Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 20:07

General

  • Target

    salikhack.exe

  • Size

    6.8MB

  • MD5

    92290d3c06e414319fb42fc0f7d981d0

  • SHA1

    6396501c4acd9e06a44f75f136528535e8003dce

  • SHA256

    3d10fcb6f54d01863d35000decd99bc4234266b668263035c55597e09c885f43

  • SHA512

    2d59d0121b48e442ba2d2af2639afe928664238ef51e819a634c7c71aebfbaf87f3e8a033285111046d2f50c9a286b611143aac5c227a000ec5d4be65e5bc294

  • SSDEEP

    196608:xclQtVzCfE9FQs1W/ojxuBxn86iiYY1BC:x5VOfE9FQUWQjxy8T5

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 2 IoCs
  • Poullight

    Poullight is an information stealer first seen in March 2020.

  • Poullight Stealer payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\salikhack.exe
    "C:\Users\Admin\AppData\Local\Temp\salikhack.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\build.exe
      "C:\Users\Admin\AppData\Local\Temp\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
    • C:\Users\Admin\AppData\Local\Temp\sakl.exe
      "C:\Users\Admin\AppData\Local\Temp\sakl.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://jq.qq.com/?_wv=1027&k=57Cts1S
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2628
      • C:\Users\Admin\AppData\Local\Temp\asx0.dll
        "C:\Users\Admin\AppData\Local\Temp\asx0.dll"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 276
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:14116

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    252B

    MD5

    acc38fbf8345103407966ced24a666df

    SHA1

    024ef9cf028288fbdc9be1276c65a6cc31a097f0

    SHA256

    64500fb2c12aacf62d48847671649eb5bbbd250c3ba9a90c09b49cc8bd02575b

    SHA512

    741a224fdefd3ff8fb5996c76513e5b6ee42f0a5d5eb6f2ad539c322e2941a80925efe9165d95d27bb61c24264809f5b3b3fd38c76a9233f69dc1a44f169ec7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    63b49e624eaeb5d890daa610f20b4cd1

    SHA1

    7d7abeb92f7f7dcedef3ec19e2ec6b242c76ecac

    SHA256

    21650db4d99f2a3692a490a7a8d96037405716f38cd3f44bb66265df62690b71

    SHA512

    db28abcfb3e6e17a58557593a0268e0d588ceeecd0816ccac6002e8f8f486ef77decd7fcb4449260b480372b996aa88f9e50561d8ff7f1a0de34e8d17e74f4ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2cf2a164d346d1400bd1f6a6612c59f5

    SHA1

    5a086a345ef628fcb0caa699be02c83621628006

    SHA256

    2a32a03259b212613cd1adcaf2eea3b37145a8da6c38e7e5b230ca3db6e4fda4

    SHA512

    2a47b72c3cc7b7d93da666eca2bbb7cbb7431b44830271cf84c9ae64a7cb47edad5a80e13914c7079d97146e426a0b62c1b049923529fa1df669f505a9e73d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3f7074f9f3db1ffa698a3f4e9d6b8e24

    SHA1

    434b712ee8054e251441a3b26d67fe905b7fb75e

    SHA256

    3d35f2b2203a5b204565ed991514e040557212796433fed44c1d7f2e3f0621f3

    SHA512

    11f059b031dd02af7220ce01792223efea006ab07045ecfbcbfb7a5b60850917ae1269940c63e5de058c458317e413848d7464583eb64250757c612f0fb5165b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bd5b5054476be0a0bbee4e83948ac741

    SHA1

    c9b207dc0afd06ef9fa945c0714f0d7fa51bed6e

    SHA256

    7b39840789a213872a4a5af404700cf33801539d6a4eea8441d5f6c132665037

    SHA512

    c1272190883aa45d4eddd1d9b172312d5061bb59dc95f9b90d2dd2aad4b7a48d2a94b9cc09c8af63529c3517a3cc7622bc37d9fae8f76169d95c72a94b67dffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    40068b6c2816579c483af6719e5a7518

