Malware.Rujack
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 314 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 455,173 |
| First Seen: | April 6, 2017 |
| Last Seen: | January 24, 2026 |
| OS(es) Affected: | Windows |
Rujack and Malware.Rujack are detection names that are used by cybersecurity developers in reference to riskware and browser hijacking software, which forces users to load pages on the h[tt]ps://mail[.]ru domain. Mail.ru is a legitimate site suited for Russian-speaking Web surfers. Mail.ru is similar to Bing and Google in many ways with its built-in weather forecast, IM client support, email service, news feeds and the Yandex search service integration. Unfortunately, the reputation of Mail.ru is has been plagued by adware activity and browser hijacking that was caused by third parties looking to claim advertising revenue from redirecting users to Mail.ru.
The software flagged as Rujack and Malware.Rujack may include browser extensions for Google Chrome, add-ons for Mozilla Firefox and Browser Helper Objects (BHOs) for Internet Explorer. Usually, the Rujack applications are distributed to PC users in the company of misleading and fake updates for Adobe Flash and Java. Rujack-branded programs may be presented to users as free media players and extensions that help with streaming video content from the Internet. We have seen applications like “Rutube Chrome Extension,” “WebExpEnhanced,” and “UpdHost2” flagged as Malware.Rujack and PUP.Optional.MailRu. Extensions with the following IDs have been known to cause problems for users:
lhemechcanjmilllmccjbjldonmnnjjj
hcadgijmedbfgciegjomfpjcdchlhnif
bhjhnafpiilpffhglajcaepjbnbjemci
indjgiebmakhmnaplnlnanodkfiejfjd
The Rujack software is observed to make changes to popular Web browsers and force them to load resources at Mail.ru, as well as advertisements from untrusted domains. Most of the cases that involve the Rujack software correspond to Europe and Central America. Malware.Rujack may use VBS scripts and Registry keys to redirect users to insecure pages on the Internet, as well as invite users to run questionable software from unverified publishers. It is best to remove the files and applications associated with Malware.Rujack using a credible anti-malware suite. AV scanners may list related files with the following names:
- Suspicious_GEN.F47V0628
- Trojan.Agent.CIPO
- Trojan.VBS.HotNews.a
- Win32/Trojan.7e4
- malware (ai score=81)
Table of Contents
SpyHunter Detects & Remove Malware.Rujack
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | ijhg.vbs | 990b494c525a8368f4b7ed9bac762ae1 | 58 |
Registry Details
Directories
Malware.Rujack may create the following directory or directories:
| %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Чистилка |
| %ALLUSERSPROFILE%\Чистилка |
| %APPDATA%\CurrencyConvertor |
| %APPDATA%\EVERYDAYHOLIDAY |
| %APPDATA%\MarketAdvior |
| %APPDATA%\Movies |
| %APPDATA%\Onetabber |
| %APPDATA%\PBot |
| %APPDATA%\WeatherForecaster |
| %APPDATA%\YoutubeDownloader |
| %APPDATA%\YoutubeDownloader_upd |
| %APPDATA%\adtschema |
| %APPDATA%\gerpril |
| %APPDATA%\kceidjgdigbhildogdafgekneemgibfe |
| %APPDATA%\msspeedlib |
| %APPDATA%\mysidex |
| %APPDATA%\okagncigkfokplmopeninonbibkmpogi |
| %APPDATA%\printfilterpipelinesvc |
| %AppData%\LookupPro |
| %AppData%\kodobi |
| %TEMP%\tmpnrlv3x9i |
| %TEMP%\tmpq07u1cp9 |
URLs
Malware.Rujack may call the following URLs:
| /gazetwa.ru |
| c.traffic-media.co/ |
| go.deliverymodo.com/afu |
| kalolo.ru |
