Analysis

  • max time kernel
    95s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-es
  • resource tags

    arch:x64arch:x86image:win10-20230915-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    28-09-2023 15:26

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    PID:596
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1700
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4348
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1912
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2380
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1772
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2732
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3612
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2360
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2756
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\XMouseButtonControl.log
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:4092
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\XMouseButtonControl.log
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:2768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

      Filesize

      364KB

      MD5

      80d5f32b3fc515402b9e1fe958dedf81

      SHA1

      a80ffd7907e0de2ee4e13c592b888fe00551b7e0

      SHA256

      0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

      SHA512

      1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

    • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

      Filesize

      1.7MB

      MD5

      bb632bc4c4414303c783a0153f6609f7

      SHA1

      eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

      SHA256

      7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

      SHA512

      15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

    • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

      Filesize

      1.7MB

      MD5

      bb632bc4c4414303c783a0153f6609f7

      SHA1

      eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

      SHA256

      7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

      SHA512

      15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

    • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

      Filesize

      1.0MB

      MD5

      d62a4279ebba19c9bf0037d4f7cbf0bc

      SHA1

      5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

      SHA256

      c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

      SHA512

      6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      14KB

      MD5

      17d1e51270b3e2dfe353befdc0d9a465

      SHA1

      6da4454a262197f7f3b0ab2a967811792d32f955

      SHA256

      ed36764f38f764821285b61fc02528e98064b7acd227b3a1dcc1c17477e650b0

      SHA512

      6ca339ad19b2024e941fe028f7dd40bf1d26fc0ae8f583a2d84f3d8a6b354841961e6bcedb96b92f03b4d984fe13143849dab9208c9383db14b3d146a4a8496c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PZQ0K35H\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\76XYRMLA\f[1].txt

      Filesize

      173KB

      MD5

      3b54a23a2f104f8f16675fb285b7cfd8

      SHA1

      ead0f95c4a3a5429a637a0ea24a511cb9c91cdd4

      SHA256

      895ac5e99b462dc3c9c3d5cadef32ef08f90d86d43a2b4af46688c393b0d31e9

      SHA512

      7ce31858e06c06e403ecd009cc25b1fab9799264d7a0d056010894e8ef50c2cd3af8370292b7d6c2d02b2f5aa15b447094ef3021245091a21fe76b1d08ef0f84

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\D7D5K13E\dvps.highrez.co[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\F6GIWKHQ\xmbc[1].ico

      Filesize

      3KB

      MD5

      1279bf31d9659ad2017369ec1b90473c

      SHA1

      0f21c5a8266c36af7909118899e1fa07590f2df8

      SHA256

      74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

      SHA512

      18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PVV5T1E0\suggestions[1].es-ES

      Filesize

      18KB

      MD5

      e2749896090665aeb9b29bce1a591a75

      SHA1

      59e05283e04c6c0252d2b75d5141ba62d73e9df9

      SHA256

      d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

      SHA512

      c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\InstallOptions.dll

      Filesize

      14KB

      MD5

      d753362649aecd60ff434adf171a4e7f

      SHA1

      3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

      SHA256

      8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

      SHA512

      41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\ShellExecAsUser.dll

      Filesize

      7KB

      MD5

      86a81b9ab7de83aa01024593a03d1872

      SHA1

      8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

      SHA256

      27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

      SHA512

      cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\ioSpecial.ini

      Filesize

      696B

      MD5

      3a226a7467adc12d6978c258deef5bf5

      SHA1

      908d3c565cb98197f64f0f383c8568eabb3b56f6

      SHA256

      ec54eb8ecdd9b7ccdf33542d51900e1db12fdd832ce4d58c205e5f252e8f6952

      SHA512

      148e1cdb47222cb8d40a70c9cdff53eb785baed804baf5668f5d4e81b118d85dcf33398b3a033aa2a59b716ba8371cd9644ed60ed2e4ef651c0cc28bd8a46058

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\ioSpecial.ini

      Filesize

      709B

      MD5

      2cdb84fef5c756996246b0620865af23

      SHA1

      994204c5d10ad4b6f516f979fda075109ff2af09

      SHA256

      a5fb7e572c453ddb62f87ca22ec8d2486418a3b7bd9dad4f9675ab8de6c7a4f3

      SHA512

      b04e25470f9ba4b39b465d5be546264ec9528e3ee6c9024e4215cb98454a2280b15c93aa0ddab20cce74d12e470b446d223181caf56a6104f2603113886f2c0c

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\ioSpecial.ini

      Filesize

      739B

      MD5

      c34b03d582a73445af3ec3d61b362329

      SHA1

      75d824c1f67d21c5fd0026fe170d40bb1e5eaa2d

      SHA256

      872cda24c3ade700b097af2fc70d476b670555c024d14ddeb0d8222ecb96d085

      SHA512

      f758c66d611f1b97f5430b310d78289eb1254834e87d87c8766bfb15c02dea7caa8a47d39aa93f38583e1860f530d76b30142743fc54feeb4d8d0d027b02fd28

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\ioSpecial.ini

      Filesize

      739B

      MD5

      c34b03d582a73445af3ec3d61b362329

      SHA1

      75d824c1f67d21c5fd0026fe170d40bb1e5eaa2d

      SHA256

      872cda24c3ade700b097af2fc70d476b670555c024d14ddeb0d8222ecb96d085

      SHA512

      f758c66d611f1b97f5430b310d78289eb1254834e87d87c8766bfb15c02dea7caa8a47d39aa93f38583e1860f530d76b30142743fc54feeb4d8d0d027b02fd28

    • C:\Users\Admin\AppData\Local\Temp\nsx9925.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      f832e4279c8ff9029b94027803e10e1b

