Analysis
-
max time kernel
404s -
max time network
1590s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26-07-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
bdcamsetup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdcamsetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
bdcamsetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
bdcamsetup.exe
Resource
win11-20240709-en
General
-
Target
bdcamsetup.exe
-
Size
31.5MB
-
MD5
cbb2dc1b64c5a21da53d79f0ad2e1bdb
-
SHA1
b2e411fcbccedef4d3a64133aff5d5502291b24f
-
SHA256
5aa1234eb23bef8628cdc9189879d629b418cd1d176c99c024a15c3bfe5e413a
-
SHA512
73391f29a027f1184d2ed673667b86bd96eaf97df94e4fc13c03ec8913c9ff36f3a549b7a4f79f67755cdd8f61fe906e61de1559dd884f2623add72413b4841c
-
SSDEEP
786432:fmDBQyG/qdx5SFTFI/Xoa74EJCvBLRUH0PYNr/h4vW:+D0qd/SFTFIcGyIpr/v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation bdcamsetup.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\bdmjpeg.dll BDMPEG1SETUP.EXE File created C:\Windows\SysWOW64\msvcp110.dll bdcamsetup.exe File created C:\Windows\system32\vcomp140.dll bdcamsetup.exe File created C:\Windows\system32\D3DCompiler_47.dll bdcamsetup.exe File created C:\Windows\system32\bdmjpeg64.dll BDMPEG1SETUP.EXE File created C:\Windows\SysWOW64\D3DCompiler_47.dll bdcamsetup.exe File created C:\Windows\system32\msvcr110.dll bdcamsetup.exe File created C:\Windows\system32\msvcp110.dll bdcamsetup.exe File created C:\Windows\SysWOW64\bdmpegv.dll BDMPEG1SETUP.EXE File created C:\Windows\system32\bdmpega64.acm BDMPEG1SETUP.EXE File created C:\Windows\SysWOW64\vcomp140.dll bdcamsetup.exe File created C:\Windows\SysWOW64\msvcr110.dll bdcamsetup.exe File created C:\Windows\SysWOW64\bdmpega.acm BDMPEG1SETUP.EXE File created C:\Windows\system32\bdmpegv64.dll BDMPEG1SETUP.EXE -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4128 bdcam.exe 4128 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Bandicam\lang\Azerbaijani.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Serbian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\data\rclick.wav bdcamsetup.exe File created C:\Program Files\Bandicam\data\effects\effects20.dat bdcamsetup.exe File created C:\Program Files\Bandicam\data\effects\highlight10.dat bdcamsetup.exe File created C:\Program Files\Bandicam\data\effects\highlight30.dat bdcamsetup.exe File created C:\Program Files\Bandicam\uninstall.exe bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Czech.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Lithuanian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Norwegian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Polish.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Urdu.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Italian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Latvian.ini bdcamsetup.exe File opened for modification C:\Program Files\Bandicam\data\language.dat bdcamsetup.exe File created C:\Program Files\Bandicam\encap64.dll bdcamsetup.exe File created C:\Program Files\Bandicam\bdcamvk64.dll bdcamsetup.exe File created C:\Program Files\Bandicam\bdcamvk64.json bdcamsetup.exe File created C:\Program Files\Bandicam\lang\French.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Greek.ini bdcamsetup.exe File created C:\Program Files\Bandicam\data\start.wav bdcamsetup.exe File created C:\Program Files\Bandicam\lang\German.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Indonesian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Malay.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Hebrew.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Serbian(Cyrillic).ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Simplified_Chinese.ini bdcamsetup.exe File created C:\Program Files\Bandicam\bdfix.exe bdcamsetup.exe File created C:\Program Files\Bandicam\bdcam_admin.lnk bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Bosnian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Burmese.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Croatian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Spanish.