesize

        120B

        MD5

        9d7e18542f23b1c7e89fdb6872656767

        SHA1

        5a3fed14b25a23fd0b36c3ecc4d9f17f09993bda

        SHA256

        53272014703845c52a542527a7bb17f93bdf4c243a321292b788a5f14d6779fe

        SHA512

        d6a6eca1287cd402cedf58a1e137f2195e6b8744af4ed726e5a0cc375023f495847b544a9552206fddce6ff3a33a8cc082ca8b6a859dc90d1d0b2701c6e19eb5

      • C:\ProgramData\ReviverSoft\PC Reviver\S-1-5-21-3968772205-1713802336-1776639840-1000\Registry Cleaner\scan.ini.lock

        Filesize

        25B

        MD5

        0eb626fe44bd686e6fbf36eb1929f8af

        SHA1

        234eb2292e9038e244b13a827b430fdfefee4812

        SHA256

        dcd57c5be6d602a116240bb0a0d064b328a93cffa95833da8ae6b085234ab984

        SHA512

        b62109bbcb0df8d9dddcf8595e8509442154cdedf3f7013948c082b4eed7391abe3b7b712dba69d06483784ee21bc04147e3c4613cc24b26011ab28ee5934c73

      • C:\ProgramData\ReviverSoft\Smart Monitor\S-1-5-21-3968772205-1713802336-1776639840-1000\smsettings

        Filesize

        44B

        MD5

        3da8043732f566e2fa749f6267abcc93

        SHA1

        5aa6ff1ccce33a5187ed6f7dcfef8d24542cc72b

        SHA256

        79b18978637868aa31f346c5c628fa95e21a3442a1896aa627c5e4fd21533d04

        SHA512

        f9c8a8b54f9119340e258a396cd7f05d33e09dfbcfcb4afefb9206296c3c7c6e3fed65370bb624eaf90c97842d9fe6e3fef083e2c90dc83c0a03dbbc472a09d1

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

        Filesize

        4KB

        MD5

        1bfe591a4fe3d91b03cdf26eaacd8f89

        SHA1

        719c37c320f518ac168c86723724891950911cea

        SHA256

        9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

        SHA512

        02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

        Filesize

        471B

        MD5

        463f2615e9a544cf4370b57943f07476

        SHA1

        0ed983a59cc87c29abba499ba1bfe29e673d5a61

        SHA256

        c44cdc44b72652ceac31924dd7dcdb68cb3ee15ff358ac534c312808aacbf880

        SHA512

        237b3fc0e797287bc580b733e3c9aa4a1ae0d4de2c9588225e810459ebfeb5880de377c7501bda8f835a1e2423b7283c66a64d442fbce4a0657d753498a36de0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_0EA3F3D1EA206AE888AF0E921CE166D9

        Filesize

        727B

        MD5

        bd3e4d309e363c6f435df9ac9853e1e7

        SHA1

        fdc5eb0a4a4867a21ec8ec6c1e19d1ed18d58f20

        SHA256

        86d3462d7deccc6a462494384d0acd854ff28b564f69f2866bb381fd4552041d

        SHA512

        fd0c36e7654d4d1f9ef87478d9bb8d72bb863c94906b415179fad10e2272a00de8af9dfb95c5e3665216ef7357d9bc4da7901d62f7d51377d784b735688cd669

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

        Filesize

        727B

        MD5

        8d0f25a2e895f811eb3acb83dc1781d7

        SHA1

        7e7aad34123184f31ac52d5a2c0f56838195337d

        SHA256

        e727e0a31b7625639c5f487473672f5aa31f91a0e09f3b7d48e8a1a31323584b

        SHA512

        53c637efa5c2cb2fc9f72aa80613153ac02990d26ee42e9b3c3674e97ae94434bf122e215da687f0e194f6fbeffe0d0bbb679c38fa537d76d3a0f89288a81cb4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

