Adware.Solimba
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 7,638 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 5,446 |
| First Seen: | December 6, 2012 |
| Last Seen: | February 3, 2026 |
| OS(es) Affected: | Windows |
Adware.Solimba is a generic detection for a category of adware used for data harvesting and distributing other malware. One of the most recent widespread examples of Adware.Solimba is an adware infection that is distributed as a key generator for illegitimate copies of the Windows 8 operating system. However, the twist is that Adware.Solimba is designed to display an error message claiming that the victim's version of Windows 8 is illegitimate and then directing the victim to press on an OK button which actually serves to install other malware on the victim's computer. This version of Adware.Solimba is hardly the only one.
Adware receives its name because, originally, these malware infections were solely designed to deliver advertisements in the form of distracting pop-up windows to the victim's computer. However, adware is becoming increasingly more complex and invasive due to the bundling of these infections with spyware and other forms of malicious software. This is done by shady marketing companies and criminals wishing to exploit the potential profits inherent in data harvesting, that is, tracking computer users' activity and preferences and then selling this data to a third party for advertisement and marketing purposes. Advertising is often a necessary evil; it has, in fact, been responsible for the boom of content on the Internet. However, the desire for easy money has turned adware into potentially invasive applications that can have a destructive impact on a computer and negatively affect a computer user's online activity and experience. Adware.Solimba variants are some of the top adware infections of 2012.
When an anti-malware program detects an Adware.Solimba infection, this is usually a generic detection that is meant to alert the computer user that there is a third party program being installed along with another program without the computer user's knowledge. The most common kinds of Adware.Solimba infections are executable files that have behaviors typical of Trojan downloaders. They try to download and install other executable files from advertisement networks, which are then used to deliver pop-up advertisements to the victim's computer while also collecting data from the infected computer. These will usually use social engineering to enter a computer in the first place (such as with the above example of a fake key generator).
Table of Contents
Analysis Report
General information
| Family Name: | Adware.Solimba |
|---|---|
| Signature status: | Modified signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
61226e2f4f0343bb7cadec19e780bdc7
SHA1:
7080b6c058380ef21a26a8f507c28be5e936b755
File Size:
232.76 KB, 232760 bytes
|
|
MD5:
0baf72c8ece3238a2cb5ca1b947b73e1
SHA1:
9d0daa01506d05d9af23a69af82d63dab1856cc0
File Size:
419.10 KB, 419104 bytes
|
|
MD5:
6939d0e3a332349f7fa39e536324d920
SHA1:
b1afe00366a4ee082fc4069d9b9fe9592952e3c2
File Size:
550.47 KB, 550472 bytes
|
|
MD5:
3d9f388f98c351a181c7fef468785a57
SHA1:
ac3b7e0ca846059876fc862cd03792f45de417cf
File Size:
413.05 KB, 413048 bytes
|
|
MD5:
0249bb0ebf4de41a57acf4e137d793ea
SHA1:
92ac60fbb21121c65d4d0d31bc48ad3be7a45b74
File Size:
169.27 KB, 169272 bytes
|
Show More
|
MD5:
280f9972bfd2a6d609802a98624b97ae
SHA1:
9d035c31a6e9c38648f98f650e1c14ee2fd5b48e
File Size:
550.59 KB, 550592 bytes
|
|
MD5:
d0268c351d1dfad04436d660fabcad9d
SHA1:
e52a7c153f6fff4d0bd4f891b299cc8300bc1dfe
File Size:
218.68 KB, 218680 bytes
|
|
MD5:
a5f168fa576bb3c14f07bc3f73df4206
SHA1:
7dfc07343331aab984e02d866db5bfc13e531897
SHA256:
F4810AB02FA2241A73810A7C7694B6AC1177DDD1A868882B5E271DBCA23F0BE8
File Size:
277.22 KB, 277224 bytes
|
|
MD5:
c06a315fc7d8dda00a406c45986b8ae6
SHA1:
427c4df1f5aba61925d662b48ce4486415c45891
SHA256:
3B65E8A06E65AAAD32E271AF722C17B0CAA27ED109325B1B7B7C6E150D5B72AA
File Size:
513.44 KB, 513440 bytes
|
|
MD5:
9f34e443156e0d78c0f38017e2e0113d
SHA1:
7616b112355103f6c1ba22c8b9d9ad78d9005f66
SHA256:
8364F32853A587F15AE5F79B9845688935E61017AD38818054940CC44915FD7B
File Size:
513.44 KB, 513440 bytes
|
|
MD5:
7e5adab0441fa61a1757ce0ed93db3e3
SHA1:
0d9e8d8029ccaf27377b75b88e5a3f5e871fca20
SHA256:
99ED2CF1BED19C47B32A4EF5314B12671FDC8D8B948F79BDD718EE16E4AC35F1
File Size:
169.27 KB, 169272 bytes
|
|
MD5:
046e1f9a437fd58f91e879fcef2837e4
SHA1:
80077b58aeee1cfab7bed147721f917c8cd599c1
SHA256:
E4656861ED2E7B0DB0BDE2E0A878CB5B772DA400EDC3F49C6FB72FD366302552
File Size:
568.02 KB, 568024 bytes
|
|
MD5:
a90ba59542fefabeb934692a955a2455
SHA1:
e28b054478cae1c3d438b7a853c1bb81ba444839
SHA256:
AC98C0972696B4E7983B867D8B57839C03FDA1D3E5437CB26C9230D41C34AF95
File Size:
288.70 KB, 288696 bytes
|
|
MD5:
91b70dcaf39e6fc26061434f5886952b
SHA1:
8fea73fff470edfc4cf35a68cc8a750d35536dbf
SHA256:
CA2F8A37ACD9C02867AA6AC990B78C67875FAA2B96195AF771D77ACC7CBCC770
File Size:
146.88 KB, 146880 bytes
|
|
MD5:
fade9e18c2069080a498ce31bc4a9d9a
SHA1:
2bc7b56750bc7736ab36fd0d1a7c9a70510a465c
SHA256:
6799677DD16851ABE488E6B206A1D668664720116A8C187F5E1A8F4C633BA9F8
File Size:
580.30 KB, 580304 bytes
|
|
MD5:
69ca2d735b952d1e29de38d61aa48943
SHA1:
e304c2cb328f169cea55b0d0a80221e4f0bec514
SHA256:
0388D0C2A167F3879D5080D4DDFC3B01B9B8DC8AC0373BB9EFB92158814532A7
File Size:
169.27 KB, 169272 bytes
|
|
MD5:
eea8df64d2939d0eb215f61d29b1f511
SHA1:
756e440cee32f9124605bb5028f475e45c9e1eec
SHA256:
D8356B9A0F1F0B937E9CB5BA1C33C802A9ABDF0B29172C4B061F93A6DFA7D87A
File Size:
211.58 KB, 211584 bytes
|
|
MD5:
e78c04c5efc02610dec8939f4943ace4
SHA1:
879069fda8ba59c781a172a386f2549f2867ce17
SHA256:
C622B87EBA1B8BFF7A57C446146C195A77CF9C53B2E19D481AFFF4553A89C181
File Size:
188.22 KB, 188216 bytes
|
|
MD5:
27e484ce173e835e49c9333eee90203c
SHA1:
0982a19be13f234f5e8d6ee512d1521aa7215313
SHA256:
ED5305E01FB3DB5B0069E9D55CF9C7A37007257895A149B6F2283CBF24942260
File Size:
585.92 KB, 585920 bytes
|
|
MD5:
d177b1df9131ad5b50107f5724c80ef3
SHA1:
f6e2e91492dded6fdd49ea64fd5a05289bdec3ad
SHA256:
EDB8C726EF1D655A64E5EB61A0C2E692693E27A5A4F860CC99BDEFD436278C44
File Size:
161.43 KB, 161432 bytes
|
|
MD5:
a615bfe11ba9283035b7793d2b997972
SHA1:
9d3d3b564a32b2d1fdff51e6b71b44e63aa4c6d2
SHA256:
05D57A886929C05265D0BAF3E288ED6E9AD3FA5F2727D03D65B02CE3478B54ED
File Size:
180.86 KB, 180864 bytes
|
|
MD5:
2e48e533dbe8775263ad2d80b7c6391d
SHA1:
70c502d688c1185cb1b561a6c8cd6b35ac6e1fb2
SHA256:
7AEB6E8E093A36C8737F718965581DEB75F67ED897FE427B0A32D01E0B0AE355
File Size:
169.27 KB, 169272 bytes
|
|
MD5:
38a2fc384a52a9f7301f439439328833
SHA1:
15197739421cc6039fa566d33028c78c8974e984
SHA256:
9C1721D167BED245DD0DDF69D8C3A4AF3AF66B59A2E0ADCA570CC88B09F90095
File Size:
190.60 KB, 190600 bytes
|
|
MD5:
8d5d2ee4b810786bf1a67f78075a9a2a
SHA1:
f1184747517178e7470f947541d13a705b5dc030
SHA256:
FBC30C3CC066BE2D1BE102EF82BD8400AE86A384B314CE3CC95FE6031163A82A
File Size:
283.23 KB, 283232 bytes
|
|
MD5:
3116b34adf52ed0a378dada521bdfb51
SHA1:
d9438eb188a25a44c8c894a0195b5fb48be87914
SHA256:
9910DC2BE079AA41B854C1C070EA524FD04FE9640CA18F98CC6E57BF61A1BE85
File Size:
4.20 MB, 4196040 bytes
|
|
MD5:
ba3636d46c4fb1c677af607a6404cbc5
SHA1:
20519d7db918a38a6822290b96e9a416a5c40747
SHA256:
B9E78353018A7534467B8D9A011F40170D2B0DDE603753D9B7F1A57D86ED67E7
File Size:
537.82 KB, 537824 bytes
|
|
MD5:
ed42e4e12e640ed7640f6f862362991b
SHA1:
a6df8791590350c8968c49e02400f2a5cf612e79
SHA256:
C1A820DFC1F9167896432FBC110BDE6669452B0E77AB983D48E12D4DAE31CF24
File Size:
218.68 KB, 218680 bytes
|
|
MD5:
f81f5d4a0fcb06e46ab3613e94916d0f
SHA1:
fefcae26d52af842cf088125c5cdad5b23a997aa
SHA256:
D9684702C1BF4D41241E6D339F13A1551EE6BB763683AD3F789E1D552D279211
File Size:
208.81 KB, 208808 bytes
|
|
MD5:
904fefdf882400b82277507d168bd9e0
SHA1:
5d7db8945d38b030c322558b32ca18f0c8f2c4ff
SHA256:
7655388D1A85D71A0D55682DE178F38B01082CB78364CEF1D2C5CC9D8FD8F22D
File Size:
283.26 KB, 283264 bytes
|
|
MD5:
4899d6fe6e0dadc0217c3b73332a83b4
SHA1:
5416aeb4228f201d08cc5e8c737e722db7c9757e
SHA256:
9D299953AEC35E7F291DC620385352B73ADE480906EBAF1B76BA810DF6B9EF90
File Size:
165.18 KB, 165176 bytes
|
|
MD5:
d5316e2556a66c39729d89b8dc7ca297
SHA1:
0fae4b5ce8b4294c6d4f89130266dc8d40ccdde0
SHA256:
8EC6FE0F70ED40BE49CEA5989F5B909A268ABCC5922533D4CF93BA5002DBF879
File Size:
209.80 KB, 209800 bytes
|
|
MD5:
0c2cd8cf44fc30647acc8d9160467356
SHA1:
c1b2d06728de067b6bbeb61f0874763e23b481a1
SHA256:
622ACBA79719D8F80FB135E062695372FFCE7803148B148EB80CB70839D2E63E
File Size:
267.34 KB, 267344 bytes
|
|
MD5:
b0f5544a32bb2d9d4f639cba8c6b7c6e
SHA1:
9bebe1e16611517ce45569dc614b9fced6dfdc94
SHA256:
615435EC0EA04CEC2F945F29B4B32E0F2C6089A25CA94814D56656A787DC2BCA
File Size:
168.76 KB, 168760 bytes
|
|
MD5:
8e620fa6ce97d1cc0e69d9b83b345ef2
SHA1:
2a394279c207dc42f4d8a66a0bc9ace65e243695
SHA256:
8A8CC21F52FBF9D232DCC3DE3C2E95135BFF7E5A77A824EBEA8CFDA0DACE7C72
File Size:
267.12 KB, 267120 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
Show More
|
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
Show More
|
| Original Filename |
|
| Product Name |
Show More
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Eilio Developments sl | GlobalSign CodeSigning CA - G2 | Self Signed |
| Firseria | GlobalSign Root CA | Root Not Trusted |
| Bechiro S.L. | Thawte Code Signing CA - G2 | Self Signed |
| Danorel Integral | Thawte Code Signing CA - G2 | Self Signed |
| Delimax Concept | Thawte Code Signing CA - G2 | Self Signed |
Show More
| FIRSERIA, S.L. | Thawte Code Signing CA - G2 | Self Signed |
| POPELER SYSTEM, S.L. | Thawte Code Signing CA - G2 | Self Signed |
| Solimba Aplicaciones S.L. | VeriSign Class 3 Public Primary Certification Authority - G5 | Root Not Trusted |
| Apps Installer S.L. | thawte Primary Root CA | Root Not Trusted |
| Bechiro S.L. | thawte Primary Root CA | Root Not Trusted |
| FIRSERIA, S.L. | thawte Primary Root CA | Root Not Trusted |
| POPELER SYSTEM, S.L. | thawte Primary Root CA | Root Not Trusted |