    SHA1

    d0363aad9a51e7bc1f9b16aa6599d84064ef423f

    SHA256

    227f431ccb4ade709ffdf6efad7f391b49509dc8a2da9efc2a101f04d7fba586

    SHA512

    ab51fad2cac1f7469edaa4f9b2e72b2f01035724033b59544cc1f4d36262f22739064923e67110aaf0b4350e95b8a19323c952090f44047b9cfd543d29176e22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2df7f0fbf724caea52a600f8d4d7b9c4

    SHA1

    3f1eab5a4cf59bc58b95ee760cae47c235ec360f

    SHA256

    ff4064161516d19cf42389a58a003bb16d231df53877bf20ef364994647462bf

    SHA512

    6cb7510aab4d151d38429ad6b8d50d4de94c00d75ab7b7d1b8c2fe55f23d055a8c7a8139c734b475c020dc1da566e9c81bf4a1329504ddb4e9f244c3af970a60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f10b7390aabcf66bbf87c9cad4f0007d

    SHA1

    b5f1142cc92f8317a817207b64c85c64d38417b3

    SHA256

    c06731968d7458946acaf93432416325e20798fbe68a094b0dfddb5143e2c25d

    SHA512

    9e12c7577d61ce3f99efb520406890acd44ecadfe7571a0bdb3c7c1410543645f37dee8629ec23ca639e27edd5fa1cb92ce744a5ce341bada714a1e398daadf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    053bd410fa99ff65ec010815d65163c1

    SHA1

    ee5d6714433c1ed09e679437fc158155ed15a421

    SHA256

    4f42d5cdbce69797e5236a2fc18bded28d900d9581d10a54d1777aad2a9659a1

    SHA512

    b73794de7ee11a6a6719eaad96d5504df7986868bff4792af35e99af64497bc18164adb1d1724ef7079d7fcc95291f9835c2efeaaf7f0bfca1298860aef11aaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    51af3d05c247377ea25af51be73b4a40

    SHA1

    1dd44845162dbc555587d25efa28af9cdc02a39a

    SHA256

    ba3130b176c6e7dc38aeaae28676cae4dfcad879bef096d2067326ae1a051ddd

    SHA512

    f113b2d5f5a235849f96eb99a5ec5544bfa2364cc7e69b28b752ddc016e7145dcf4f448073e9010a886d3ba6052925afeacbce2d516a66fbbb4a2451ad76043e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    668b1c79b23c95eef31762f389db8914

    SHA1

    941ea9d28dc60fd671d719eda129ca05819c3616

    SHA256

    66159fe38d1e124060ff6d8bb54109c2c7f655e51f2e2a721e37184cd14b4ea8

    SHA512

    bbb42608e061e03de1da566dbe5ae90634a56cd1f845aaf2d5a2678e3f793c6e0e9385092540eda3ea83b661b6617b1e89c16ed0f9449599fd49b745626c897c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e1232cd5e085dd10286eee6a6b0e9caa

    SHA1

    9c63b24c0a3d560fc195903d561d0e932149d4db

    SHA256

    17c151219336c6fb360a40b89cd4cc8c34b104ca580409a0b789e5d478445bca

    SHA512

    b603ebd33071bcb1d18e3141355d627356e3b145d42864b3c182e2c630fc0897f5c012452968aeb94432c544055fc6e0db0d19b8cf4fbef2aa496434f74e7dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    17574fb2fbd18721b7251bd0fae07536

    SHA1

    df7b131e9e35dd4b39b5a7f46adee0842ad52cfd

    SHA256

    6d71a2c41b2d00dab69d3a3f06d04354e8f66619d384fe602f66d75afaecc082

    SHA512

    11419388295ca0d71c1643665cefe1e032b3cecbc75d000bd1eb46ba4ea37fe030a6c17f49ebe34b3ede227a55208bde1b934a6d6053be2f3a27a4b936d78c1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f2a8b87371f558c4834172f31475c3bc