| sagepubgo.com |
| search.distring.ru |
| searche-engine.ru |
| searchtds.ru |
| searchtrack.ru |
| send-notice.com |
| traff-1.ru |
| traff-2.ru |
| traff-3.ru |
| traff3.ru |
| traffic-media.co/mghtml |
Analysis Report
General information
| Family Name: | Malware.Rujack |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
7a63a29f7cba336748ae404be30b0293
SHA1:
d13b21c14c6ff59c65a924ca44797ae871225365
File Size:
978.50 KB, 978504 bytes
|
|
MD5:
f78b2b6bf6ee4c2d45dd80b80fc41eb5
SHA1:
7611ece276641bf3cee309e4047a3ac658645b3c
File Size:
5.17 MB, 5169152 bytes
|
|
MD5:
b2224c39d840e8b4138a9b0189e50e85
SHA1:
303ea8f12651c382bc0f7e26ed551b88c41649e0
SHA256:
BC84FA9AA38FD75379056E662C5E474CFE2BAF18DE1D23A0DF58D027ED4302E6
File Size:
2.55 MB, 2545936 bytes
|
|
MD5:
49bd2ac08370287fe8981ec44e489d2f
SHA1:
758646ef3c9c1fba7aa1134000624319c24e8cb7
SHA256:
6B8B02E815FF3AB39C474FA8D7F84AC2370563FA93BA9D90C299AB67B56C0DAE
File Size:
1.05 MB, 1052672 bytes
|
|
MD5:
3d1f5a6335e2380239b744f38eaa0ad1
SHA1:
9663ec59df0150cadac59cce87b14e2248272486
SHA256:
A8C7AE4D422341CDD21EA54286F64C1550DBE145856724DF148FC74E8F870C2B
File Size:
293.90 KB, 293904 bytes
|
Show More
|
MD5:
3f9c0dd9a697271399b4258e90d17eb6
SHA1:
ba104b981e24e0aaae774e07052d98785f1f99ad
SHA256:
BEBC78C8F54EF5FAAE53AE6182C235DB99AE96C2DD7B87657C6526A57D34EADB
File Size:
251.56 KB, 251560 bytes
|
|
MD5:
0ab13baf8dc634609b2dac444b0c92f4
SHA1:
53cae181389bc9c57c97f4c4165bdad91853c07c
SHA256:
E33B72130A5F79481D0A2264B97258ADBEA8472D9D1BE76D329CC28D43CCACF5
File Size:
1.23 MB, 1230784 bytes
|
|
MD5:
33b9a8b5c88778011c4f77107ba167fc
SHA1:
454755c8e375795dd7e9277e0a2282ce8fe821fc
SHA256:
D61673C31E8DBF00FE4C1B0173024D9AF6E8384EBD14EA776586600C9B88FDE3
File Size:
3.66 MB, 3662800 bytes
|
|
MD5:
b24173a36d4353fe1e059ec08ad36335
SHA1:
8ff3a1681699cfeb0936eca6d93a84ab3300473d
SHA256:
2EDBC21BD918B07DAC3097BA75363C0599B12312925D4273E085506327ED43C6
File Size:
190.87 KB, 190872 bytes
|
|
MD5:
14f7f35fdd9b3826a492392e9aaf40db
SHA1:
02c41d907e44c7b8f2bad33aa9e528709cf5e50f
SHA256:
40825F9CC45E6655A9A563B3C742A343C8C62D012AA7158D0A194A806B1020D3
File Size:
1.27 MB, 1272536 bytes
|
|
MD5:
ac946d1efea429910b6720e42c499408
SHA1:
743013cd4d745a9efbe1b516c97fa290df6ea5d7
SHA256:
342CC2BD05E70875BDC5FEE7E3CCD02957ACDEDCC1A8BDC40996CFF914F85BB1
File Size:
2.45 MB, 2452248 bytes
|
|
MD5:
068e0df1ba4fd92068ee891624c810ec
SHA1:
e3a148220a4f901ca1329c8bbbbb1804c6a5b1f9
SHA256:
8CE4D1E72FE174E8CC9FE653BE78D6F3DE5505C36838AEE4268548A5E50E1C97
File Size:
3.94 MB, 3937016 bytes
|
|
MD5:
55f28141894c9a1eb39084a2f40b690d
SHA1:
6f4dae273a57028c2c179fe7a8c3d7650776dc54
SHA256:
F92CBC58655450E86139B48442A4E3DD7E1CF65800943AC43268C69AD2174AAC
File Size:
3.15 MB, 3153304 bytes
|
|
MD5:
b6653433f74a1f8a83ea9ee19d57d5b3
SHA1:
3fb8861c5b0e1346bd737f1348536c11a9e16fe9
SHA256:
53FA3130B4ACD6FBEFA51F732C236B76E687CE66B0F9480120C1045BDAA36F6B
File Size:
4.88 MB, 4876184 bytes
|
|
MD5:
4e3087ab06ddfd5952216ea70d467fb0
SHA1:
51929190c7266fa1884669d07072d977504686c6
SHA256:
8200776275EF8F63858D6A98D1A5E937FBEE2395307B9A3E2FA235CFCDAA7D2D
File Size:
202.59 KB, 202592 bytes
|
|
MD5:
6d422f15a57fe38582564ce1d3fd1ff9
SHA1:
414306aa77b5594d6c6364869136e98df3f11bd6
SHA256:
6196014258E09D9F453D42963A9745920DE51202BA3276770066CB824517CB85
File Size:
1.08 MB, 1080184 bytes
|
|
MD5:
730275e7d8e10ec6eeddddb7c291874a
SHA1:
1cd4b56fe92b78ebc895d646b8ac95205aece75f
SHA256:
8715AFF8BFEB7622D3C2B9E50B2FFA3281F523527E24236212E84A26EFE1DE6E
File Size:
269.43 KB, 269432 bytes