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Ukrainian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Georgian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Thai.ini bdcamsetup.exe File created C:\Program Files\Bandicam\data\effects\highlight20.dat bdcamsetup.exe File created C:\Program Files\Bandicam\bdcam32.dll bdcamsetup.exe File created C:\Program Files\Bandicam\translators.txt bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Arabic.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\English.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Finnish.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Slovenian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Swedish.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Vietnamese.ini bdcamsetup.exe File created C:\Program Files\Bandicam\bdcap32.dll bdcamsetup.exe File created C:\Program Files\Bandicam\UnregVulkanLayer.bat bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Hungarian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Portuguese(BR).ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Slovak.ini bdcamsetup.exe File created C:\Program Files\Bandicam\data\language.dat bdcamsetup.exe File created C:\Program Files\Bandicam\data\effects\effects10.dat bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Portuguese.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Russian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\bdcam32.bin bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Armenian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Bulgarian.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Danish.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\khmer.ini bdcamsetup.exe File created C:\Program Files\Bandicam\lang\Uzbek.ini bdcamsetup.exe File created C:\Program Files (x86)\BandiMPEG1\uninstall.exe BDMPEG1SETUP.EXE File created C:\Program Files\Bandicam\bdcam.exe bdcamsetup.exe File created C:\Program Files\Bandicam\bdcamih.dll bdcamsetup.exe File created C:\Program Files\Bandicam\bdcamvk32.dll bdcamsetup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe -
Executes dropped EXE 4 IoCs
pid Process 1008 BDMPEG1SETUP.EXE 4128 bdcam.exe 5052 bdcam.exe 5352 bdcam.exe -
Loads dropped DLL 18 IoCs
pid Process 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 1008 BDMPEG1SETUP.EXE 3460 regsvr32.exe 2056 regsvr32.exe 1008 BDMPEG1SETUP.EXE 2836 rundll32.exe 3100 rundll32.exe 220 bdcamsetup.exe 220 bdcamsetup.exe 220 bdcamsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdcamsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BDMPEG1SETUP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION bdcamsetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\bdcam.exe = "11000" bdcamsetup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_SCRIPTURL_MITIGATION bdcamsetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\bdcam.exe = "1" bdcamsetup.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\InprocServer32\ = "C:\\Program Files (x86)\\BandiMPEG1\\bdfilters.dll" BDMPEG1SETUP.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "262144" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\cookiebot.com\NumberOfSubdom = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\consentcdn.cookiebot.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\Total MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188}\InprocServer32\ = "C:\\Program Files (x86)\\BandiMPEG1\\bdfilters.dll" BDMPEG1SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{89C4B786-A490-4A3E-AA70-E6A8C61D3689} BDMPEG1SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{89C4B786-A490-4A3E-AA70-E6A8C61D3689}\CLSID = "{89C4B786-A490-4A3E-AA70-E6A8C61D3689}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\BANDICAM.bfix bdcam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{89C4B786-A490-4A3E-AA70-E6A8C61D3689}\ = "Bandicam MPEG-1 Video Decoder" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188}\ = "Bandicam MPEG-1 Audio Property" BDMPEG1SETUP.EXE Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\BANDICAM.bfix\Shell\Open\Command bdcam.