File Traits
- .NET
- Installer Version
- RijndaelManaged
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- AutoHotkey.A
- Bitcoinminer.R
- ClipBanker.CZ
- CoinMiner.BB
- Emotet.AAJ
Show More
- Emotet.AAL
- Kryptik.FAQ
- MPRESS Packer
- Strictor.A
- Tofsee.BP
- Upatre.WIA
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ins1990\ins1990.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ins5639\ins5639.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ins895\ins895.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n1311\s1311.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n1311\s1311.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n1872\s1872.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n1872\s1872.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n218\s218.exe | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\n3020\ins3020.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n3388\s3388.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n367\s367.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n4261\ins4265.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n4996\s4996.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n4996\s4996.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n5338\s5338.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n5338\s5338.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n6418\s6418.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n7490\s7490.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n7490\s7490.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n7996\s7996.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n7996\s7996.exe.zip | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsb6382.tmp\installer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsb6382.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca796.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsca797.tmp\installer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca797.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsd4505.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsgdc47.tmp\installer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsgdc47.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsh5ec.tmp\inst.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsh5ec.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsha768.tmp\northstar.arg | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsha768.tmp\northstar.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsha768.tmp\northstar.pat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsha768.tmp\vpatch.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsi7320.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsj8d17.tmp\dlmgn.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsj8d17.tmp\dlmgn.exe.config | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl3f2a.tmp\nrth.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl6371.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsma786.tmp\dlmgn.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsma786.tmp\dlmgn.exe.config | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp576a.tmp\installer.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp576a.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsqdc46.