      SHA1

      134ff09f9c70999da35e73f57b70522dc817e681

      SHA256

      4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

      SHA512

      bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

    • C:\Users\Admin\Downloads\XMouseButtonControl.log

      Filesize

      1KB

      MD5

      571dedc496fa45f72f21cedaa9c46dbb

      SHA1

      634057720bc6b79ce032765830f69e404d4945a8

      SHA256

      38c567eadcf617ecdde61ba200e41e6a243a26846babe60ef6c3110f9803023f

      SHA512

      24bcc1ce4d691049c2284f6835a444db361093b9ae116f0d0b5ffb94a2ec6f24158983a7a8384ef0cd6198bba47b53832ca8621935b13cc93add78d7017a1728

    • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

      Filesize

      364KB

      MD5

      80d5f32b3fc515402b9e1fe958dedf81

      SHA1

      a80ffd7907e0de2ee4e13c592b888fe00551b7e0

      SHA256

      0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

      SHA512

      1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

    • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

      Filesize

      1.0MB

      MD5

      d62a4279ebba19c9bf0037d4f7cbf0bc

      SHA1

      5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

      SHA256

      c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

      SHA512

      6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\InstallOptions.dll

      Filesize

      14KB

      MD5

      d753362649aecd60ff434adf171a4e7f

      SHA1

      3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

      SHA256

      8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

      SHA512

      41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\InstallOptions.dll

      Filesize

      14KB

      MD5

      d753362649aecd60ff434adf171a4e7f

      SHA1

      3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

      SHA256

      8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

      SHA512

      41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\ShellExecAsUser.dll

      Filesize

      7KB

      MD5

      86a81b9ab7de83aa01024593a03d1872

      SHA1

      8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

      SHA256

      27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

      SHA512

      cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\ShellExecAsUser.dll

      Filesize

      7KB

      MD5

      86a81b9ab7de83aa01024593a03d1872

      SHA1

      8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

      SHA256

      27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

      SHA512

      cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\System.dll

      Filesize

      10KB

      MD5

      56a321bd011112ec5d8a32b2f6fd3231

      SHA1

      df20e3a35a1636de64df5290ae5e4e7572447f78

      SHA256

      bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

      SHA512

      5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      f832e4279c8ff9029b94027803e10e1b

      SHA1

      134ff09f9c70999da35e73f57b70522dc817e681

      SHA256

      4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

      SHA512

      bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

    • \Users\Admin\AppData\Local\Temp\nsx9925.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      f832e4279c8ff9029b94027803e10e1b

      SHA1

      134ff09f9c70999da35e73f57b70522dc817e681

      SHA256

      4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

      SHA512

      bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

    • memory/1700-285-0x000001C5C0240000-0x000001C5C0242000-memory.dmp

      Filesize

      8KB

    • memory/1700-266-0x000001C5C0100000-0x000001C5C0110000-memory.dmp

      Filesize

      64KB

    • memory/1700-250-0x000001C5BFD20000-0x000001C5BFD30000-memory.dmp

      Filesize

      64KB

    • memory/1700-491-0x000001C5C64F0000-0x000001C5C64F1000-memory.dmp

      Filesize

      4KB

    • memory/1700-489-0x000001C5C64E0000-0x000001C5C64E1000-memory.dmp

      Filesize

      4KB

    • memory/1772-367-0x000002A0A84E0000-0x000002A0A8500000-memory.dmp

      Filesize

      128KB

    • memory/1772-384-0x000002A0A9000000-0x000002A0A9002000-memory.dmp

      Filesize

      8KB

    • memory/1772-441-0x000002A0AA1A0000-0x000002A0AA1C0000-memory.dmp

      Filesize

      128KB

    • memory/1772-379-0x000002A0A8C30000-0x000002A0A8C32000-memory.dmp

      Filesize

      8KB

    • memory/1772-488-0x000002A0AAB00000-0x000002A0AAC00000-memory.dmp

      Filesize

      1024KB

    • memory/1772-376-0x000002A0A8C10000-0x000002A0A8C12000-memory.dmp

      Filesize

      8KB

    • memory/1772-363-0x000002A0A8520000-0x000002A0A8540000-memory.dmp

      Filesize

      128KB

    • memory/1772-362-0x000002A0A8520000-0x000002A0A8540000-memory.dmp

      Filesize

      128KB

    • memory/1772-556-0x000002A0A9590000-0x000002A0A9592000-memory.dmp

      Filesize

      8KB

    • memory/1772-563-0x000002A0ABB00000-0x000002A0ABC00000-memory.dmp

      Filesize

      1024KB

    • memory/1772-567-0x000002A0ABB00000-0x000002A0ABC00000-memory.dmp

      Filesize

      1024KB

    • memory/1772-583-0x000002A0AC000000-0x000002A0AC100000-memory.dmp

      Filesize

      1024KB

    • memory/1772-622-0x000002A0AC600000-0x000002A0AC700000-memory.dmp

      Filesize

      1024KB

    • memory/1772-655-0x000002A0ABE00000-0x000002A0ABF00000-memory.dmp

      Filesize

      1024KB

    • memory/1772-686-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-687-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-688-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-689-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-690-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-691-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-692-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-693-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-694-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-695-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-696-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-697-0x000002A0975B0000-0x000002A0975C0000-memory.dmp

      Filesize

      64KB

    • memory/1772-358-0x000002A0A80D0000-0x000002A0A80D2000-memory.dmp

      Filesize

      8KB

    • memory/1772-356-0x000002A0A80B0000-0x000002A0A80B2000-memory.dmp

      Filesize

      8KB

    • memory/1772-352-0x000002A0A8090000-0x000002A0A8092000-memory.dmp

      Filesize

      8KB