Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1017ffd90d20...e1.dll
windows7-x64
11caf510598...e1.exe
windows7-x64
101d88c47417...67.exe
windows7-x64
11ecb597741...af.exe
windows7-x64
2a5fe7d49f...b5.exe
windows7-x64
12c1aa4fa14...dc.exe
windows7-x64
834d62f47e1...6e.exe
windows7-x64
338f1b8c868...05.exe
windows7-x64
1040d8e3dae5...04.exe
windows7-x64
10410ee08c8a...59.exe
windows7-x64
6423b7b37b1...42.exe
windows7-x64
14315b6e87c...0b.exe
windows7-x64
7453c6fe9e1...91.exe
windows7-x64
14a841216cb...37.exe
windows7-x64
14e180437ef...a9.exe
windows7-x64
14fb989bc0f...00.exe
windows7-x64
1055bdc39b0b...70.exe
windows7-x64
105a1b6ba55f...c3.exe
windows7-x64
15f056a4a7a...4c.exe
windows7-x64
76709db0a92...53.exe
windows7-x64
969add888bc...df.exe
windows7-x64
76af766a07c...20.exe
windows7-x64
10719a339594...44.exe
windows7-x64
771a20e2700...db.exe
windows7-x64
17acc03a357...fd.exe
windows7-x64
77bd3e8a108...5f.exe
windows7-x64
18034ef305b...74.exe
windows7-x64
188be20529e...cb.exe
windows7-x64
8e6c6b616e...19.exe
windows7-x64
7907c21dd04...b0.exe
windows7-x64
79b1d7a498b...21.exe
windows7-x64
79b7e5d2fdc...8b.exe
windows7-x64
7Analysis
-
max time kernel
94s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/09/2023, 14:12
Behavioral task
behavioral1
Sample
17ffd90d20cbd49c4e0d65a484eeae65a107d5bad9582afc51c4ead8bbc147e1.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1caf5105988781e29d93e58abcbf3bf4c973eca1a207803629bd5cf901ef5be1.exe
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
1d88c47417c082378c735c9e8180ea63627d5efff35852f1bb06fe6705581267.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
1ecb59774182d0d0a04b418249428b621159838bd2bcdc1a3a7b871a65dd90af.exe
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
2a5fe7d49fcf65525cfbefaca92a12a0d2917d15f348a48fc7a4de7ae50776b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
2c1aa4fa14d7055f2239dbb29ab15089cb2752e9f94ec7a360d275dd607314dc.exe
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
34d62f47e1fe45dd6309326ef696012f2473b0157e1278eea3826a95829da36e.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
410ee08c8a84fbb947d5f4635c95c6c8d244a51855afd4f6aa0e82dba1c38a59.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
423b7b37b1925762c4417d81bd0f434f9760c1ed844b4b47ee7f25c8d0740242.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
453c6fe9e176af08b176430630a4eec6f1de09f7f147248dc905dc9823af1b91.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
4a841216cbbd4a587cc579434a043c17f54e3eb0e7ff615b3985411587dfa837.exe
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
4fb989bc0ffe2ad50811ff1784f8bf4e1c1aaaee0001e0c8aeb2f8f83b065a00.exe
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
55bdc39b0b7686a57916d2fee2c0f9559e5b947d115bfcb6b5b255706a412670.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
5a1b6ba55fde56e57509d2efea734d91e38a64cadaf9cda4aa31a85a592763c3.exe
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
6709db0a92e59e6662708358c0197d6b72b86ff9edb798aca32e34cad1623e53.exe
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
69add888bcdeed2c14f525f23fa52a141f1afbd420b0fdd38202e5031b3635df.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
6af766a07ccc641da303ab30936ed32ad32bb4d7c983f3df45c4c52c036e9d20.exe
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
719a339594bae94aad390edd6afd0f784af416eb53b6bc64de024a55567d4244.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
7bd3e8a10838e95fcb3ab06457404f03e09bd8d3881c2521be3b71fad533445f.exe
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
8034ef305be188bce8cdd98336f7cd2795c5dc74b19fdebf7cf5161f9000fb74.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
88be20529ed15c95b7c9dc1ae66949fb09ebc934188de565a43e6fecf6bf63cb.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
8e6c6b616e846b280572edd2beb96b4c22426963b565553609b4e2fc4b19b019.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
9b1d7a498b1050d27f515245add3690ee79d41f64fa9a95242525c964fdd9221.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
9b7e5d2fdc7192256d81ce9e4d339dcdbfd453ad1059d3efd4a7d829f5d2608b.exe
Resource
win7-20230831-en
General
-
Target
907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe
-
Size
2.3MB
-
MD5
026c5d37e261bf90f56293046ec26af8
-
SHA1
38f6b87904c9192bd3f4073815c4db3c12dba7b0
-
SHA256
907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0
-
SHA512
53a3e02eae2068b16bbd50add46981237842c5428752695db91a7ecf9e93146bccd1b609b0d96e19e20eca030eef94ac8832ae2b15668e59d5f254439b5b3c77
-
SSDEEP
49152:Q8atUUeTExFEUWf7UrhjUI/IeFHR8c7iSAgx4nNBzG5KeIKvOnr:SUEhiUhUIwSx8c7iSAakzcKepg
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1060 wrar390fr.exe 2220 as.exe 2712 as.exe 1772 as.exe 2776 as.exe 2628 uninstall.exe 2520 as.exe 2532 as.exe 932 as.exe 928 as.exe 1988 as.exe 2140 as.exe 1492 as.exe 756 as.exe 1700 as.exe 2628 uninstall.exe 1720 as.exe 2532 as.exe 1972 as.exe 2500 as.exe 2928 as.exe 1500 as.exe 2684 as.exe 2552 as.exe 2172 as.exe 1676 as.exe 3060 as.exe 1464 as.exe 1764 as.exe 824 as.exe 604 as.exe 2912 as.exe 2280 as.exe 1008 as.exe 2296 as.exe 2888 as.exe 2572 as.exe 2068 as.exe 1128 as.exe 2932 as.exe 912 as.exe 1960 as.exe 2760 as.exe 2744 as.exe 2596 as.exe 2616 as.exe 2520 as.exe 2900 as.exe 2532 as.exe 1512 as.exe 1756 as.exe 916 as.exe 840 as.exe 1136 as.exe 1520 as.exe 812 as.exe 748 as.exe 1100 as.exe 1804 as.exe 1768 as.exe 1052 as.exe 2264 as.exe 1684 as.exe 1556 as.exe -