    SHA1

    36863904e11cf70bcbc234a775b0828f72652a9c

    SHA256

    b6add13df63f64cafab816cc8d8c96a47cbc2e3847cb43a00b53185ca0a1bf36

    SHA512

    bf21027be28def1a4de8bd81c6113a6511b624c4532a150ed4ba3b733e70819a41092583f8682275434575efc859ba9d7bd3d172674bfd26724d2ea7ca178c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8389fd75bd86a84f22069e92e6af4a24

    SHA1

    e898739c94d53851ad8d6a5251a4536c803e11c4

    SHA256

    2bec9b5d8e24487aca07bc3848eb2f25557c73f106502c47fe09057fe1f7fef9

    SHA512

    fa9fd57850f1e55cdbf1db90619e1a86fcfd474115e30ce165d19d6f0c8decce4241d83da39b3565329a95099d91028d8a34cf9a6bfd1486d6aae8a5295286fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d7b96e0017be5c725a80eda396093985

    SHA1

    ccb5f04f68c6745e172cf2029e740a821e701853

    SHA256

    dae75b31668fecf26df3836ee510ac0d581fb90a8f47b60373cc1a7a0194251c

    SHA512

    1e620d5b74f8797da70e7501d209b365b3d2e5cc9ce0ac7118d8de471956ac0dd6059fe329eb8c02b8710f0963435b2cd2d48cb0e2123d2919c27cb8ea7f633c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4ea5730cd2f0f7aa7d07d90e2e9c2e8e

    SHA1

    afde5210c7a40db74893616bbffb8e6d82491bd6

    SHA256

    1ea130d1179d6e495e7d7b5a3ae5e212f4a91d6b7bc9687623bde2104257a622

    SHA512

    91450116c30e39e5e98a854078fe183059002dbbbdb4b265e1585fd85f7720c3ac7d33310c118c6e1fddd6da9d29e7fa18114c4553dd8cbdd89ff21acdf33411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d6e4fd144812878b259da6d3d2ff5efc

    SHA1

    819104cad99d786ac310aa7050031fc4ca4aa97c

    SHA256

    e6231d27e1d49bb8a77f5e9031e978ff413879aac434119a47ea3a0852086e28

    SHA512

    c24d10cb69d72703927f57d52bfc8e1edf855580b5137773e78a6434bcca121fe6c79956c53a8e81856d6bd42bd9dd743db7e69dc23cb00a2fc59dca128ca02e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5bc62eb6309886c9fc1df860351b4538

    SHA1

    f17d455c296a9c07c90ff47f02f8cbd07a69e49b

    SHA256

    bc77d5262deecdd8ca6f6f1037d6c2e2bee297453bcee87b16f980df228b0962

    SHA512

    a6d00fd87b37ab9aa57fac5e3b8f959ce7f4447828754164a9d8154e5e4d337f9fecbb650c67cf2aa87ce3f0237b2634b1e2cb3703b65e6db41f8d56979008dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8eee675426eff6ab2399a51e1d6dffed

    SHA1

    fc662664dea91c23d51ac39ef1705899618fe750

    SHA256

    3045426fcad0a3f1671da1528ecc39ff933a50b19d3adbce86720982c6432ac9

    SHA512

    864e4b8159c13f5860c8dc6dcef2a49266b694076f87b891f2a6c29bb436d0d02d185c47ce9a90970ae1ce44e73125d77eab1a40c0e0a6d9e6a843aba608a5f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    abb4a95dc32b0c570c6a61eac677c3fc

    SHA1

    1d89b95a11d0a62081eb85de3a01a902ac007ab8

    SHA256

    4440943ccb13df385ca342f1097b00b5a3c79f36561a3340c5e4338382459ba9

    SHA512

    f1e9ab80e34f9de8ae7113f7cbf003e09e340bd361318b339b530befa72946990a9622acb91f126ffdb13ad486bea9a664083ae0ffb98c5fc5569ee30a7aa460

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    7e854af11c6fa19072bab174aa7f78f1

