Analysis

  • max time kernel
    42s
  • max time network
    44s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-12-2024 17:57

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:3476
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8461c3cb8,0x7ff8461c3cc8,0x7ff8461c3cd8
      2⤵
        PID:420
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1816 /prefetch:2
        2⤵
          PID:3636
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4368
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:8
          2⤵
            PID:2112
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
            2⤵
              PID:4088
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
              2⤵
                PID:3124
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                2⤵
                  PID:3632
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4404 /prefetch:1
                  2⤵
                    PID:4864
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2804
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:1
                    2⤵
                      PID:1260
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1636 /prefetch:1
                      2⤵
                        PID:716
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,940666656363219250,3626702099321537002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3468
                    • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                      "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
                      1⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:760
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1360
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3364
                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                          "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:2584
                        • C:\Windows\system32\BackgroundTransferHost.exe
                          "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                          1⤵
                          • Modifies registry class
                          PID:3852
                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                          "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:2412
                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                          "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:2872

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                          Filesize

                          364KB

                          MD5

                          80d5f32b3fc515402b9e1fe958dedf81

                          SHA1

                          a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                          SHA256

                          0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                          SHA512

                          1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                          Filesize

                          1.7MB

                          MD5

                          bb632bc4c4414303c783a0153f6609f7

                          SHA1

                          eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                          SHA256

                          7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                          SHA512

                          15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                          Filesize

                          1.0MB

                          MD5

                          d62a4279ebba19c9bf0037d4f7cbf0bc

                          SHA1

                          5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                          SHA256

                          c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                          SHA512

                          6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                          Filesize

                          4KB

                          MD5

                          77b20b5cd41bc6bb475cca3f91ae6e3c

                          SHA1

                          9e98ace72bd2ab931341427a856ef4cea6faf806

                          SHA256

                          5511a9b9f9144ed7bde4ccb074733b7c564d918d2a8b10d391afc6be5b3b1509

                          SHA512

                          3537da5e7f3aba3dafe6a86e9511aba20b7a3d34f30aea6cc11feef7768bd63c0c85679c49e99c3291bd1b552ded2c6973b6c2f7f6d731bcfacecab218e72fd4

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                          Filesize

                          340B

                          MD5

                          a5eb2441427b8caaef9a9e4db3465282

                          SHA1

                          2b83949ee323c15119f95f78de551f6360d4d383

                          SHA256

                          77608b04629f0b9d3e2cfe5b00042780a2f354f4049b33e1c5b72495be0ca6d1

                          SHA512

                          fe652061037fca8764f51e6cde288fe2e0a406ab81a5ef7af49b762ebe564608f573d742f210c2c2fad5b223864acdd74c432ed15d9d9523bbdd06d11f8c008c

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          7bed1eca5620a49f52232fd55246d09a

                          SHA1

                          e429d9d401099a1917a6fb31ab2cf65fcee22030

                          SHA256

                          49c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e

                          SHA512

                          afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          5431d6602455a6db6e087223dd47f600

                          SHA1

                          27255756dfecd4e0afe4f1185e7708a3d07dea6e

                          SHA256

                          7502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763

                          SHA512

                          868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          1679d070e240f2d2fc34bd6d67bc08b8

                          SHA1

                          76f36df044e6c1f8cd71dbc54bce63e39684ac7d

                          SHA256

                          1676e259caa16fa683ddd15e48198ebe14a38ce9bb1f552555d549c3dbde0835

                          SHA512

                          3d2c3087732b123d4c4e8957d881a8a409c21a4bdc393a04c7fa8497cc0a5a9f25779b8f5a1f825dc971a12390df96eda4375d726ead52032f7c11d349a0dc5d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          54a5034b178f88d73c0008733f01efd4

                          SHA1

                          61efbd40fdc836c5895357b136e63077243a4a86

                          SHA256

                          c8d9ae2259a6c19657473952b1018a5b75aed185454cd6b6a1758eec25a515b7

                          SHA512

                          cb738cb417387d253b83f8c693d361c2559dc4ed1134d20427c9cd01434ef24d51c0a90a6903c44f6d1c7101ed6719a829f2b324e447715eb7e24b5162f4811b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          206702161f94c5cd39fadd03f4014d98

                          SHA1

                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                          SHA256

                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                          SHA512

                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          8KB

                          MD5

                          25f7e8d63d5f02d68940d16f44ac9ca7

                          SHA1

                          0cb1850145065aae6134bf4f6b7d85c7be87110c

                          SHA256

                          e1716027dd2fcbde00fb9f92886e5e09dcc8cddf651be0bb7e196211a4d21ff6

                          SHA512

                          f035666b5fd470b920064837dd6780d11ac117168d2d9eebde5b148602adf42e2c387c83923136afdabe20384a28cc90609ec39f917a6978c6973ca0fd677fe6

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          8KB

                          MD5

                          dbb702d8aec7582a20c4ae89c61b941e

                          SHA1

                          b64cc560fc458e6cdcd44dd07e80be56855bdfa3

                          SHA256

                          40b0f639801d14b7fb2c733959dcfabfb920e9a395049d82c2144001120b1023

                          SHA512

                          2fda09bf797e5ab28298460a9ad0486e1e45ed6a72f078f4835ad66a161d20803ade82eba9c416c7b6d6578d78f793ee6b30f4c16f1f3cd487868fb358ae5245