Loads dropped DLL 4 IoCs
pid Process 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 1060 wrar390fr.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Find.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\SFXLogo.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\SFXLogo.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Benchmark.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Exit.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Formats\cab.fmt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\DiskOn.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\File.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Descript.ion wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Comment.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\RAR.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\UNACEV2.DLL wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\WizardLogo.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Info.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\DragNo.cur wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Rar.txt wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\RarExtLoader.exe wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\WizardLogo.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\RAR.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\SFX1.ico wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Extract.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\SortUp.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\SortUp.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Formats\lzh.fmt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\PasswordOff.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\PasswordOn.ico wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Protect.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\RARSmall.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\FolderUp.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\UnrarSrc.txt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\WinRAR_theme_description.txt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Repair.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\bz2.fmt wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\gz.fmt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\CP 17.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Extract.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Repair.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Delete.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\View.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\View.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats\cab.fmt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\winrar_theme_description.txt wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Uninstall.exe wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Lock.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\SFX.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Exit.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Test.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Formats\tar.fmt wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\UnRAR.exe wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Comment.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Protect.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\Report.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\WhatsNew.txt wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Info.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\RARSmall.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Setup.ico wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\ExtractTo.bmp wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\Repair.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\Toolbar\SFX.bmp wrar390fr.exe File created C:\Program Files (x86)\WinRAR\Themes\WinRAR_VistaV7_48x48.theme\DragCopy.cur wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\License.txt wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Formats wrar390fr.exe File opened for modification C:\Program Files (x86)\WinRAR\Themes\Vista_Ultimate_48x48.theme\Toolbar\SFX.bmp wrar390fr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main wrar390fr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2220 as.exe Token: 33 2220 as.exe Token: SeIncBasePriorityPrivilege 2220 as.exe Token: SeDebugPrivilege 2712 as.exe Token: 33 2712 as.exe Token: SeIncBasePriorityPrivilege 2712 as.exe Token: SeDebugPrivilege 1772 as.exe Token: 33 1772 as.exe Token: SeIncBasePriorityPrivilege 1772 as.exe Token: SeDebugPrivilege 2776 as.exe Token: 33 2776 as.exe Token: SeIncBasePriorityPrivilege 2776 as.exe Token: SeDebugPrivilege 2628 uninstall.exe Token: 33 2628 uninstall.exe Token: SeIncBasePriorityPrivilege 2628 uninstall.exe Token: SeDebugPrivilege 2520 as.exe Token: 33 2520 as.exe Token: SeIncBasePriorityPrivilege 2520 as.exe Token: SeDebugPrivilege 2532 as.exe Token: 33 2532 as.exe Token: SeIncBasePriorityPrivilege 2532 as.exe Token: SeDebugPrivilege 932 as.exe Token: 33 932 as.exe Token: SeIncBasePriorityPrivilege 932 as.exe Token: SeDebugPrivilege 928 as.exe Token: 33 