        Filesize

        400B

        MD5

        c4895513c1918332d39a2f281b912ba5

        SHA1

        4d6d7130ecbbf213dd105e0a904c927edcd9a933

        SHA256

        1e45a68479a77ff81eed6848b11d3d0f8d8bd9f79bf526ad8f4bd32cbedebdef

        SHA512

        1006468f66563743a5bdb87382382ee820d0623dd1b512062683996aebcb8bfca5671a3172edd8c11bd29e8351a62ac95aa5ed1d1d2ee18c256cc86ac0a95ce0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_0EA3F3D1EA206AE888AF0E921CE166D9

        Filesize

        408B

        MD5

        2b61a933c8dd0529b9ca3d44d2a6a910

        SHA1

        df831d9c049ed13d7d17982c85b319cb677b5893

        SHA256

        63630b862c1a51f2a59db04edb3710c61e944b249d56634459240b5b3695625e

        SHA512

        6aac2c6ed0a4430950e86bb8f46a7fbade1434379896670ca302ad331f1c4d885cb6e9952dd6101e69d39beba5137bd87c42f1470a629382919637069adb7948

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

        Filesize

        412B

        MD5

        65527b0303974de9843893529b0eeb0e

        SHA1

        f8c606be61458d00480fb1dac416199e7b10f8b1

        SHA256

        20084940c3ee6d68b32d538aa09c748eaac9f9a463327bdf11a22e1adf6c6fd2

        SHA512

        ad03dee486b099d540e5c39cb965aeff5b266cb81d0c027807388b254f0f879d14d36a244357ba767071290055ba7426f54f9fd62d6404eda0a4418999944bf3

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79LPO21U\rpc_shindig_random[1].js

        Filesize

        14KB

        MD5

        6b31228f196cefac180b500e1737970c

        SHA1

        782d10c1f5bcf21050c4f2dbcc601098ddf64682

        SHA256

        ab8469aeea8e5b6c94247cd7cb298c1f049885d4528c9551361b8f575a913df7

        SHA512

        e8d6712294e1ecf85a9cedfac5504504563aa385a22ee5d116fbf3f9159d5e6e3ed1b53dfeb3268efcaa32f90de31877168b87fe78738f0f6b97e3fb6b037055

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\TTSWREZE\cb=gapi[1].js

        Filesize

        68KB

        MD5

        498c0b3f1c4a4e203c582742bf620460

        SHA1

        fdb865695b0bff53c3b685bb534dde4a554be36e

        SHA256

        aa74c9cc296b2dd408c4bdce73bfad6bd1b9ca8268bad036dfdce271c9d21072

        SHA512

        879244bd19218a8bcf5faa946b845480c0c44be71592310f3491a81b9db547b4abca073246235d08fe49ef6e99a02e988acccdfe7c15c27aaccd5f02321c4c17

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UF7HWPIA\install-pcr[1].css

        Filesize

        13KB

        MD5

        20662a98e5e5557101b1cf65e7837c14

        SHA1

        71fbd160fa9d70f6e3d332cfdf13af44bd61f1b6

        SHA256

        900ab5840612da0b677f55e864ef7813cc93cebec0af0c346df1f96f2444e6b6

        SHA512

        7c4f6296f6dfa8cb2711dda83647199a56e64c7581313366074ae6e0e885df2cdf9ab5f15a6014d084c0b19b1a9bd067ccf4f072212d69aae578c4c6e70f2524

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\PGQKASXL\www.reviversoft[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Q18OCP5B\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\VMDT14EN\favicon[1].ico

        Filesize

        1KB

        MD5

        9a9b51915b0eb4822367c8392351705c

        SHA1

        5e1fc6823df9d203f0a36c396305b97a22cd1d44

        SHA256

        6bd3be586f3bd88d35d374ef497a26f6905a492408debb341ae4eb4d4df856d5

        SHA512

        5c6a5b4c47ebccf416efc41a6d68d1220f30be3cfc98fc89c7a394d9eb1cb5e43974244c54d5cd3c034f9509883594599cafcabb1114259b15836d1fc5cda4a3

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\PCReviverSetup.exe.urqas8w.partial

        Filesize

        45.3MB

        MD5

        a3ce79e70e63ffa1d6db85685b1ea715

        SHA1

        8a0fb5ee0bcfa52360e26af53314e9ee690fc915

        SHA256

        3376f68017d92884b9f4afc822e09b5c0d6c384c75dbf033b00acec3a5057732

        SHA512

        16b9fffd9772d365d6cc96a296798d5fcc7e9bf6f75fa5de2360d8fe33eb534cc7cd3aed061a4ce75b8ebcd4ed525ccedb048e32c70e640503b959a35d825b48

