Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2025 19:31

General

  • Target

    XMouseButtonControlSetup.2.20.5.exe

  • Size

    2.9MB

  • MD5

    2e9725bc1d71ad1b8006dfc5a2510f88

  • SHA1

    6e1f7d12881696944bf5e030a7d131b969de0c6c

  • SHA256

    2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818

  • SHA512

    62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39

  • SSDEEP

    49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies registry class 33 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe
    "C:\Users\Admin\AppData\Local\Temp\XMouseButtonControlSetup.2.20.5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    PID:3136
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x64
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcfbbd46f8,0x7ffcfbbd4708,0x7ffcfbbd4718
      2⤵
        PID:3964
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
        2⤵
          PID:3928
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4504
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
          2⤵
            PID:116
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:1984
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:4456
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                2⤵
                  PID:4248
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:8
                  2⤵
                    PID:4924
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4480
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:1
                    2⤵
                      PID:2840
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                      2⤵
                        PID:1100
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                        2⤵
                          PID:3536
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:1
                          2⤵
                            PID:4484
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                            2⤵
                              PID:816
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                              2⤵
                                PID:1836
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:1
                                2⤵
                                  PID:4924
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                  2⤵
                                    PID:1536
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                                    2⤵
                                      PID:2200
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:1
                                      2⤵
                                        PID:4392
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:1
                                        2⤵
                                          PID:3464
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12503178233256230853,6596677550075873473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                                          2⤵
                                            PID:2688
                                        • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                                          "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable
                                          1⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies Control Panel
                                          • Modifies system certificate store
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1516
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:4484
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:1008
                                            • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe
                                              "C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable
                                              1⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5116

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll

                                              Filesize

                                              364KB

                                              MD5

                                              80d5f32b3fc515402b9e1fe958dedf81

                                              SHA1

                                              a80ffd7907e0de2ee4e13c592b888fe00551b7e0

                                              SHA256

                                              0ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a

                                              SHA512

                                              1589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0

                                            • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              bb632bc4c4414303c783a0153f6609f7

                                              SHA1

                                              eb16bf0d8ce0af4d72dff415741fd0d7aac3020e

                                              SHA256

                                              7cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8

                                              SHA512

                                              15b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5

                                            • C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll

                                              Filesize

                                              1.0MB

                                              MD5

                                              d62a4279ebba19c9bf0037d4f7cbf0bc

                                              SHA1

                                              5257d9505cca6b75fe55dfdaf2ea83a7d2d28170

                                              SHA256

                                              c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0

                                              SHA512

                                              6895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                              SHA1

                                              010da169e15457c25bd80ef02d76a940c1210301

                                              SHA256

                                              6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                              SHA512

                                              e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              85ba073d7015b6ce7da19235a275f6da

                                              SHA1

                                              a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                              SHA256

                                              5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                              SHA512

                                              eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              168B

                                              MD5

                                              7eeafc1dca767ed57a96967efe681df7

                                              SHA1

                                              1becc87453c999049d2c0d97b5148b986a508ba5

                                              SHA256

                                              28b40acea3883ff2e290330d8a44f61c6e677cbe153af0990c440e41f82bcb45

                                              SHA512

                                              0234264a43208cdb7a443f1ca5286e8872f277cf1fdb8f057bd5e9cda8a8ae8cee96e6c03eb76e5599e3ae630339d2eafe9721e1d36c4391fbb015ce1d3ff09c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              1KB

                                              MD5

                                              c15b64e7dba50b5602a3f4b961125c49

                                              SHA1

                                              df7ac0487cf6fe1460e495a6affb98eeaf9bc6fa

                                              SHA256

                                              1b6b3d6fcafd7d27015f7f4d72ac7ed44ddafbdf9ab4d3a313e37b15313b584a

                                              SHA512

                                              c6c3bf33af451f1eb08c8fa150f1a2f22c1d92f1cd66f4003f8c0fbd138f9b596d73173a8fe53d396c7d9ba00835ee47ce32851ed8c5db0d53684c62766f9cac

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              6b17b2677334d573014b0dc101600323

                                              SHA1

                                              dd592595560e7cdd13086a33edd95617b2d7fa07

                                              SHA256

                                              a4507591f4770289ac0729e9bd3639a54a5f666fafad5025b4f1ed01e70d0f1f

                                              SHA512

                                              e3cdd8c124cabd7b1d9f2abbdd84d4d09c0bc8a69cac4182b7500463f100329b33785ecdd5a264e78136de11e5fe7506922e589ede1eba0c08a856a06332c103

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              4ff146472f82943ad469bcf3e4338714