    SHA1

    439bc197317500f9673656ce229e38730140f6a2

    SHA256

    ce08cf0b2dc4b592dfa1075b8fb5099fa1ef7eebad363b6b1739a281ce1cad1f

    SHA512

    94713db32add75c82b3f22db0c778c0ef6f2c3dd778b0459fe1fd75f01c87dab574f771f3172701ac75e7e4b34a8950ebd90439e689ed038ce88931da7dc33bf

  • C:\Users\Admin\AppData\Local\Temp\Cab4E5F.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar4E62.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar4F43.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\build.exe
    Filesize

    100KB

    MD5

    446afe801f9738ee2bfcb6791bdcf801

    SHA1

    fc43f35cd105e8954d77d8f7a48234e2576fe98e

    SHA256

    ba098b19bb32b3224c759d7853f4e0ebd5751f8cf5615bcdca3d52440fa07ccc

    SHA512

    f7748de18d35523aab05879944c1bfdda9a78c0b49e9b82c96b78f2e9dc8902848706857771c29cd769288d6ab98fb4b2398a92c240eca09e8dd27f297ebe92b

  • C:\Users\Admin\AppData\Local\Temp\li3ovlmlb74q0fh
    Filesize

    92KB

    MD5

    c38ea50a9d1b652272fdae5db82c9404

    SHA1

    d7444179c921d090b4e5d954997087bc0004e69f

    SHA256

    b5e3708f123a02f980e4e8397a055b98dceecdc754bbb67872e8bf3651541742

    SHA512

    b91d23e89ca310a4cc9bbfc9537880e1b0c09d0ebf28fa1514258110f3fe33493f24145430093c9d1eb6ddcac8ef25ed74eb0d0c2c8c0544c1cfe2dcf206e2f5

  • C:\Users\Admin\AppData\Local\Temp\sakl.exe
    Filesize

    6.7MB

    MD5

    06dcffb60e21650a7853af9a88b9a04e

    SHA1

    0021f7ae05f12f54ba5edfb2fb0c957f12fb5f4f

    SHA256

    f60632e252f6fae33c0f9b4cbff4a646d35d1504d1ed0c32cb03884bd900befe

    SHA512

    2b9e599c5e6fd498d7120e5c17cf70f79b7d15c27f820305ea0a17b1612a6aee72a07d7a85a8ec35c8a9f9eeedc3e829cea6d6d7c9dcb86f58aa76137a4a17c6

  • \Users\Admin\AppData\Local\Temp\asx0.dll
    Filesize

    5.9MB

    MD5

    8d7cfce5a4716b167952e569a04ad5dc

    SHA1

    def4fa116d274403626ba33edc2604137689842f

    SHA256

    87979231d7f6bc01754071903035f784ffcb0a246a926b1d0b1e10493241907e

    SHA512

    d27123dacedca9933b484fcb432a411bb66ae5073fc6b3e2e178a5f554b69d84cf069bdddf35b83921670506bc2c0764e60310c6ca64adc89dd68e9fa90be26e

  • memory/1784-619-0x00000000040F0000-0x000000000474D000-memory.dmp
    Filesize

    6.4MB

  • memory/1784-621-0x00000000040F0000-0x000000000474D000-memory.dmp
    Filesize

    6.4MB

  • memory/2324-19-0x0000000000BD0000-0x0000000000BF0000-memory.dmp
    Filesize

    128KB

  • memory/2872-17-0x0000000000400000-0x0000000000ADE000-memory.dmp
    Filesize

    6.9MB

  • memory/2920-1477-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1471-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1469-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1467-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1465-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1463-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1461-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1459-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1457-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1455-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1453-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1451-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1449-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1447-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1445-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1443-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1441-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1439-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1433-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1432-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1473-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1475-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1479-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1481-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1483-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1485-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1487-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1489-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1491-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1493-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1435-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-1437-0x00000000026E0000-0x00000000027F1000-memory.dmp
    Filesize

    1.1MB

  • memory/2920-622-0x0000000077270000-0x00000000772B7000-memory.dmp
    Filesize

    284KB

  • memory/2920-620-0x0000000000400000-0x0000000000A5D000-memory.dmp
    Filesize

    6.4MB