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79LPO21U\PCReviverSetup[1].exe

        Filesize

        16KB

        MD5

        b257128d2304e161c302c4578d26a1a9

        SHA1

        6b5e2afff442469eb99edc80e7e010cf143776c4

        SHA256

        8574f8a497b780e09f22a02b8b0d938b2c9bfbdc7d1b540793b704395954c3d8

        SHA512

        9a72b3db44e644493afeec064390244061e1e04ce31d6befe468dee2e4d1d4cce11bd3d88764ff4788c3e06265edee4068e73cb95ae9c9512a6e87cf88db8bf2

      • C:\Users\Admin\AppData\Local\Temp\nssAFA.tmp\System.dll

        Filesize

        11KB

        MD5

        75ed96254fbf894e42058062b4b4f0d1

        SHA1

        996503f1383b49021eb3427bc28d13b5bbd11977

        SHA256

        a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

        SHA512

        58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

      • C:\Users\Admin\AppData\Local\Temp\nssAFA.tmp\execDos.dll

        Filesize

        5KB

        MD5

        0deb397ca1e716bb7b15e1754e52b2ac

        SHA1

        fbb9bcf872c5dbb4ca4c80fb21d41519bc273ef5

        SHA256

        720be35cd1b4a333264713dc146b4ad024f3a7ad0644c2d8c6fcedd3c30e8a1f

        SHA512

        507db0bee0897660750007e7ce674406acf9e8bf942cf26ded5654c07682757b07c9eb767bead0966478abc554dc9a6461c4288dc35d12cacfadad4c128f1bb7

      • C:\Users\Admin\AppData\Local\Temp\nsxC352.tmp\ioSpecial.ini

        Filesize

        1KB

        MD5

        640e559eec79c0fff29d6f282a61949a

        SHA1

        d7e1243b18fadd9a097293fd26fc2bfafadc64be

        SHA256

        5051e1808e6c05df0f393b0383c859ac247fb82d1a2f676bfa33f3ca562e67eb

        SHA512

        640a0b5fddc2cfc7b73bc1ff1b899953c5f10015d520c64d39bc667e2ec2004333344919cb0dda97f9090a3ac49ab9b622246183dd13c6deb4cc268895923d5c

      • C:\Users\Admin\AppData\Local\Temp\nsxC352.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        08e9796ca20c5fc5076e3ac05fb5709a

        SHA1

        07971d52dcbaa1054060073571ced046347177f7

        SHA256

        8165c7aef7de3d3e0549776535bedc380ad9be7bb85e60ad6436f71528d092af

        SHA512

        02618317d6ab0302324aae4d3c5fca56b21e68c899e211cfa9412cf73820a1f931e56753c904fd7e510c638b4463aedbfe9536790279e096ea0387b67013e0c4

      • C:\Users\Admin\AppData\Local\Temp\nsxC352.tmp\nsProcess.dll

        Filesize

        7KB

        MD5

        6e2a127c517f04c7bf22cf392e0a836b

        SHA1

        e92fe193de327b15a762fe727798d351d30adf34

        SHA256

        102c22f492c3d31f99e43143218ca64592a2f3bb6933f743d8826075ab9b7ad2

        SHA512

        ba8f4aca1f430de89bb17fa0fa5e221cdcead7793ecb0fa8a24bd600bbdb84c7cbd1a58a7970bec0e941db7f4d4b6b545e49fe6240545470b9cede8b83b71670

      • \Program Files\ReviverSoft\PC Reviver\Qt5Gui.dll

        Filesize

        5.6MB

        MD5

        a063d121984941e7ed24f676f3c4cf55

        SHA1

        eb6f6e45145d377cb2b7590f2296bc2b5c300c36

        SHA256

        b4a4c7bfc7d65ae079c564635bdcabe42f04f80b2aa35bb3f537da8167de62de

        SHA512

        c3e3e8a2b7bd79a130353c60b1b8f2d74cee16984d3a6fc35a2120b4539b8b982d1ca60528146061194ed16add64a771fc24fb3b4a9573bdb9308cbc8cf364e5