|
|
MD5:
31ac648e8c4462fd9b79e6388a7abba8
SHA1:
ecedae62e739a8b6cea1ff398ff47895d625420a
SHA256:
C831B855BA9EA6550550A4BCCDF7FEDF696C94B859FC8DFA40B8D6BD4395D5A4
File Size:
153.50 KB, 153496 bytes
|
|
MD5:
46231d4781735515e152b600bb6fc69b
SHA1:
5b29f63133b39f7cb88c593835a83f9964f859de
SHA256:
ABB457A96C518DA64A4B86858D1D44DCA17660973D4C5E84C43962D05953602D
File Size:
609.52 KB, 609524 bytes
|
|
MD5:
b5cf3d002dbcdbd11aed2c5001b11304
SHA1:
7d56162d5aa8d9739391e3c0f88bf1e97d13f258
SHA256:
DBA57457661CCC732595364F50A50C3E43C9379B4A1C32BDEBBE7A4175623F31
File Size:
2.89 MB, 2887064 bytes
|
|
MD5:
577234bda8f9ad99a37d1c7b264ee075
SHA1:
a4bb80bac04a11d62283dc501b3a615460d32ca8
SHA256:
16BCF1765198EDCADE0DC710C1C7D1B81489E89829F8EDBF055DCDD35F9DC785
File Size:
3.96 MB, 3958935 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is .NET application
- File is 32-bit executable
Show More
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 1.9.1.0 |
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| AVRORA, OOO | AAA Certificate Services | Root Not Trusted |
| OOO Kod 7 | COMODO RSA Code Signing CA | Self Signed |
| PROTOTAIPS, OOO | COMODO RSA Code Signing CA | Self Signed |
| Global Microtrading PTE. LTD | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Self Signed |
| ROSTPAY LTD | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Hash Mismatch |
Show More
| Global Microtrading PTE. LTD | DigiCert Trusted Root G4 | Root Not Trusted |
| Destiny Media | VeriSign Class 3 Public Primary Certification Authority - G5 | Root Not Trusted |
| GLOBAL MICROTRADING PTE. LTD. | thawte SHA256 Code Signing CA | Hash Mismatch |
| Global Microtrading PTE. LTD | thawte SHA256 Code Signing CA | Hash Mismatch |
| ROSTPAY LTD | thawte SHA256 Code Signing CA | Self Signed |
File Traits
- .aspack
- ASPack v2.11d
- HighEntropy
- No Version Info
- packed
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 1,611 |
|---|---|
| Potentially Malicious Blocks: | 218 |
| Whitelisted Blocks: | 1,248 |
| Unknown Blocks: | 145 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- AdGazelle.A
- Agent.AN
- Agent.IUH
- Downloader.Agent.TJ
- Farfli.XB
Show More
- MediaGet.B
- Mobogenie
- Murphy.B
- NukeSped.XB
- Rozena.EA
- SearchSuite.C
- Trojan.Agent.Gen.PW
- Trojan.Downloader.Gen.BP
- Trojan.ShellcodeRunner.Gen.CL
- Vybab.A
- Zusy.CA
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\program files\common files\system\symsrv.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\elements_installer.log | Read Attributes,Synchronize,Append data |
| c:\users\user\appdata\local\temp\hd.vbs | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-32nea.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-32nea.tmp\botva2.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-32nea.tmp\nativeuid.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-5cuvp.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-5cuvp.tmp\_isetup\_shfoldr.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Show More