928 as.exe Token: SeIncBasePriorityPrivilege 928 as.exe Token: SeDebugPrivilege 1988 as.exe Token: 33 1988 as.exe Token: SeIncBasePriorityPrivilege 1988 as.exe Token: SeDebugPrivilege 2140 as.exe Token: 33 2140 as.exe Token: SeIncBasePriorityPrivilege 2140 as.exe Token: SeDebugPrivilege 1492 as.exe Token: 33 1492 as.exe Token: SeIncBasePriorityPrivilege 1492 as.exe Token: SeDebugPrivilege 756 as.exe Token: 33 756 as.exe Token: SeIncBasePriorityPrivilege 756 as.exe Token: SeDebugPrivilege 1700 as.exe Token: 33 1700 as.exe Token: SeIncBasePriorityPrivilege 1700 as.exe Token: SeDebugPrivilege 1720 as.exe Token: 33 1720 as.exe Token: SeIncBasePriorityPrivilege 1720 as.exe Token: SeDebugPrivilege 2532 as.exe Token: 33 2532 as.exe Token: SeIncBasePriorityPrivilege 2532 as.exe Token: SeDebugPrivilege 1972 as.exe Token: 33 1972 as.exe Token: SeIncBasePriorityPrivilege 1972 as.exe Token: SeDebugPrivilege 2500 as.exe Token: 33 2500 as.exe Token: SeIncBasePriorityPrivilege 2500 as.exe Token: SeDebugPrivilege 2928 as.exe Token: 33 2928 as.exe Token: SeIncBasePriorityPrivilege 2928 as.exe Token: SeDebugPrivilege 1500 as.exe Token: 33 1500 as.exe Token: SeIncBasePriorityPrivilege 1500 as.exe Token: SeDebugPrivilege 2684 as.exe Token: 33 2684 as.exe Token: SeIncBasePriorityPrivilege 2684 as.exe Token: SeDebugPrivilege 2552 as.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1060 wrar390fr.exe 1060 wrar390fr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 1060 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 29 PID 2376 wrote to memory of 2220 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 30 PID 2376 wrote to memory of 2220 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 30 PID 2376 wrote to memory of 2220 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 30 PID 2376 wrote to memory of 2220 2376 907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe 30 PID 2220 wrote to memory of 2712 2220 as.exe 32 PID 2220 wrote to memory of 2712 2220 as.exe 32 PID 2220 wrote to memory of 2712 2220 as.exe 32 PID 2712 wrote to memory of 1772 2712 as.exe 33 PID 2712 wrote to memory of 1772 2712 as.exe 33 PID 2712 wrote to memory of 1772 2712 as.exe 33 PID 1772 wrote to memory of 2776 1772 as.exe 34 PID 1772 wrote to memory of 2776 1772 as.exe 34 PID 1772 wrote to memory of 2776 1772 as.exe 34 PID 2776 wrote to memory of 2628 2776 as.exe 46 PID 2776 wrote to memory of 2628 2776 as.exe 46 PID 2776 wrote to memory of 2628 2776 as.exe 46 PID 2628 wrote to memory of 2520 2628 uninstall.exe 76 PID 2628 wrote to memory of 2520 2628 uninstall.exe 76 PID 2628 wrote to memory of 2520 2628 uninstall.exe 76 PID 2520 wrote to memory of 2532 2520 as.exe 78 PID 2520 wrote to memory of 2532 2520 as.exe 78 PID 2520 wrote to memory of 2532 2520 as.exe 78 PID 2532 wrote to memory of 932 2532 as.exe 38 PID 2532 wrote to memory of 932 2532 as.exe 38 PID 2532 wrote to memory of 932 2532 as.exe 38 PID 932 wrote to memory of 928 932 as.exe 39 PID 932 wrote to memory of 928 932 as.exe 39 PID 932 wrote to memory of 928 932 as.exe 39 PID 928 wrote to memory of 1988 928 as.exe 40 PID 928 wrote to memory of 1988 928 as.exe 40 PID 928 wrote to memory of 1988 928 as.exe 40 PID 1988 wrote to memory of 2140 1988 as.exe 41 PID 1988 wrote to memory of 2140 1988 as.exe 41 PID 1988 wrote to memory of 2140 1988 as.exe 41 PID 2140 wrote to memory of 1492 2140 as.exe 42 PID 2140 wrote to memory of 1492 2140 as.exe 42 PID 2140 wrote to memory of 1492 2140 as.exe 42 PID 1492 wrote to memory of 756 1492 as.exe 43 PID 1492 wrote to memory of 756 1492 as.exe 43 PID 1492 wrote to memory of 756 1492 as.exe 43 PID 756 wrote to memory of 1700 756 as.exe 44 PID 756 wrote to memory of 1700 756 as.exe 44 PID 756 wrote to memory of 1700 756 as.exe 44 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1060 wrote to memory of 2628 1060 wrar390fr.exe 46 PID 1700 wrote to memory of 1720 1700 as.exe 45 PID 1700 wrote to memory of 1720 1700 as.exe 45 PID 1700 wrote to memory of 1720 1700 as.exe 45 PID 1720 wrote to memory of 2532 1720 as.exe 78 PID 1720 wrote to memory of 2532 1720 as.exe 78 PID 1720 wrote to memory of 2532 1720 as.exe 78 PID 2532 wrote to memory of 1972 2532 as.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe"C:\Users\Admin\AppData\Local\Temp\907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\wrar390fr.exe"C:\Users\Admin\AppData\Local\Temp\wrar390fr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\WinRAR\uninstall.exe"C:\Program Files (x86)\WinRAR\uninstall.exe" /setup3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\as.exe"C:\Users\Admin\AppData\Local\Temp\as.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe6⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe7⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe8⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe17⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe24⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe25⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe26⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe27⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe28⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe29⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe30⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe31⤵
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe32⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe33⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe34⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe35⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe36⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe37⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe38⤵
- Executes dropped EXE
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe39⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe40⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe41⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe42⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe43⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe44⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe45⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe47⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe49⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe50⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe51⤵
- Executes dropped EXE
PID:916 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe52⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe53⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe54⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe55⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe56⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe57⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe58⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe59⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe60⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe61⤵
- Executes dropped EXE
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe62⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe63⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe64⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe65⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe66⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe67⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe68⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe69⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe70⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe71⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe72⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe73⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe74⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe75⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe76⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe77⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe78⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe79⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe80⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe81⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe82⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe83⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe84⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe85⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe86⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe87⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe88⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe89⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe90⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe91⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe92⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe93⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe94⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe95⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe96⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe97⤵
- Executes dropped EXE
PID:604 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe98⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe99⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe100⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe101⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe102⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe103⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe104⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe105⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe106⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe107⤵
- Executes dropped EXE
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe108⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe109⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe110⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe111⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe112⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe113⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe114⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe115⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe116⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe117⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe118⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe119⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe120⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe121⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\as.exeC:\Users\Admin\AppData\Local\Temp\as.exe122⤵PID:2552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-