Analysis

  • max time kernel
    171s
  • max time network
    176s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-12-2023 03:15

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Control Panel
    • Modifies registry class
    PID:3724
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:312
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2380
  • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
    "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4976
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:408
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1124
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:940
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:512
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:800
  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\X-Mouse Button Control User Guide.pdf"
    1⤵
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4F22C54624186F2DDAED4FF94BA7608B --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
        3⤵
          PID:976
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9002016A302E38B7C474713EB3B539CC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9002016A302E38B7C474713EB3B539CC --renderer-client-id=2 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job /prefetch:1
          3⤵
            PID:5108
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BCEE1DB087F6D85D77D466D67AA78A6B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BCEE1DB087F6D85D77D466D67AA78A6B --renderer-client-id=4 --mojo-platform-channel-handle=2200 --allow-no-sandbox-job /prefetch:1
            3⤵
              PID:4856
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AF2B319795F888ED613F8CB7186ACF59 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              3⤵
                PID:5068
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B065869AB9749F76109F5B7BE4BC7186 --mojo-platform-channel-handle=1708 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                3⤵
                  PID:1328
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=559118D48559FD359ADF8E0675217F38 --mojo-platform-channel-handle=1808 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  3⤵
                    PID:3940
              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3660

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                Filesize

                364KB

                MD5

                80d5f32b3fc515402b9e1fe958dedf81

                SHA1

                a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                SHA256

                0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                SHA512

                1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\X-Mouse Button Control User Guide.pdf

                Filesize

                1.1MB

                MD5

                58d10e30337cbb6b018edfd88801fc9f

                SHA1

                bbc109dde85037999a242bb82d4cf7f1b49f946c

                SHA256

                eb81a7161f8a9b6aac8977380476f901d426b700c5ae16aa2e0e098d85f89d23

                SHA512

                870a56c0272e91ca0879c0c0c386aac11fb2b813edd6b3998dea5199520eaa32a99c5e0a6113be642066aa742a297e27b0370b568f1ce6dc186fe5905aea7d37

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                Filesize

                1.7MB

                MD5

                bb632bc4c4414303c783a0153f6609f7

                SHA1

                eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                SHA256

                7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                SHA512

                15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                Filesize

                1.7MB

                MD5

                bb632bc4c4414303c783a0153f6609f7

                SHA1

                eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                SHA256

                7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                SHA512

                15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                Filesize

                1.7MB

                MD5

                bb632bc4c4414303c783a0153f6609f7

                SHA1

                eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                SHA256

                7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                SHA512

                15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

              • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                Filesize

                1.0MB

                MD5

                d62a4279ebba19c9bf0037d4f7cbf0bc

                SHA1

                5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                SHA256

                c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                SHA512

                6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9O18J2ON\edgecompatviewlist[1].xml

                Filesize

                74KB

                MD5

                d4fc49dc14f63895d997fa4940f24378

                SHA1

                3efb1437a7c5e46034147cbbc8db017c69d02c31

                SHA256

                853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                SHA512

                cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4RD0CUG8\f[1].txt

                Filesize

                176KB

                MD5

                b3f6d6aa0c9091ce7336198331ef25ac

                SHA1

                8d7b219112d2471b8036a693b1b1ad3f3b801f0a

                SHA256

                11abad4e9d7337488a32c7d144129c8cad9f25ad3d400f73bd21955d530860af

                SHA512

                d3db088b7c9be9e2a3df9c8b5019ea1e4783b1719db626b268b618a392707003724eecd5b28294b9086dfa797a5e583d38f777959c27ea8ce4a79dbfa324dcd5

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\AMX585MX\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XXM6TX1U\xmbc[1].ico

                Filesize

                3KB

                MD5

                1279bf31d9659ad2017369ec1b90473c

                SHA1

                0f21c5a8266c36af7909118899e1fa07590f2df8

                SHA256

                74e3162830413f502277c221381f07b34d77a155f5cbeca379e1a4ffc29af116

                SHA512

                18ab594628c7873c56a85cc748585a3422f06d3f3ad70e5d33e86bed8bb9595d43513960731db89820d89b2ed950b48d6b891dbda768164f968ab06f5a86c277