| c:\users\user\appdata\local\temp\is-bv69c.tmp\53cae181389bc9c57c97f4c4165bdad91853c07c_0001230784.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-ecqpl.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-fpqr9.tmp\743013cd4d745a9efbe1b516c97fa290df6ea5d7_0002452248.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-omt0c.tmp\303ea8f12651c382bc0f7e26ed551b88c41649e0_0002545936.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-rm8vl.tmp\e3a148220a4f901ca1329c8bbbbb1804c6a5b1f9_0003937016.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-vn2gj.tmp\_isetup\_setup64.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\is-vn2gj.tmp\botva2.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-vn2gj.tmp\callbackctrl.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-vn2gj.tmp\idp.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-vn2gj.tmp\vbheznjbr7e6e7sdspk_aw2\krqz | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\mediaget-uninstaller.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsc4fe2.tmp\findprocdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsc4fe2.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsc4fe2.tmp\reason.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsc4fe2.tmp\reason.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsc4fe2.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\zon629c.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\zon6339.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\zonainstall.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\roaming\zona\init.xml | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\elements browser::userid | e20da494-dade-4d90-be97-90a661206df2 | RegNtPreCreateKey |
| HKCU\software\elements browser::installer_id | 6ec318a7-8e6e-4957-a119-473ee425a869 | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Vewhxgpu\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Vewhxgpu\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Vewhxgpu\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKCU\software\media get llc\mediaget2\application::neu_ver | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKCU\software\media get llc\mediaget2-systemscope\mediaget_info::hasdownloadedupdate | false | RegNtPreCreateKey |
| HKCU\software\zona::exec | C:\Program Files (x86)\Zona\Zona.exe | RegNtPreCreateKey |
| HKCU\software\pinstall::i_user_id | AB7BB731-AE16-4E0C-9296-F8CF54E8492F | RegNtPreCreateKey |
| HKCU\software\zona::downloadsdir | C:\Users\user\Documents\Zona Downloads | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᜠ橓庪ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Shell Execute |
|
| User Data Access |
|
| Keyboard Access |
|
| Network Winhttp |
|
| Network Wininet |
|
| Encryption Used |
|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Anti Debug |
|
| Process Terminate |
|
| Other Suspicious |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Uneihyoq\AppData\Local\Temp\is-OMT0C.tmp\303ea8f12651c382bc0f7e26ed551b88c41649e0_0002545936.tmp" /SL5="$2026C,2096998,488960,c:\users\user\downloads\303ea8f12651c382bc0f7e26ed551b88c41649e0_0002545936"
|
"C:\Users\Vewhxgpu\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\Users\Waewglia\AppData\Local\Temp\is-BV69C.tmp\53cae181389bc9c57c97f4c4165bdad91853c07c_0001230784.tmp" /SL5="$300AE,971904,56832,c:\users\user\downloads\53cae181389bc9c57c97f4c4165bdad91853c07c_0001230784"
|
"C:\Users\Ysuizzzl\AppData\Local\Temp\is-FPQR9.tmp\743013cd4d745a9efbe1b516c97fa290df6ea5d7_0002452248.tmp" /SL5="$400FE,1592315,832512,c:\users\user\downloads\743013cd4d745a9efbe1b516c97fa290df6ea5d7_0002452248"
|
"C:\Users\Gvatgfhp\AppData\Local\Temp\is-RM8VL.tmp\e3a148220a4f901ca1329c8bbbbb1804c6a5b1f9_0003937016.tmp" /SL5="$90042,3145790,166400,c:\users\user\downloads\e3a148220a4f901ca1329c8bbbbb1804c6a5b1f9_0003937016"
|
Show More
(NULL) C:\Users\Rcwumpyt\AppData\Local\Temp\mediaget-uninstaller.exe --uninstall
|
cscript //NoLogo C:\Users\Dtcymojh\AppData\Local\Temp\hd.vbs
|