Banco de Dados de Ameaças Troianos Trojan.Dropper.Agent

Trojan.Dropper.Agent

Por CagedTech em Troianos
Traduzir Para:

Cartão de pontuação de ameaças

Nível da Ameaça: 90 % (Alto)
Computadores infectados: 5,132
Visto pela Primeira Vez: December 1, 2009
Visto pela Última Vez: January 23, 2026
SO (s) Afetados: Windows

O que é um Trojan-Dropper?

Um Trojan dropper é um software nocivo usado para instalar malware, como Trojans, em um computador. Normalmente, ele é disfarçado como um software legítimo ou um anexo de e-mail e, uma vez aberto, baixa e instala a carga ameaçadora no sistema sem o conhecimento do usuário. O objetivo de um Trojan dropper é permitir que os invasores acessem o computador da vítima e o usem para seus próprios propósitos imprudentes.

As Ações Prejudiciais que o Trojan.Dropper.Agent  pode Executar Quando Dentro de um Computador

Uma vez dentro do computador, o Trojan.Dropper.Agent pode executar inúmeras de ações prejudiciais, como:

1. Baixar e instalar malware adicional no sistema sem o conhecimento ou consentimento do usuário.

2. Coletar informações sigilosas do sistema, como senhas e dados financeiros.

3. Modificar as configurações do sistema para permitir que um invasor acesse remotamente o computador.

4. Desativar o software de segurança ou outros programas que possam detectar sua presença no sistema.

5. Criar backdoors no sistema que permitem que invasores obtenham acesso a qualquer momento sem serem detectados por software antimalware ou outras medidas de segurança.

Como Eu posso ser Infectado pelo Trojan.Dropper.Agent

O Trojan.Dropper.Agent pode se espalhar através de e-mails corrompidos, sites e downloads de software. Para se proteger de ser infectado por este malware, é crucial seguir os seguintes passos:

1. Evite clicar em links suspeitos ou anexos de e-mail, mesmo que você conheça sua origem.

2. Baixe apenas software de fontes confiáveis; sempre verifique os arquivos baixados com software anti-malware antes de abri-los.

3. Mantenha seu sistema operacional e outros softwares atualizados com os últimos patches e atualizações de segurança.

4. Instale um programa antimalware confiável em seu computador e mantenha-o atualizado com as últimas definições de vírus.

5. Desconfie de quaisquer janelas pop-up ou mensagens que apareçam em sua tela enquanto navega na Web, pois podem ser tentativas de instalar software ameaçador em seu sistema sem seu conhecimento ou consentimento.

O Trojan.Dropper.Agent é Difícil de Remover?

O Trojan.Dropper.Agent pode ser difícil de remover, a menos que você tenha as ferramentas certas e o know-how. O primeiro passo para remover esse malware é usar um programa anti-malware confiável para escanear seu sistema em busca de arquivos ou programas ameaçadores. Se algum for encontrado, eles devem ser colocados em quarentena ou excluídos imediatamente. Você também deve certificar-se de que todos os seus aplicativos estejam atualizados com os patches e atualizações de segurança mais recentes, pois isso pode ajudar a evitar a ocorrência de futuras infecções. Por fim, é fundamental praticar hábitos de navegação seguros, evitando links e sites suspeitos e baixando apenas software de fontes confiáveis.

Outros Nomes

15 fornecedores de segurança sinalizaram este arquivo como malicioso.

Antivirus Vendor Detecção
Panda Trj/OCJ.A
AVG Generic29.CHMH
Fortinet W32/SPNR.0CJI12!tr
AhnLab-V3 Trojan/Win32.OnlineGameHack
McAfee-GW-Edition Generic.dx!bg3z
AntiVir TR/Agent.foh
ClamAV Win.Trojan.Agent-56605
McAfee Generic.dx!C4EC84ABE20C
AVG Downloader.Banload.BOVA
Fortinet W32/Banload.BOHQ!tr.dldr
AhnLab-V3 Win-Trojan/Downloader.807424.B
BitDefender Trojan.Generic.KDV.369858
McAfee Generic Downloader.x!gc3
CAT-QuickHeal TrojanDownloader.Banload.bohq
AVG Generic4.LYJ