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\InstallOptions.dll

                Filesize

                14KB

                MD5

                d753362649aecd60ff434adf171a4e7f

                SHA1

                3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                SHA256

                8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                SHA512

                41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ShellExecAsUser.dll

                Filesize

                7KB

                MD5

                86a81b9ab7de83aa01024593a03d1872

                SHA1

                8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                SHA256

                27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                SHA512

                cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\System.dll

                Filesize

                10KB

                MD5

                56a321bd011112ec5d8a32b2f6fd3231

                SHA1

                df20e3a35a1636de64df5290ae5e4e7572447f78

                SHA256

                bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                SHA512

                5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ioSpecial.ini

                Filesize

                696B

                MD5

                0fea08b14281489b502ec62fc8ab62ef

                SHA1

                5ef0808515f23650ff3866d85e942713775a2166

                SHA256

                6698c16cdb3a7ff045c5784f518db27a2f80db1aab88041b4abc368af9eff386

                SHA512

                6f7ad7ef39cfdc55c5219c0390319ebf01445db145fd226017698d947c6d753abe254279b2d9cb5443927c56150e0ca37fb5d419ff1a85960ecb1135c1f84a0e

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ioSpecial.ini

                Filesize

                709B

                MD5

                64ba22a9f9e376f49a19dfef501ffabd

                SHA1

                1ce8b14dc41986f058a1b1230ff5da3e7f84f674

                SHA256

                753348d22697eda33c981e9474d7ebf7ac3c91a9d5afdf3568a2f81bd8f4dc1b

                SHA512

                929284dbcc84d55f9248355b90b87c1071a80878afcd48b9ade5c509e368af6c2960ac9bedbd88d956d698176a6908e2caf83157c5f49b90049110504ecc3b94

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ioSpecial.ini

                Filesize

                726B

                MD5

                3a2da69046c6db28a37110c8ca1b8d88

                SHA1

                f2f8b667b0693b5ffadc4936f781d7a17bd7332e

                SHA256

                00abe4da0c8118b16cfe4e5575938697b42b0d967b0bf52b73aa777beb8d999d

                SHA512

                49f017a99779e846c62814baea0ceb2720b30134048f1954ecee9c6b68c18cb371cb073d7f89bafadae3ae4e45e7225d473872dfff0f9638e9b06b3fb3f0df16

              • C:\Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                f832e4279c8ff9029b94027803e10e1b

                SHA1

                134ff09f9c70999da35e73f57b70522dc817e681

                SHA256

                4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                SHA512

                bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

              • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\Persist.xmbcps

                Filesize

                16B

                MD5

                4ae71336e44bf9bf79d2752e234818a5

                SHA1

                e129f27c5103bc5cc44bcdf0a15e160d445066ff

                SHA256

                374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb

                SHA512

                0b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27

              • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                Filesize

                1KB

                MD5

                cc9b4a588fff82d9710bb35d45380843

                SHA1

                8ab53321b22478a207e7afe75cd54903ffbf23b5

                SHA256

                9b5ea6ad0a11aa9c5c49790a1f12f55f505c8bbe4e0a666fba85b718fe90e8a8

                SHA512

                e7442c68d99571f0ff622780ef7c57e70e6c08913bb25f9b62e48c0160ff76763c1640983bf86b8a90e3918d785987530cd2718ab9cb0f3dc8b7dafa895f7f47

              • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                Filesize

                364KB

                MD5

                80d5f32b3fc515402b9e1fe958dedf81

                SHA1

                a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                SHA256

                0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                SHA512

                1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

              • \Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                Filesize

                364KB

                MD5

                80d5f32b3fc515402b9e1fe958dedf81

                SHA1

                a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                SHA256

                0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                SHA512

                1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

              • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                Filesize

                1.0MB

                MD5

                d62a4279ebba19c9bf0037d4f7cbf0bc

                SHA1

                5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                SHA256

                c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                SHA512

                6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

              • \Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                Filesize

                1.0MB

                MD5

                d62a4279ebba19c9bf0037d4f7cbf0bc

                SHA1

                5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                SHA256

                c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                SHA512

                6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\InstallOptions.dll

                Filesize

                14KB

                MD5

                d753362649aecd60ff434adf171a4e7f

                SHA1

                3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                SHA256

                8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                SHA512

                41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\InstallOptions.dll

                Filesize

                14KB

                MD5

                d753362649aecd60ff434adf171a4e7f

                SHA1

                3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                SHA256

                8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                SHA512

                41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ShellExecAsUser.dll

                Filesize

                7KB

                MD5

                86a81b9ab7de83aa01024593a03d1872

                SHA1

                8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                SHA256

                27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                SHA512

                cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\ShellExecAsUser.dll

                Filesize

                7KB

                MD5

                86a81b9ab7de83aa01024593a03d1872

                SHA1

                8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                SHA256

                27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                SHA512

                cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\System.dll

                Filesize

                10KB

                MD5

                56a321bd011112ec5d8a32b2f6fd3231

                SHA1

                df20e3a35a1636de64df5290ae5e4e7572447f78

                SHA256

                bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                SHA512

                5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\System.dll

                Filesize

                10KB

                MD5

                56a321bd011112ec5d8a32b2f6fd3231

                SHA1

                df20e3a35a1636de64df5290ae5e4e7572447f78

                SHA256

                bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                SHA512

                5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                f832e4279c8ff9029b94027803e10e1b

                SHA1

                134ff09f9c70999da35e73f57b70522dc817e681

                SHA256

                4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                SHA512

                bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

              • \Users\Admin\AppData\Local\Temp\nsu9DE8.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                f832e4279c8ff9029b94027803e10e1b

                SHA1

                134ff09f9c70999da35e73f57b70522dc817e681

                SHA256

                4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                SHA512

                bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

              • memory/312-240-0x000002B395220000-0x000002B395230000-memory.dmp

                Filesize

                64KB

              • memory/312-256-0x000002B395B00000-0x000002B395B10000-memory.dmp

                Filesize

                64KB

              • memory/312-409-0x000002B39BA20000-0x000002B39BA21000-memory.dmp

                Filesize

                4KB

              • memory/312-411-0x000002B39BA30000-0x000002B39BA31000-memory.dmp

                Filesize

                4KB

              • memory/312-275-0x000002B3953C0000-0x000002B3953C2000-memory.dmp

                Filesize

                8KB

              • memory/1124-371-0x00000189DAE00000-0x00000189DAE20000-memory.dmp

                Filesize

                128KB

              • memory/1124-370-0x00000189DAE00000-0x00000189DAE20000-memory.dmp

                Filesize

                128KB

              • memory/1124-447-0x00000189CA700000-0x00000189CA800000-memory.dmp

                Filesize

                1024KB

              • memory/1124-385-0x00000189DB410000-0x00000189DB412000-memory.dmp

                Filesize

                8KB

              • memory/1124-375-0x00000189DADC0000-0x00000189DADE0000-memory.dmp

                Filesize

                128KB

              • memory/1124-366-0x00000189CA1C0000-0x00000189CA1C2000-memory.dmp

                Filesize

                8KB

              • memory/1124-363-0x00000189CA1A0000-0x00000189CA1A2000-memory.dmp

                Filesize

                8KB

              • memory/1124-361-0x00000189CA180000-0x00000189CA182000-memory.dmp

                Filesize

                8KB

              • memory/1124-430-0x00000189DA800000-0x00000189DA900000-memory.dmp

                Filesize

                1024KB

              • memory/1124-387-0x00000189DB430000-0x00000189DB432000-memory.dmp

                Filesize

                8KB

              • memory/1124-389-0x00000189DB630000-0x00000189DB632000-memory.dmp

                Filesize

                8KB