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsr5db.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsra757.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nss4515.tmp\domanager.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss4515.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstfcfb.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nstfcfc.tmp\northstar.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstfcfc.tmp\northstar.narf | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstfcfc.tmp\nsunzip.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstfcfc.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsv3f19.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsvbced.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsvbcee.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\downloadmr.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\downloadmr.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\downloadmr.iz | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\downloadmr.iz | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\nsunzip.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\nsunzip.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsvbcee.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx7330.tmp\dnmn.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx7330.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz136f.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsz1370.tmp\northstar.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz1370.tmp\northstar.narf | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsz1370.tmp\northstar.narf | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz1370.tmp\nsunzip.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz1370.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz5759.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\0d63a744638e55e5d3f5a6bf50faa1b5_e5eb3634f775e9fd48f4ed1558c8c9a6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\12236c41cddf9e40ba5606cdf086b821 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\1f39b5cfacecfde48db25bca2231fac6_f0e2901b5cb9dfcb03318b8d06c40a30 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\62b5af9be9adc1085c3c56ec07a82bf6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\68faf71af355126bca00ce2e73cc7374_d83c582f69e1d2d5dbf1c7331b0b9e85 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\77ec63bda74bd0d0e0426dc8f8008506 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\7b8944ba8ad0efdf0e01a43ef62becd0_20937c87a2bf6c2eb36fb48775567f7b | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\7d266d9e1e69fa1eefb9699b009b34c8_0a9bfdd75b598c2110cbf610c078e6e6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8dfdf057024880d7a081afbf6d26b92f | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8e4e510f44a56b8c8ecfec352907c373_2d5f48902af9bdf23d43c96a0e2f2f07 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8e4e510f44a56b8c8ecfec352907c373_2e926affdf027eb0e48ced864a4f1fc6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8e4e510f44a56b8c8ecfec352907c373_3cb1a6b5e29fc9dcd533722c4568e06f | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8e4e510f44a56b8c8ecfec352907c373_75e9292196748f7e1bd16737619d5bfb | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\8edcf682921fe94f4a02a43cd1a28e6b | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\955cab6ff6a24d5820d50b5ba1cf79c7_ad9e7615297a3a83320aace5801a04f9 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\955cab6ff6a24d5820d50b5ba1cf79c7_cc1689c2a9a5cb35265f3c2516751959 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\content\cd9c747f40eea288d73938d33144f716 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\0d63a744638e55e5d3f5a6bf50faa1b5_e5eb3634f775e9fd48f4ed1558c8c9a6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\12236c41cddf9e40ba5606cdf086b821 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\1f39b5cfacecfde48db25bca2231fac6_f0e2901b5cb9dfcb03318b8d06c40a30 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\62b5af9be9adc1085c3c56ec07a82bf6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\68faf71af355126bca00ce2e73cc7374_d83c582f69e1d2d5dbf1c7331b0b9e85 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\77ec63bda74bd0d0e0426dc8f8008506 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\7b8944ba8ad0efdf0e01a43ef62becd0_20937c87a2bf6c2eb36fb48775567f7b | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\7d266d9e1e69fa1eefb9699b009b34c8_0a9bfdd75b598c2110cbf610c078e6e6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8dfdf057024880d7a081afbf6d26b92f | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8e4e510f44a56b8c8ecfec352907c373_2d5f48902af9bdf23d43c96a0e2f2f07 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8e4e510f44a56b8c8ecfec352907c373_2e926affdf027eb0e48ced864a4f1fc6 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8e4e510f44a56b8c8ecfec352907c373_3cb1a6b5e29fc9dcd533722c4568e06f | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8e4e510f44a56b8c8ecfec352907c373_75e9292196748f7e1bd16737619d5bfb | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\8edcf682921fe94f4a02a43cd1a28e6b | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\955cab6ff6a24d5820d50b5ba1cf79c7_ad9e7615297a3a83320aace5801a04f9 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\955cab6ff6a24d5820d50b5ba1cf79c7_cc1689c2a9a5cb35265f3c2516751959 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\locallow\microsoft\cryptneturlcache\metadata\cd9c747f40eea288d73938d33144f716 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\assembly | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\91c6d6ee3e8ac86384e548c299295c756c817b81::blob | 쪌츢뻵걲ᩁꠑዘ ﺅᯱ䝏㧾勒ƃ柳皉컠 * ⠰ࠆثԁ܅ȃࠆثԁ܅̃ࠆثԁ܅Ѓࠆثԁ܅ă * ⠰ࠆثԁ܅ȃࠆثԁ܅̃ࠆثԁ܅Ѓࠆثԁ܅ăS % ⌰ℰଆ虠ňŅ〇、〒ؐ⬊ĆĄ㞂ļ́拀 Ā 贀⽲ꦁᏁ秀ꈶ涖沲કᶗ殴饁 | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\91c6d6ee3e8ac86384e548c299295c756c817b81::blob | \ ࠀ 珜럹ᘞᷕ刦㉽᪱㵪 욑訾揈쉈⦙畜腬腻h ~ 쀀⼃ǖ thawte 㭛gʀ䈮孠㭫䁲 孻콅캯立ㇽ᪒뙪䛳埫偈b 犍脯솩쀓ᵹ㛱隢뉭镬霊됝䅫哪讷鿻S % ⌰ℰଆ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\91c6d6ee3e8ac86384e548c299295c756c817b81::blob | ﺅᯱ䝏㧾勒ƃ柳皉컠 * ⠰ࠆثԁ܅ȃࠆثԁ܅̃ࠆثԁ܅Ѓࠆثԁ܅ă * ⠰ࠆثԁ܅ȃࠆثԁ܅̃ࠆثԁ܅Ѓࠆثԁ܅ăS % ⌰ℰଆ虠ňŅ〇、〒ؐ⬊ĆĄ㞂ļ́拀 Ā 贀⽲ꦁᏁ秀ꈶ涖沲કᶗ殴饁띔ﮋᒟ Ā ᐀ 笀䕛꿏쯎ﵺ鈱 | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\root\certificates\be36a4562fb2ee05dbb3d32323adf445084ed656::blob | \ Ѐ 볝蚽㾜ࠛ컯퇄춈ᔻ ᰘ兘槹镹⍋ . Thawte Timestamping CA ਰࠆثԁ܅ࠃ 㚾嚤눯돛⏓괣䗴丈囖 晿煺硩騠ᑑ莝⃚ ꗨ뺘芄ﺎ炮ᔑ㔁뉶 ʥ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\91c6d6ee3e8ac86384e548c299295c756c817b81::blob | 珜럹ᘞᷕ刦㉽᪱㵪 욑訾揈쉈⦙畜腬腻h ~ 쀀⼃ǖ thawte 㭛gʀ䈮孠㭫䁲 孻콅캯立ㇽ᪒뙪䛳埫偈b 犍脯솩쀓ᵹ㛱隢뉭镬霊됝䅫哪讷鿻S % ⌰ℰଆ虠ňŅ〇、〒ؐ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 窣ﻫ䖹ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\4eb6d578499b1ccf5f581ead56be3d9b6744a5e5::blob | ់㹧ৢ䗾鍗ᳺ ứ霞輫穆轙⊩㢅즔S c 愰ℰଆ虠ňŅᜇ〆〒ؐ⬊ĆĄ㞂ļ́ダ؟