                                              SHA1

                                              cb1f7623c4290aaa43c89ffd3981bb66f5485430

                                              SHA256

                                              96582a1cf431626ed90562d91951e46afd68bbb26707d86d7b1335111d2d238e

                                              SHA512

                                              b3d6013afc05d5f2dc6ba593da2c573b1ccd34bd7e49f94447b59de4070671987f57d432a08e5d6f5a1de7589f75e805d9b7e4ed79dfb6fc5974a0f987f501af

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              b40252628a16715557cd2c7d021095cf

                                              SHA1

                                              3b7790d1e40af5fdf5d934e8cb6ef4631d1839c8

                                              SHA256

                                              452ffa20a65edd3bbe4e2bdc9ae55bd4755561efb8dc1fba4a282d6ae1d17bb8

                                              SHA512

                                              e4ed8dcd5e0dfe40bfdc74da025dff4d1d6f14613298492a5321ab443bc38290280bd0919a6e288e34b227ec6d71dfb89b11a874ad1dae161bb9e234c815c090

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\InstallOptions.dll

                                              Filesize

                                              14KB

                                              MD5

                                              d753362649aecd60ff434adf171a4e7f

                                              SHA1

                                              3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

                                              SHA256

                                              8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

                                              SHA512

                                              41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\ShellExecAsUser.dll

                                              Filesize

                                              7KB

                                              MD5

                                              86a81b9ab7de83aa01024593a03d1872

                                              SHA1

                                              8fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be

                                              SHA256

                                              27d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115

                                              SHA512

                                              cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\System.dll

                                              Filesize

                                              10KB

                                              MD5

                                              56a321bd011112ec5d8a32b2f6fd3231

                                              SHA1

                                              df20e3a35a1636de64df5290ae5e4e7572447f78

                                              SHA256

                                              bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                                              SHA512

                                              5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\ioSpecial.ini

                                              Filesize

                                              697B

                                              MD5

                                              793575a2b231fd1ba80d88b3192bd3ec

                                              SHA1

                                              3f2d6ade9504014c19ac948e19ecf9d506f27d52

                                              SHA256

                                              fbd4acf325e29d40cc7d241c869ed6abad86b3d62f6444760ba740267370accf

                                              SHA512

                                              72102dddea0e4f2ada4e3b0b51fca5dcc8a5c15b22186f603b8a1b9bdbfc1a7d522618b98cae47d757e2b6c833773e3d9282f41ac4e35050cb4df2a9eabc0fb4

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\ioSpecial.ini

                                              Filesize

                                              710B

                                              MD5

                                              9f20cab1c85e92886c3c64cb4ca24cc0

                                              SHA1

                                              d809fd47cecf50e987e13804389ba511655c00a7

                                              SHA256

                                              9fee24f4f9bc9111c44699e0ad267cbc63e374dfd358a99b30352e2e44c6f17d

                                              SHA512

                                              25b5d24c67b475a507a1c474acf8303beaa2e842f0fedfec4640cb9af2c6b3c4b3b225a5c5f89b43fd8770cc10a4415722400b8cb1f850519823752b3629ddcc

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\ioSpecial.ini

                                              Filesize

                                              766B

                                              MD5

                                              a5cb3e9757258e92b25e54a86dce49dc

                                              SHA1

                                              df79bde97607257fc452e5f019cced11010beea5

                                              SHA256

                                              9e4f8fb8a8ce3f19319498e2b7c191550527c04a8b30ff5d759a3e1534930e4f

                                              SHA512

                                              c0d4ade401deed67308614955b45dc6ae4514c413a7f9cfbf4fd97e8105f8c120417bee4d1f69e1c15ed13d51d085dff4a0566039bc0c6bdfc9237ac91a874aa

                                            • C:\Users\Admin\AppData\Local\Temp\nslBBFF.tmp\nsDialogs.dll

                                              Filesize

                                              9KB

                                              MD5

                                              f832e4279c8ff9029b94027803e10e1b

                                              SHA1

                                              134ff09f9c70999da35e73f57b70522dc817e681

                                              SHA256

                                              4cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061

                                              SHA512

                                              bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d

                                            • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\Persist.xmbcps

                                              Filesize

                                              16B

                                              MD5

                                              4ae71336e44bf9bf79d2752e234818a5

                                              SHA1

                                              e129f27c5103bc5cc44bcdf0a15e160d445066ff

                                              SHA256

                                              374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb

                                              SHA512

                                              0b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27

                                            • C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log

                                              Filesize

                                              1KB

                                              MD5

                                              83ac0d99f49c21b9656c2e1b1ca9eff2

                                              SHA1

                                              bfdc2496a1adfbe2422b671d1ba48321e10d38a9

                                              SHA256

                                              c09dd7b5afd8a4b7b55e1b646270add07d981f432fde9b4284b257ed7f992c95

                                              SHA512

                                              afa70d5b325ba84e7b2b4edf5f30f1dcbcb852d94645677173bd2a8225b702b03b1bd300d2292799b012bed9026e48c461c5e3bce5e1be611498abf82573b825