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          8KB

                          MD5

                          f218d492d19a05ddb6a9f530cae17a87

                          SHA1

                          2e2956aacf2af9628f790dee558fb30a20379ef6

                          SHA256

                          9289e173542147ce0327cb10cbe6f1cd00f27278c70b5da1f8e902daa329c217

                          SHA512

                          3852a7db84e4d5858830130140942b5bfe6d9b8fc0494fd7e84c362c69b9d7f4039beb8a2e3a9dd8d50e757902cd4908da6935774f2214bd4c5c7adf45a0bb68

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\InstallOptions.dll

                          Filesize

                          14KB

                          MD5

                          d753362649aecd60ff434adf171a4e7f

                          SHA1

                          3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                          SHA256

                          8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                          SHA512

                          41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\ShellExecAsUser.dll

                          Filesize

                          7KB

                          MD5

                          86a81b9ab7de83aa01024593a03d1872

                          SHA1

                          8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                          SHA256

                          27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                          SHA512

                          cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\System.dll

                          Filesize

                          10KB

                          MD5

                          56a321bd011112ec5d8a32b2f6fd3231

                          SHA1

                          df20e3a35a1636de64df5290ae5e4e7572447f78

                          SHA256

                          bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                          SHA512

                          5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\ioSpecial.ini

                          Filesize

                          696B

                          MD5

                          715f720659b00482278fef8e13f5c5c0

                          SHA1

                          652e68f31b3ffc9ff4c5b57b05181291ac503fdc

                          SHA256

                          36f5351b284273fed2384521355d063b02ed11bd757ffbd5921180537d1eb1f5

                          SHA512

                          d97ba3d2e3c3c9229d6c67ec2a16d67c72a7521525f4e84f6eabcaeceda48b35689d489a33b0fa11865def05671260af700f293fda198402bcecb06399a248d2

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\ioSpecial.ini

                          Filesize

                          709B

                          MD5

                          9bf1d8e5a5e29b358f0284e07ef8777a

                          SHA1

                          4e0d5f7fa771992f799211ef0874a2a7806993b7

                          SHA256

                          1f1d3e0376a79e43b6703e1e5280e22d742ae19eef9e047de1714006f7f9d228

                          SHA512

                          0bd833c2175815769e65b83d13eecbe071b36485a0d643df963cf46926674552463740602d670632649c8dcbf92809851f7f0348493da77edfd5bf1649a2fd9f

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\ioSpecial.ini

                          Filesize

                          726B

                          MD5

                          d41bed3181545e46f1528ee0e54f82bc

                          SHA1

                          daec619f1fcc67fa4fb484301414f7cee27d8482

                          SHA256

                          403480260bb1bb8d01befbc9c2532db4f906a3630c65eebd8604d9ac42d89310

                          SHA512

                          91b1f5d3390f0c3f4cc384a40ec05d91773aae6ce2048c1792e735edde543089cd6513b31a061a941281d5e515ff5d3f21e42f2a314b43b7d61523f3dcee2a3e

                        • C:\Users\Admin\AppData\Local\Temp\nsoA8F4.tmp\nsDialogs.dll

                          Filesize

                          9KB

                          MD5

                          f832e4279c8ff9029b94027803e10e1b

                          SHA1

                          134ff09f9c70999da35e73f57b70522dc817e681

                          SHA256

                          4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                          SHA512

                          bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

                        • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\Persist.xmbcps

                          Filesize

                          16B

                          MD5

                          4ae71336e44bf9bf79d2752e234818a5

                          SHA1

                          e129f27c5103bc5cc44bcdf0a15e160d445066ff

                          SHA256

                          374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb

                          SHA512

                          0b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27

                        • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                          Filesize

                          1KB

                          MD5

                          a845616ec59040797bd977a61b27b875

                          SHA1

                          39405d38d48680bfbda0ead899fed22e065e8d5b

                          SHA256

                          2435908354545773fd13618cd933ee6218edb36bbe0d8749b849fbec4b1616c1

                          SHA512

                          0fa2d54a74034b3f1b7637bdcae26c2868496ff808c94a46d4597f58260c4cbc76327b42368e7aa67b8b9b2aaa0eedee399c8d6e37504e7475406a169c8acfaf

                        • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                          Filesize

                          1KB

                          MD5

                          441bcab24646e4cba5a9b25312e0246d

                          SHA1

                          da8850ebc71b17e9949adf63b463ef6a07951532

                          SHA256

                          9dc5c0e9769735d2f82fb967d2e7ae38b15af9a7a6c7a58cb8a15c9fa9c4f864

                          SHA512

                          7026709a7a62b3b11c783ce04d30a5261a908df45152106e2351a87fdf90f4682d67c8b699e18eff3871f78a260fce0a733d1aa755aed31feab49ed0be2224ec

                        • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                          Filesize

                          1KB

                          MD5

                          93cb97a5200d268d5714bfd9ffde3e6b

                          SHA1

                          aa9cdbfd8d875f93c9c3531e80fd452d7c19bc81

                          SHA256

                          7c7a6eba0a2a63b88b217a01232f3a0aa780cd013a88d71591d7efcc69164b5e

                          SHA512

                          9a4ebb0f6ddde7c3fe860642111c00a18d0f86883477ff8bf3c9cccae4aab8881be279f21297cca99a571ab875f55b32384d6ff5ce00df59da24a4c816cc117f