Trojan.Rugmi.FC
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Rugmi.FC |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
57966515a1bedc9e69497657bc10f2bd
SHA1:
46afe85f52dc613cbc6e9e8eef772c1f78cc99b6
SHA256:
654181BF7D84CECB2E8548B6B28F1D2ACBAD60096DD1E6D1BACAC40EDB837C34
File Size:
445.44 KB, 445440 bytes
|
|
MD5:
b469fcb7e8a9978ffce1432f3b415d24
SHA1:
c9f26b23a89eef4ccbf61ae395cf303fbe0a090f
SHA256:
CB19D23645FA72D65181A8D9EBC6EDBBF1F192E082EB878A1F61B6B6A680FA01
File Size:
5.30 MB, 5298296 bytes
|
|
MD5:
1157e0c52eeb2ab92897ef11e10e7d02
SHA1:
8d93ca509cd60172439be40e9d8021b9faf60719
SHA256:
08DD471F4A1DA0DFB4AF1CEE93AA749F5BF48B867380027BA809B516A9FB5773
File Size:
115.63 KB, 115632 bytes
|
|
MD5:
3460d28854030cd7d003c29b1eb3d8d5
SHA1:
102ce6638c43996b4662ec76a4df687dd391ad1c
SHA256:
8DA176CCA8951545FDD0FE0CF7ABFC4487D4F233BFFC4BF9939679F01C8E1436
File Size:
5.13 MB, 5127088 bytes
|
|
MD5:
db8aa316c27900e20ae2fab4144605d6
SHA1:
5807406ee5fe6faf837bcd8eb5298412daa42c4d
SHA256:
937A4DCD994A212E289257CB1B76CF56BE04DC804B8178036841C71635B857FD
File Size:
1.07 MB, 1065984 bytes
|
Show More
|
MD5:
5ce4d0b4fd72811e06e08c8db8eb47bc
SHA1:
e72302330984622218fe8b07e721d9306609329d
SHA256:
CB7D27E2CF32DB548BB0FA43C0BB238969D9439AA2C806C7BBBA63C7D9084DE7
File Size:
959.62 KB, 959624 bytes
|
|
MD5:
4c07c8442b7b2e30b2248894e107ac48
SHA1:
6f1efa57b1e66bab5af39efb4f3bd553f99315b6
SHA256:
B93EB8BC3EA0302BFC53729059F9443ABBB9E31C1C097D059ABB8CEFE80375B9
File Size:
369.92 KB, 369920 bytes
|
|
MD5:
bfa3320af4a44cf63fa62188c1cce3a8
SHA1:
dcc5001c0923515b8b366fa0513f1830e782cb32
SHA256:
E0F133530C0E24F5BBC8DD20E47514519166CC5704FB628D1601E464189F6F05
File Size:
2.50 MB, 2504192 bytes
|
|
MD5:
d5110b1f1c1d0cdf7353dee46034ad4b
SHA1:
938383a62f8b0a46a6c63c0ccfbe0609ef9b84de
SHA256:
FAB1DAA504B660141259A6DA3D3CE6F76336A35D00DAEE1C65F100F8EFE8186A
File Size:
1.13 MB, 1133288 bytes
|
|
MD5:
55aad07ebf40a72c544a3764f71a1799
SHA1:
a058ab4259e02379b809109252d9d161cf8ae5dc
SHA256:
4002003891528E450D0F4E345B6AF4C163CF117BA286C23422FD27E2D0C76A84
File Size:
369.92 KB, 369920 bytes
|
|
MD5:
a5a185684dd9f75ee267f65f62d34248
SHA1:
8a24eccca7c03f110f89181262f4217c4a4f3683
SHA256:
516E113F9146F23AE4A991E0DC35DCBBC71FF50F0EA45CAB4EEA9C7D05306E00
File Size:
1.07 MB, 1065984 bytes
|
|
MD5:
e7c5ffd3ccd061e00d69113fca04209a
SHA1:
6c5f81858ba1f1d69047031dcfcba948f3e7e5cd
SHA256:
BC6890A6DFE022B70F56E64D50828CD08C6B8A8708D6E67DDB44C4887622F006
File Size:
418.36 KB, 418360 bytes
|
|
MD5:
1ff3d2ba9ea433e0f601fa964cd24f25
SHA1:
c37921dbf4ebe6737c737b8d3314ec787cde73ff
SHA256:
5A6F2F8EB9AC9E2F88A68026BEA3E5BD764E145E47A54C82B76F706398704536
File Size:
186.37 KB, 186368 bytes
|
|
MD5:
436ae10dd04e3a1af6e4181da0017567
SHA1:
343300302c2a70d3e14c9ebd7077fdff62850105
SHA256:
604605343E727A909AF085E669534D34BA825CEE023706E1F03DC35549FB999A
File Size:
1.07 MB, 1065984 bytes
|
|
MD5:
36dd4d495f14e6b991f23d2f473860cf
SHA1:
7ad9ed7aed9a29f81402dd72c3642fb9fd8cafca
SHA256:
6153360F5766B556837839AC116A1525581B5662EBF52511B2B19A447148DD11
File Size:
1.13 MB, 1133288 bytes
|
|
MD5:
d89cd77fc96ba19849d12066920a9637
SHA1:
3e6a07c60a17ec2bc9cc8fed021b43350111706b
SHA256:
1EAF479A152DDA293F75EA90CBCF5B20076E12EF45B8C0C60E1B2E3D0AC58C00
File Size:
550.91 KB, 550912 bytes
|
|
MD5:
dd78cc9e65180a2ec95375a8695bef9b
SHA1:
ea1563c0f85048e1253ab43c7aacef2866673589
SHA256:
846E804FA78E02299134A9C083E46A422F5B5D18EF7AD08C6590B72BA68DE78C
File Size:
369.92 KB, 369920 bytes
|
|
MD5:
738d4409440f31a3376f3a2844274674
SHA1:
79ef0983d19298821c540116fe206b083a5ba7b4
SHA256:
2635BA9811912B1B1F1D512049941E7AC7CEEBF74D9A0CE2301E6A2990C8D36E
File Size:
247.31 KB, 247312 bytes
|
|
MD5:
ce417889326917fb6392d8ee01f4c5a3
SHA1:
305f95b5fad798bb6679c8cf0cd3f056c9cb353f
SHA256:
987E27C2ED6A0233709F2AC28CAAEE67C4631A2861D2C608213B017234A721D7
File Size:
2.14 MB, 2137072 bytes
|
|
MD5:
dbc5d283be6775ed12724385d1149011
SHA1:
f2a08becf31df20d8185b1eb231c98af9883cae9
SHA256:
5F0F75A77FDA81011DD5F9C35985FB0E4DA87FC08B1700318C4403071B95F6EC
File Size:
265.83 KB, 265832 bytes
|
|
MD5:
d08b08d8258bab78d2bdc82855114509
SHA1:
eaf31b2dce92dafec252af5775ab2de369d4ae86
SHA256:
B643C98761A114C1A9346387911E73696AEC65BAAFAF3E9E26F5FDAEE7440E18
File Size:
2.40 MB, 2400256 bytes
|
|
MD5:
f1da6352b0140d665453f59aa0a12dd2
SHA1:
78a0f5f843deec6a0ef6b29bd40eb965dbc1c7bb
SHA256:
86CB3911CC7D5044367980B1031ECB39A0CABC9525186DB0CFEC0E9D3C73947C
File Size:
421.92 KB, 421920 bytes
|
|
MD5:
33f7fc99c15bb34d3fbf6bda87b5db20
SHA1:
11ff10bc1b02403f5dddcb3ac253ff7673cdc8fd
SHA256:
3377D41AC09795CE7ACE1759BEC61BF2D06272B3B9BB571FC4408CE2D6F7BF22
File Size:
1.99 MB, 1994000 bytes
|
|
MD5:
a423c36fae5aa42df3d1ab48f1f1b19d
SHA1:
f004c3f8153bf0955c1a4d2e49064ed8827e523f
SHA256:
F78ADA81A32FB58509EA13BE8631C81A583DDA8D02D3B007CFC3D0896D732A8F
File Size:
4.46 MB, 4456520 bytes
|
|
MD5:
e1b7f2c4afcc24dc9617f0d70a80aad6
SHA1:
3d986db563c12c526b9042f57a2cc1fa36e92b11
SHA256:
F4C3E2E6B95475D7BE3C83688954048B4EE70A0F2145945D49530079C951E690
File Size:
4.42 MB, 4417024 bytes
|
|
MD5:
a37d4e90bbe84af8b28b6535d7bafa25
SHA1:
0e0ac986a6ba0ff1b5f78bcfd8907172df8e1911
SHA256:
E610B077E7C4652AC32AD4A18A764DA7A0DCD9AF2239CEBE54CEA7DBF3387925
File Size:
289.79 KB, 289792 bytes
|
|
MD5:
04f521fed1fde0505e928d685af8c4f1
SHA1:
ef2462aadd7265674ba39b7a2893cff37f007e54
SHA256:
19A467CB546C94C795E46CF424FA2F8151CDF76816A8A4BBD2D6A576509E2083
File Size:
130.05 KB, 130048 bytes
|
|
MD5:
2ca0b0cf5e154ca1d01c8154cfc9e48c
SHA1:
1028ba1858d34f8e5759b6912c35c39641601a22
SHA256:
C3DE7956BA8302DBA0E62DF5A2566C2C96A16E1E6DFEAC23ACB9D4D2FCDF6993
File Size:
1.14 MB, 1138120 bytes
|
|
MD5:
12d4fe4f3a1c90a2c444a4e9ae7669d1
SHA1:
29060b7bf81abb78c955ffc7cdef9c68b95bf89d
SHA256:
36337B181DCF8A9C68E3D3104DF38EA34893C86280380B4BE3B12349E214D67E
File Size:
1.07 MB, 1065984 bytes
|
|
MD5:
0598e382d598146d71a53d1527e102dc
SHA1:
7f85566fb348663cc3780db44ecd6f6ce5343fad
SHA256:
26D0324BB148CC5E3A86989FFBAAEB4ECE33A9EC44A24D7820607E3A8DFBA498
File Size:
177.66 KB, 177664 bytes
|
|
MD5:
32282fa58cf3816ec6c7e0307d956a92
SHA1:
904c4fba7bb417c468e47c15f42254b395629e73
SHA256:
A6CDEEA2134ED57D1C6652EF7728A1190F0216355D674A501F5685F00A9F2BB0
File Size:
246.78 KB, 246784 bytes
|
|
MD5:
bb3b148079e639cb6994eabc71b4ed5f
SHA1:
6ff507a9179f33a6313b05338981115eba178381
SHA256:
01556B3864A55123E310F13CD4E83FED29B93E49850A61B137D7410C7160FB77
File Size:
647.68 KB, 647680 bytes
|
|
MD5:
379c1a2e4c8b26abe7ba16ac29dcd356
SHA1:
23431e665cf3c099187ac874dc3acdf0bbd1389b
SHA256:
B118B2FF70579BDE2C414BBEE95248CE4F69E293202D584CC3396E4030F11D39
File Size:
177.66 KB, 177664 bytes
|
|
MD5:
2735473786d6fc955186953d2543abd5
SHA1:
9b5dd677eea7f2bd6eda28d895c79743a6bb1a9d
SHA256:
4F278638B915D20B7337B6D390C8D6E2B8C4A602D8152EA43E79DB82C1C1C697
File Size:
177.66 KB, 177664 bytes
|
|
MD5:
9721c4046de8ddae6c416e8d67f49c7b
SHA1:
074e6d1bc582ea66230f23c65ef452cd181d3263
SHA256:
577FF170D231A0B81B0D563586E057699FE8152CBBFFFE7B4A503760A12846EE
File Size:
177.66 KB, 177664 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have resources
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | Author: XZH |
| Company Name |
|
| Company Short Name | Microsoft |
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Last Change | 70d3bcefea71de913f3be6ae4409066cb83e1911 |
| Legal Copyright |
Show More
|
| Legal Trademarks | Smart Game Booster |
| License | https://curl.se/docs/copyright.html |
| Official Build | 1 |
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Short Name | Microsoft Edge Embedded Browser WebView Loader |
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Planestate Software AB | COMODO RSA Code Signing CA | Hash Mismatch |
| ORANGE VIEW LIMITED | DigiCert High Assurance EV Root CA | Hash Mismatch |
| ORANGE VIEW LIMITED | DigiCert High Assurance EV Root CA | Hash Mismatch |
| Plex, Inc. | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Hash Mismatch |
| Steinberg Media Technologies GmbH | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Hash Mismatch |
Show More
| Tenorshare Co., Ltd. | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 | Hash Mismatch |
| Tenorshare Co., Ltd. | DigiCert Trusted Root G4 | Hash Mismatch |
| Microsoft Corporation | Microsoft Code Signing PCA | Hash Mismatch |
| Microsoft Corporation | Microsoft Code Signing PCA 2010 | Hash Mismatch |
| Microsoft Corporation | Microsoft Code Signing PCA 2011 | Hash Mismatch |
| AOMEI International Network Limited | Sectigo Public Code Signing Root R46 | Hash Mismatch |
| Softouch Development, Inc. | Sectigo Public Code Signing Root R46 | Hash Mismatch |
| Ventis Media, Inc. | Sectigo Public Code Signing Root R46 | Hash Mismatch |
| The Qt Company Oy | thawte SHA256 Code Signing CA | Hash Mismatch |
File Traits
- 2+ executable sections
- dll
- HighEntropy
- ntdll
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 804 |
|---|---|
| Potentially Malicious Blocks: | 58 |
| Whitelisted Blocks: | 737 |
| Unknown Blocks: | 9 |
Visual Map
0
0
0
0
0
?