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\cookiebot.com\ = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\ = "Bandicam MPEG-1 Audio Decoder" BDMPEG1SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A1C6833E-A3EC-4397-9FA9-151792F3408F}\InprocServer32\ = "C:\\Program Files (x86)\\BandiMPEG1\\bdfilters64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\InprocServer32\ = "C:\\Program Files (x86)\\BandiMPEG1\\bdfilters64.dll" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188}\InprocServer32\ = "C:\\Program Files (x86)\\BandiMPEG1\\bdfilters64.dll" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A1C6833E-A3EC-4397-9FA9-151792F3408F}\InprocServer32\ThreadingModel = "Both" BDMPEG1SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{89C4B786-A490-4A3E-AA70-E6A8C61D3689}\FriendlyName = "Bandicam MPEG-1 Video Decoder" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\FriendlyName = "Bandicam MPEG-1 Audio Decoder" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\InprocServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\BANDICAM.bfix\Shell bdcam.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188}\ = "Bandicam MPEG-1 Audio Property" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89C4B786-A490-4A3E-AA70-E6A8C61D3689} BDMPEG1SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A1C6833E-A3EC-4397-9FA9-151792F3408F}\InprocServer32 BDMPEG1SETUP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F4F5C9E9-CFCC-4C65-A8BD-0423A338F188}\InprocServer32 BDMPEG1SETUP.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\ = "Bandicam MPEG-1 Audio Decoder" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{E2E7539A-CECF-4A6A-B187-939943ECEF05} regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\consentcdn.cookiebot.com\ = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\cookiebot.com\Total = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 678c2c9381dfda01 MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\InprocServer32\ThreadingModel = "Both" BDMPEG1SETUP.EXE Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2E7539A-CECF-4A6A-B187-939943ECEF05} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{E2E7539A-CECF-4A6A-B187-939943ECEF05}\FilterData = 02000000010080ff020000000000000030706933000000000000000001000000000000000000000030747933000000006000000070000000317069330800000000000000010000000000000000000000307479330000000060000000800000006175647300001000800000aa00389b715000000000001000800000aa00389b710100000000001000800000aa00389b71 regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4128 bdcam.exe 4128 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1292 MicrosoftEdgeCP.exe 1292 MicrosoftEdgeCP.exe 1292 MicrosoftEdgeCP.exe 1292 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: 33 4360 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4360 AUDIODG.EXE Token: 33 5052 bdcam.exe Token: SeIncBasePriorityPrivilege 5052 bdcam.exe Token: SeDebugPrivilege 4636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4724 MicrosoftEdge.exe Token: SeDebugPrivilege 4724 MicrosoftEdge.exe Token: 33 5352 bdcam.exe Token: SeIncBasePriorityPrivilege 5352 bdcam.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5052 bdcam.exe 5352 bdcam.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5052 bdcam.exe 5352 bdcam.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4128 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 5052 bdcam.exe 4724 MicrosoftEdge.exe 1292 MicrosoftEdgeCP.exe 4636 MicrosoftEdgeCP.exe 1292 MicrosoftEdgeCP.exe 5352 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe 5352 bdcam.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 220 wrote to memory of 1008 220 bdcamsetup.exe 74 PID 220 wrote to memory of 1008 220 bdcamsetup.exe 74 PID 220 wrote to memory of 1008 220 bdcamsetup.exe 74 PID 1008 wrote to memory of 3460 1008 BDMPEG1SETUP.EXE 75 PID 1008 wrote to memory of 3460 1008 BDMPEG1SETUP.EXE 75 PID 1008 wrote to memory of 3460 1008 BDMPEG1SETUP.EXE 75 PID 3460 wrote to memory of 2056 3460 regsvr32.exe 76 PID 3460 wrote to memory of 2056 3460 regsvr32.exe 76 PID 220 wrote to memory of 4128 220 bdcamsetup.exe 78 PID 220 wrote to memory of 4128 220 bdcamsetup.exe 78 PID 4128 wrote to memory of 2836 4128 bdcam.exe 79 PID 4128 wrote to memory of 2836 4128 bdcam.exe 79 PID 4128 wrote to memory of 3100 4128 bdcam.exe 80 PID 4128 wrote to memory of 3100 4128 bdcam.exe 80 PID 4128 wrote to memory of 3100 4128 bdcam.exe 80 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 PID 1292 wrote to memory of 1696 1292 MicrosoftEdgeCP.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdcamsetup.exe"C:\Users\Admin\AppData\Local\Temp\bdcamsetup.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\BDMPEG1SETUP.EXE"C:\Users\Admin\AppData\Local\Temp\BDMPEG1SETUP.EXE" /S2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" /s "C:\Program Files (x86)\BandiMPEG1\bdfilters64.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BandiMPEG1\bdfilters64.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:2056