      • \Program Files\ReviverSoft\PC Reviver\Qt5WinExtras.dll

        Filesize

        297KB

        MD5

        6f269def94b46db3e94f7111004c9cb0

        SHA1

        1b1120a203c9d6b766376c93cd42a8fc0643cdde

        SHA256

        1039d6a60c11aab42425592ee1c196ac1fabd744f97e326030b64408f984db0c

        SHA512

        757adb5f07ec7d7d97ae0756fe19edd646325cefeda752940217d6cb08576ff88147e08c075104da76b5606e0ecfb3434b10bd1689bb0239fda926d117c24761

      • \Program Files\ReviverSoft\PC Reviver\SystemInfo-vc141-mt.dll

        Filesize

        2.4MB

        MD5

        7cd41c7076e88e4bcdc53f6c0b2387de

        SHA1

        9fdc59d63f3818c0567fd4b8f8078fb658d4a19a

        SHA256

        bab67b263553a816479d8c971b41aaf04bd5fb72f1f3b6a0602ea5b46f4ac0de

        SHA512

        a75b26590f19c4552808444b273fc6ec36733b82296972f5c70e78186c957dcd927944842ca466bc97ae7c2aed072253f8b82e4637134909b2297df98545de41

      • \Program Files\ReviverSoft\PC Reviver\msvcp140.dll

        Filesize

        618KB

        MD5

        9ff712c25312821b8aec84c4f8782a34

        SHA1

        1a7a250d92a59c3af72a9573cffec2fcfa525f33

        SHA256

        517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

        SHA512

        5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

      • \Program Files\ReviverSoft\PC Reviver\vcruntime140.dll

        Filesize

        85KB

        MD5

        edf9d5c18111d82cf10ec99f6afa6b47

        SHA1

        d247f5b9d4d3061e3d421e0e623595aa40d9493c

        SHA256

        d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

        SHA512

        bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

      • \Users\Admin\AppData\Local\Temp\nsxC352.tmp\InstallOptions.dll

        Filesize

        15KB

        MD5

        67d8f4d5acdb722e9cb7a99570b3ded1

        SHA1

        f4a729ba77332325ea4dbdeea98b579f501fd26f

        SHA256

        fa8de036b1d9bb06be383a82041966c73473fc8382d041fb5c1758f991afeae7

        SHA512

        03999cc26a76b0de6f7e4e8a45137ee4d9c250366ac5a458110f00f7962158311eea5f22d3ee4f32f85aa6969eb143bdb8f03ca989568764ed2bc488c89b4b7f

      • \Users\Admin\AppData\Local\Temp\nsxC352.tmp\System.dll

        Filesize

        11KB

        MD5

        959ea64598b9a3e494c00e8fa793be7e

        SHA1

        40f284a3b92c2f04b1038def79579d4b3d066ee0

        SHA256

        03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

        SHA512

        5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

      • \Users\Admin\AppData\Local\Temp\nsxC352.tmp\linker.dll

        Filesize

        7KB

        MD5

        0d5cf965fafcb11f8744d0dc729339da

        SHA1

        ccfeb09534dce671a3fcd216606d7ee572a0341e

        SHA256

        02ee7e90b9379827cb186df48db5b412aaf800196d6967762fb513b9143cd1ef

        SHA512

        993a598e3c46a4544ee0011a94fd9a4df66131b1526744db31faf8c5bfba4b5695a096d787555a9807d8bfd3e09bebfa73df97db83b144990c84cb14a000ba56

      • \Users\Admin\AppData\Local\Temp\nsxC352.tmp\nsEnvVariables.dll

        Filesize

        41KB

        MD5

        29924ed9ad063b5fda86aaf08dd3227f

        SHA1

        f2628d325dd17c1dcc8edd167e2417d7c582f5c5

        SHA256

        083cbb8fdd692134bb80b6d12c0fcd71ede5444064d226b6d747e3227995e045

        SHA512

        7909415f5efbd12d4cb152e44222f3564178cc242809909fe094f6d5e2578634ed07f7d71aa9cd2e31cc3371a5e7875bd4691a2d85f7041ebb1c4e2bca978549