Detalhes Sobre os Arquivos do Sistema

Trojan.Dropper.Agent pode criar o(s) seguinte(s) arquivo(s):
# Nome do arquivo MD5 Detecções
1. 1295978.txt c4ec84abe20cf919843fc536312f3704 68
2. zljlvtoxhmvM.exe 3d3fa33a21152778e7beeb970c1fd659 29
3. chrome.exe c29b21a176cab7466ffbe675c0925e8c 19
4. CertPolEng.exe 09050857004e30fc1235827a82aa849c 10
5. w32ssl.exe 45db9e587c1f9669b73966416f068934 9
6. urghr.exe 5d5c12035c7c57901eac52213def9699 9
7. uchwcrmxwvqotpocurb.exe 4ccde9b3f3b494e6788002bb4405427b 8
8. netbt.sys de92dcb84adca3e205c3b2a9aeab72f3 5
9. 8E5.exe f99d3252c80e75dff7e9794df74ec094 5
10. CSHelper.exe e2d3175c2aa981d09fd52c231db38215 5
11. HPIEAddOn.dll e35bbcc732c34897917729c182915972 4
12. jingling.exe b63961d271e74d1ee40e127245592ed9 4
13. msnmrg.exe 5de618b0b1454200b6f102ee8906efca 3
14. 12.exe 285b32487b220e1897be111360024078 3
15. MediaSPace.exe 79b64e714a227e5d255b85f71877b9d7 3
16. Word.exe b817ae9e2f4a4a0fb3fd417fe73ea971 3
17. C48EA.exe 5eb1d08fef7edf169d0953049be5e487 2
18. 3B5.exe 2e3bd2857c90c49f93a8771a443ddff0 2
19. msadrh10.exe bcadb8f4552dc2e95ddca4d410cf9c3b 2
20. lsasrv.exe 0c7d566666a93993ae0023e90e21e394 2
21. utilhlps.exe 1f3f77ae8e563bc17e394a3cdfaa193c 2
22. 7F97BB.exe fa80e60bf87e5db7d37160c034f8b92c 2
23. svchost.exe c9401b099584715c646a20d344acd191 1
24. rsmhsvcs32.exe ef2c56e9457cfb8b414fc4a936cb96d6 1
25. Diner Dash - Seasonal Snack Pack.exe 29712c2c2ca4842610fb3e7542a7045a 1
26. 97DB.exe f3c2510fb0c7e5b18a8dd1889ac27036 1
27. 3CB1.exe 92dab2a2176c898f9a6d93a561a3aff3 1
28. fhx593hifrbi-10015.exe ef42ee1245ac6403dce3aa5916b09891 1
Arquivos Adicionais

Relatório de análise

Informação geral

Family Name: Trojan.Dropper.Agent
Signature status: No Signature

Known Samples

MD5: adf30824b850dfbeb10031ef8fdcfba3
SHA1: 4cc3f6223df7d3249c436b953c8672bcc9ddcd35
SHA256: 000EAAC3D27EF569A685BAB9F28266AD011DC1DE15A6AD97134397B7BF3269CD
Tamanho do Arquivo: 462.85 KB, 462848 bytes
MD5: 9f126bc279a2253188a6875d2673b629
SHA1: 88438355b025cf3eba386e0362ddc3c8218ac6aa
SHA256: 774C986CEDB724CEC66CB87DE11079AD620E3492442FEC79B5926D1D47B1DFE3
Tamanho do Arquivo: 7.91 MB, 7914496 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Nome Valor
Company Name O2-Media.Inc
File Description O2Jam NewLauncher
File Version 1.01
Internal Name O2Jam NewLauncher
Legal Copyright O2-Media.Inc All rights reserved.
Legal Trademarks O2Jam
Original Filename O2Jam.EXE
Private Build GonaH
Product Name O2Jam Launcher
Product Version 1.01

File Traits

  • golang
  • No Version Info
  • x64
  • x86

Block Information

Total Blocks: 15,108
Potentially Malicious Blocks: 8
Whitelisted Blocks: 14,751
Unknown Blocks: 349

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.MPG
  • BruteForce.O
  • BruteForce.P
  • ShellcodeRunner.TVA
  • Spyloader.NG
Show More
  • Trojan.Downloader.Gen.RD

Files Modified

File Attributes
c:\programdata\kalinkacrypt\encryptor_crash.log Generic Write,Read Attributes

Registry Modifications

Key::Value Dados API Name
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAddAtomEx
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtAlpcSetInformation
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
Show More
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReadVirtualMemory
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimerEx
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
Network Winsock2
  • WSAStartup
Process Shell Execute
  • CreateProcess
  • ShellExecute
  • WriteConsole
Process Manipulation Evasion
  • NtUnmapViewOfSection
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Terminate
  • TerminateProcess

Shell Command Execution

C:\WINDOWS\system32\net.exe net session
runas c:\users\user\downloads\88438355b025cf3eba386e0362ddc3c8218ac6aa_0007914496
C:\WINDOWS\system32\runas.exe runas /user:Administrator "\"c:\users\user\downloads\88438355b025cf3eba386e0362ddc3c8218ac6aa_0007914496\" "
WriteConsole: Attempting to st
WriteConsole: RUNAS ERROR: Una

Tendendo

Mais visto

Carregando...