怉䢆蘁泽ĂሰူਆثЁ舁㰷āȃ쀀ᬰԆ腧Č〃〒ؐ⬊ĆĄ㞂ļ́翀 Ā ⨀ ب⬈Ćԅ̇⬈Ćԅ̇⬈Ćԅ̇⬈Ćԅ̇ँ Ā ⨀ ب⬈Ćԅ̇⬈Ćԅ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\4eb6d578499b1ccf5f581ead56be3d9b6744a5e5::blob | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 텏㆕头ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 鐦ݙ歋ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\07e032e020b72c3f192f0628a2593a19a70f069e::blob | 䂁ᣅﱩⱆ疉ར碪 嚨출얜米ቺ惟Ⲍ咼S e 挰ℰଆ萪Ũɷą、〒ؐ⬊ĆĄ㞂ļ́ダء⨋梄蘁矶Ԃ܁ሰူਆثЁ舁㰷āȃ쀀ᬰԆ腧Č〃〒ؐ⬊ĆĄ㞂ļ́ী Ā 吀 ْ⬈Ćԅ̇⬈Ćԅ̇⬊ĆĄ㞂̊⬈Ćԅ̇⬈Ćԅ̇؆⬈Ćԅ̇؇⬈Ćԅ | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\07e032e020b72c3f192f0628a2593a19a70f069e::blob | \ ࠀ 縟୵歖訒룀埖⩭ꕰ 뜠㼬⼙⠆妢᤺ྦྷ鸆 泥閯洬ꫲឤ꜆䑺ς 瘈쯍'췅믭벐蓢䘷b 塜赆䦎瑾船뗒က톶㝥콊ꞃꏔ뜭쑨蹀 4 Certum Trusted Network CA T | RegNtPreCreateKey |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\b94294bf91ea8fb64be61097c7fb001359b676cb::blob | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\b94294bf91ea8fb64be61097c7fb001359b676cb::blob | RegNtPreCreateKey | |
| HKLM\software\microsoft\systemcertificates\authroot\certificates\b94294bf91ea8fb64be61097c7fb001359b676cb::blob | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | พ舃ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62 *1\??\C:\P | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Syscall Use |
Show More
117 additional items are not displayed above. |
| Other Suspicious |
|
| Network Wininet |
|
| Network Winhttp |
|
| Encryption Used |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
open C:\Users\Sqlrpabk\AppData\Local\Temp\\ins1990\ins1990.exe ins.exe /e6588846 /u5177da23-5020-4d41-bc47-70525bc06f2f
|
C:\WINDOWS\system32\fondue.exe "C:\WINDOWS\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll
|
open C:\Users\Bcmetdjt\AppData\Local\Temp\\n218\s218.exe ins.exe /e 12955644 /u 52fe2c91-49dc-40b7-b209-1f140a000013 /h 8bd8fb.api.socdn.com /v "c:\users\user\downloads\9d0daa01506d05d9af23a69af82d63dab1856cc0_0000419104.exe"
|
C:\Users\Xswqluol\AppData\Local\Temp\\n7996\s7996.exe ins.exe /h 8bd8fb.api.socdn.com /e 13110420 /u 52fe2c91-49dc-40b7-b209-1f140a000013 /v "c:\users\user\downloads\b1afe00366a4ee082fc4069d9b9fe9592952e3c2_0000550472.exe"
|
open C:\Users\Hsvcvwwy\AppData\Local\Temp\\n6418\s6418.exe ins.exe /h 05e0fa.api.socdn.com /u 5280fdf5-b928-4cc4-9510-17bb0a000013 /e 12757087 /v "c:\users\user\downloads\ac3b7e0ca846059876fc862cd03792f45de417cf_0000413048.exe"
|
Show More
open C:\Users\Kmtmfjkw\AppData\Local\Temp\\ins895\ins895.exe ins.exe /e4895713 /u4e6dc5a8-8b04-4b39-a43b-6b925bc06f2f
|
C:\Users\Xextudfq\AppData\Local\Temp\\n4996\s4996.exe ins.exe /u 52fe2c91-49dc-40b7-b209-1f140a000013 /e 13278182 /h 8bd8fb.api.socdn.com /v "c:\users\user\downloads\9d035c31a6e9c38648f98f650e1c14ee2fd5b48e_0000550592.exe"
|
C:\Users\Zgmtfgfv\AppData\Local\Temp\nsj8D17.tmp\dlmgn.exe "c:\users\user\downloads\e52a7c153f6fff4d0bd4f891b299cc8300bc1dfe_0000218680.exe"
|
open C:\Users\Fkgbkytm\AppData\Local\Temp\\n4261\ins4265.exe ins.exe /e10232334 /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
|
open C:\Users\Pnrhlamz\AppData\Local\Temp\\n367\s367.exe ins.exe /h 4b043.api.socdn.com /e 12902139 /u 50d1d9d5-cf90-407c-820a-35e05bc06f2f /v "c:\users\user\downloads\427c4df1f5aba61925d662b48ce4486415c45891_0000513440"
|