      • memory/1008-2131-0x00007FFDC8430000-0x00007FFDC8446000-memory.dmp

        Filesize

        88KB

      • memory/1664-339-0x0000021128230000-0x0000021128232000-memory.dmp

        Filesize

        8KB

      • memory/1664-116-0x0000021115A50000-0x0000021115A52000-memory.dmp

        Filesize

        8KB

      • memory/1664-337-0x00000211277F0000-0x00000211277F2000-memory.dmp

        Filesize

        8KB

      • memory/1664-357-0x00000211293E0000-0x00000211293E2000-memory.dmp

        Filesize

        8KB

      • memory/1664-345-0x0000021126B70000-0x0000021126B72000-memory.dmp

        Filesize

        8KB

      • memory/1664-353-0x00000211287A0000-0x00000211287A2000-memory.dmp

        Filesize

        8KB

      • memory/1664-382-0x00000211295A0000-0x00000211295A2000-memory.dmp

        Filesize

        8KB

      • memory/1664-360-0x0000021129400000-0x0000021129402000-memory.dmp

        Filesize

        8KB

      • memory/1664-462-0x00000211151D0000-0x00000211151E0000-memory.dmp

        Filesize

        64KB

      • memory/1664-464-0x00000211151D0000-0x00000211151E0000-memory.dmp

        Filesize

        64KB

      • memory/1664-269-0x00000211290C0000-0x00000211291C0000-memory.dmp

        Filesize

        1024KB

      • memory/1664-268-0x00000211290C0000-0x00000211291C0000-memory.dmp

        Filesize

        1024KB

      • memory/1664-212-0x0000021126B20000-0x0000021126B40000-memory.dmp

        Filesize

        128KB

      • memory/1664-178-0x00000211272C0000-0x00000211272C2000-memory.dmp

        Filesize

        8KB

      • memory/1664-114-0x0000021115A30000-0x0000021115A32000-memory.dmp

        Filesize

        8KB

      • memory/1664-350-0x00000211284E0000-0x00000211284E2000-memory.dmp

        Filesize

        8KB

      • memory/1664-120-0x0000021115A70000-0x0000021115A72000-memory.dmp

        Filesize

        8KB

      • memory/1664-65-0x0000021115C00000-0x0000021115D00000-memory.dmp

        Filesize

        1024KB

      • memory/1664-465-0x00000211151D0000-0x00000211151E0000-memory.dmp

        Filesize

        64KB

      • memory/1664-466-0x00000211151D0000-0x00000211151E0000-memory.dmp

        Filesize

        64KB

      • memory/1664-376-0x0000021129420000-0x0000021129422000-memory.dmp

        Filesize

        8KB

      • memory/1664-417-0x0000021115C00000-0x0000021115D00000-memory.dmp

        Filesize

        1024KB

      • memory/1664-467-0x00000211151D0000-0x00000211151E0000-memory.dmp

        Filesize

        64KB

      • memory/2832-2122-0x00007FFDC8430000-0x00007FFDC8446000-memory.dmp

        Filesize

        88KB

      • memory/2832-2121-0x000001FB7D4E0000-0x000001FB7D4F6000-memory.dmp

        Filesize

        88KB

      • memory/2832-2123-0x000001FB7D5A0000-0x000001FB7D5E6000-memory.dmp

        Filesize

        280KB

      • memory/4492-43-0x000001A624250000-0x000001A624350000-memory.dmp

        Filesize

        1024KB

      • memory/4492-45-0x000001A624250000-0x000001A624350000-memory.dmp

        Filesize

        1024KB

      • memory/4492-44-0x000001A624250000-0x000001A624350000-memory.dmp

        Filesize

        1024KB

      • memory/4592-35-0x00000206E9FF0000-0x00000206E9FF2000-memory.dmp

        Filesize

        8KB

      • memory/4592-0-0x00000206ECB20000-0x00000206ECB30000-memory.dmp

        Filesize

        64KB

      • memory/4592-16-0x00000206ECC20000-0x00000206ECC30000-memory.dmp

        Filesize

        64KB