?
x
x
?
?
0
?
?
?
?
0
0
0
?
1
0
0
1
x
x
0
0
0
0
x
x
x
x
x
0
x
0
x
x
0
x
0
0
0
0
0
x
x
x
x
x
x
x
x
x
x
0
0
0
0
0
x
x
0
0
0
0
x
0
0
0
x
0
0
0
0
x
0
0
0
0
x
0
x
x
0
x
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
x
0
x
x
x
0
x
x
0
x
x
x
x
x
x
0
x
x
x
0
x
x
x
x
0
0
0
0
x
0
0
x
0
x
x
x
0
x
x
0
2
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
2
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
1
1
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
2
0
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
2
0
1
0
1
1
2
0
0
1
0
0
0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.FRFD
- Agent.KGD
- Downloader.GS
- Emotet.GX
- Farfli.NB
Show More
- Guildma.B
- Injector.FZ
- Injector.HGA
- Kryptik.ZK
- Loader.DE
- Lotok.F
- OpenSUpdater.TD
- Rugmi.FC
- Rugmi.FG
- Rugmi.GI
- Rugmi.GL
- Rugmi.JD
- Rugmi.KB
- Rugmi.OH
- Rugmi.PC
- Rugmi.PG
- Rugmi.TB
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\46afe85f52dc613cbc6e9e8eef772c1f78cc99b6_0000445440.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\c9f26b23a89eef4ccbf61ae395cf303fbe0a090f_0005298296.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\8d93ca509cd60172439be40e9d8021b9faf60719_0000115632.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\102ce6638c43996b4662ec76a4df687dd391ad1c_0005127088.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5807406ee5fe6faf837bcd8eb5298412daa42c4d_0001065984.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\e72302330984622218fe8b07e721d9306609329d_0000959624.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6f1efa57b1e66bab5af39efb4f3bd553f99315b6_0000369920.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\dcc5001c0923515b8b366fa0513f1830e782cb32_0002504192.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\938383a62f8b0a46a6c63c0ccfbe0609ef9b84de_0001133288.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a058ab4259e02379b809109252d9d161cf8ae5dc_0000369920.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\8a24eccca7c03f110f89181262f4217c4a4f3683_0001065984.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6c5f81858ba1f1d69047031dcfcba948f3e7e5cd_0000418360.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\c37921dbf4ebe6737c737b8d3314ec787cde73ff_0000186368.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\343300302c2a70d3e14c9ebd7077fdff62850105_0001065984.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7ad9ed7aed9a29f81402dd72c3642fb9fd8cafca_0001133288.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\3e6a07c60a17ec2bc9cc8fed021b43350111706b_0000550912.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ea1563c0f85048e1253ab43c7aacef2866673589_0000369920.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\79ef0983d19298821c540116fe206b083a5ba7b4_0000247312.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\305f95b5fad798bb6679c8cf0cd3f056c9cb353f_0002137072.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f2a08becf31df20d8185b1eb231c98af9883cae9_0000265832.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\eaf31b2dce92dafec252af5775ab2de369d4ae86_0002400256.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\78a0f5f843deec6a0ef6b29bd40eb965dbc1c7bb_0000421920.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\11ff10bc1b02403f5dddcb3ac253ff7673cdc8fd_0001994000.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f004c3f8153bf0955c1a4d2e49064ed8827e523f_0004456520.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\3d986db563c12c526b9042f57a2cc1fa36e92b11_0004417024.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\0e0ac986a6ba0ff1b5f78bcfd8907172df8e1911_0000289792.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ef2462aadd7265674ba39b7a2893cff37f007e54_0000130048.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\1028ba1858d34f8e5759b6912c35c39641601a22_0001138120.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\29060b7bf81abb78c955ffc7cdef9c68b95bf89d_0001065984.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7f85566fb348663cc3780db44ecd6f6ce5343fad_0000177664.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\904c4fba7bb417c468e47c15f42254b395629e73_0000246784.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6ff507a9179f33a6313b05338981115eba178381_0000647680.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\23431e665cf3c099187ac874dc3acdf0bbd1389b_0000177664.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\9b5dd677eea7f2bd6eda28d895c79743a6bb1a9d_0000177664.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\074e6d1bc582ea66230f23c65ef452cd181d3263_0000177664.,LiQMAxHB
|