open C:\Users\Owyqecrd\AppData\Local\Temp\\n3388\s3388.exe ins.exe /u 52fe2c91-49dc-40b7-b209-1f140a000013 /e 12363826 /h 48bd8.api.socdn.com /v "c:\users\user\downloads\7616b112355103f6c1ba22c8b9d9ad78d9005f66_0000513440"
|
s7490.exe /e 13906423 /u 5280fdf5-b928-4cc4-9510-17bb0a000013 /h 5e0f.api.socdn.com /v "c:\users\user\downloads\80077b58aeee1cfab7bed147721f917c8cd599c1_0000568024"
|
C:\Users\Iueyzsei\AppData\Local\Temp\nsp576A.tmp\installer.exe e876d9d0-e3fb-11e2-b66b-00259033c1da.exe /t1022fff70e61aa214ee778a169dcc0 /dT132281332S1022fff70e61aa214ee778a169dcc0 /e9464140 /ue876d9d0-e3fb-11e2-b66b-00259033c1da
|
C:\Users\Jkquqjyg\AppData\Local\Temp\nsx7330.tmp\dnmn.exe /u4dc91109-8910-4f47-b8b6-203e5bc06f26 /e55761
|
s5338.exe /e 13553192 /h 5e0f.api.socdn.com /u 5280fdf5-b928-4cc4-9510-17bb0a000013 /v "c:\users\user\downloads\2bc7b56750bc7736ab36fd0d1a7c9a70510a465c_0000580304"
|
open C:\Users\Zhatkhio\AppData\Local\Temp\\ins5639\ins5639.exe ins.exe /e11775316 /u5193805b-c284-4f85-b972-26465bc06f2f
|
C:\Users\Auzkporp\AppData\Local\Temp\nsgDC47.tmp\installer.exe 512e4fc0-18d4-4361-bb1e-3ca05bc06f2f.exe /u512e4fc0-18d4-4361-bb1e-3ca05bc06f2f /e7021522 /dT131701413S /t
|
open C:\Users\Telziiss\AppData\Local\Temp\\n3020\ins3020.exe ins.exe /e5364955 /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
|
C:\Users\Xsixbndi\AppData\Local\Temp\\n1311\s1311.exe ins.exe /u 52fe2c91-49dc-40b7-b209-1f140a000013 /e 12904962 /h 8bd8fb.api.socdn.com /v "c:\users\user\downloads\0982a19be13f234f5e8d6ee512d1521aa7215313_0000585920"
|
C:\Users\Hrnujyha\AppData\Local\Temp\nsl3F2A.tmp\nrth.exe /dT201304191608 /e2268018 /aPhotoRec /u4dc9054e-38b0-4614-bdd5-20605bc06f26
|
C:\Users\Nyfxvzno\AppData\Local\Temp\nss4515.tmp\domanager.exe /u4d79ee5a-3ef0-4e31-86b7-468d5bc06ebe /e14234 /dT201210231027
|
C:\Users\Hienffmp\AppData\Local\Temp\nsh5EC.tmp\inst.exe 50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe /dT131632108S /e5458639 /t /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
|
C:\Users\Oopiiuco\AppData\Local\Temp\nsb6382.tmp\installer.exe 0a2a1890-e4c3-11e2-b66b-00259033c1da.exe /t102431e84bb8f03627ca2b27526c23 /dT131891749S102431e84bb8f03627ca2b27526c23 /e9719152 /u0a2a1890-e4c3-11e2-b66b-00259033c1da
|
s1872.exe 2ae38e0d3074c6553c8d769cGB+oRbAS5cKedBRu+s9Ad/mc2JIdsSag645IlAFNg4ltjab1bZTsBSgyxo86BRuR4y0WwEunz1/xiwTAcjaE5g2v77f0qJdnhE9gGERqbdrj1YjcsxquMdsT1mZ30M7Zxn/TlV8Ha9BuHwk0HBstzbj5 /v "c:\users\user\downloads\20519d7db918a38a6822290b96e9a416a5c40747_0000537824"
|
C:\Users\Kdothuiu\AppData\Local\Temp\nsmA786.tmp\dlmgn.exe "c:\users\user\downloads\a6df8791590350c8968c49e02400f2a5cf612e79_0000218680"
|
C:\Users\Lzsxzkgx\AppData\Local\Temp\nshA768.tmp\northstar.exe /dT201303151737 /e5755349 /u512e4fc0-18d4-4361-bb1e-3ca05bc06f2f
|
C:\Users\Edospney\AppData\Local\Temp\nscA797.tmp\installer.exe c44c0242-e47d-11e2-b66b-00259033c1da.exe /t102f10c3cfb0de4d7215b336beb45f /dT131911503S102f10c3cfb0de4d7215b336beb45f /e9504441 /uc44c0242-e47d-11e2-b66b-00259033c1da
|
C:\Users\Bbtrllai\AppData\Local\Temp\nsvBCEE.tmp\downloadmr.exe /u4db81fcb-20f4-42d4-8d8b-4c1f5bc06ebe /e2349171
|
C:\Users\Yignmcoe\AppData\Local\Temp\nsz1370.tmp\northstar.exe /u50d1d9d5-cf90-407c-820a-35e05bc06f2f /e5569970 /dT201302051159
|
C:\Users\Kzfvczxy\AppData\Local\Temp\nstFCFC.tmp\northstar.exe /u4fbfca05-374c-42b7-8d55-26865bc06f2f /e3243495 /dT201301251837
|