-
-
-
-
C:\Program Files\Bandicam\bdcam.exe"C:\Program Files\Bandicam\bdcam.exe" /install2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk64.dll",RegDll3⤵
- Loads dropped DLL
PID:2836
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk32.dll",RegDll3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
C:\Program Files\Bandicam\bdcam.exe"C:\Program Files\Bandicam\bdcam.exe" 0x0001A5D31⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5052
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4724
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2481⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4636
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1696
-
C:\Program Files\Bandicam\bdcam.exe"C:\Program Files\Bandicam\bdcam.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD5ed730387fdcd684b756601b863c47417
SHA1c49ed6d0d46facf4ceaeb21f5d6bfdf9e3587fde
SHA2569cbc29696ad2d582e251bf9c4be5cce618753fa43551d2474e1ae5cc5e1245e5
SHA512e32df727799d33922c6e92f94a7bdb0bc2772d6a6636d15e285d94d3ae4661062e5bc89ec3546b76ec853398f88d972f461327ef687f89093acf1096560d5c3f
-
Filesize
4.6MB
MD513f7a29baa1e04f74151737cb71bd0e5
SHA10bc8682c6c96923a729aa6239aa53d95221b13ab
SHA256008fababd36e8fbfd5f610a2c62d47963e78ec91e54ad69a1e20807445c3528d
SHA5124cea11e88e8861c4094b227d85295c0d67452af703b0ec9dfe475797b87d03b40bc1f6b58dcc00996672c1c05d99b82dcc067bc429a1465ae90f4ec966f2bca8
-
Filesize
27B
MD5d025f448d8dde9678a0bf6dac26a61fa
SHA1c457f5ceffb60e233e131187bb7d11e20ce831f2
SHA256cac812c36cbbe7821ac92669643572fd33002815976a43d1820d47205f264f6b
SHA512e5ed08fe970d0f2293792982a52616efc69fc0cf3e3b3a2e96f083ed72fe06e4bfa6ae23d7c04d6a0483eb402d43c37cd1e4bf73334a116368cc097ce4c81adf
-
Filesize
13.4MB
MD5995a92cc9018419ee100c0f19f40fc7f
SHA16a6347ac627a9fd035945c4a22b30a6d089a070a
SHA256a8c3439c80e27c0a9eea4c13dd0fc263476a9d39ac7b0d3278be62e6e14f9ec0
SHA51247ecd16b5d7fa1fdaedaebc075d5f12a6fed150e5309139a2d3c0559a04ced202788d24f252e7b0a775682adf90444cb1ad8be643f145dc91ab47ede55c00935
-
Filesize
1.5MB
MD59051ce47609c3670afedce797b9cc1c3
SHA16e7929058c8e011b1ac24e72f5c32570fb17b2b6
SHA25607cfb828516e8ab690933df6012c97375b2825fa8784965eab2a4198b9b290da
SHA5128f6712cbc68bdfb1c2b33a6231e33c57d476f20fe05299a22e95e6f47c4115a86efb750a97970aaec5132f99ff073aaa358fba63835fc1e3ef2cbce0a5009922
-
Filesize
1.9MB
MD5f488d01d37cdab9bbecf59632343f12f
SHA17d2914422378a17fa0551b71336a053e94d5a1c7
SHA2567e3f8e9cb1c074af15384312568ff9b181cebcc452756d229adfd22fb163a1eb
SHA512b605ba7aa17fe43a389061a77e21791845dccd55ca8a2e98cd38e0f730fe73560014de57f9069ae93906dd215c63b4f53b64b63849cdbdc13dce71052d7824b2
-
Filesize
21.2MB
MD57214c7b4d2064db6827e2c3308a740de
SHA145bc92de40161252010dbde86a6637f34bcc46cb
SHA256a7c59f782bc88f2fa39d7e7c8ec2fd2189325eb70c9e4b2dea1434cad1b768bc
SHA512ef0ca3b5cdb5980586d886fa091efd67a51f031764628df01f3f7afb21c26484823bd86a6d29f2434b55fc766e101d80a1197d186404fe332fb1b4b0156700b6
-
Filesize
97KB
MD51a2907234b069c1e52ad296bceb630f0
SHA1202f189aa148ab080225c6fb351b5e664847f8ea
SHA256789704bfc14da7326bb4756b7339026d8915914905e821d57a69804b11a27bf0
SHA51227a8b36ccf0353cb0fc41d1b41f0c66cfe7c41e95a79918498051c1c70b08d9a76ca0c9ca3f5361bf12a5f26be919766a84831ed4171690ab545f68c88612c85
-
Filesize
886KB
MD52ebf0e7158b899a32ac072cc7d5f8d9b
SHA11b677c3e9fda3593f1fcbcc4b429800f06f3d5f7
SHA2561814cfd6c5b79f65880fad7558a1cef35fd5f8f1f06f60e61945b58ab29f6ecd
SHA5124b3fe1e6737296216e81b750ccac01a3ce77848fc7f6cb9344ea7ff6c352b988e8c8fe889ad7a850285e8b0fed90808aca12bfbcab206c4fdecb4b3b3f085e8d
-
Filesize
135KB
MD54eaf9f783fe06f5ed362cdcf735687af
SHA128a76602a253fc165c83a8026037bbb8d4594242
SHA256a6b5b9dbfb7a51aa91cea093e05699b28b55c92878b04887c72d7a23cfcb07b3
SHA512286db775c95c171cbd4adde118b7af7616530ffeb4d337069b323f73ae966e2de9a75934a1af80c7f103c954c838e8e56acf020c21f65aa789a77bb9fb1ff0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5299868876d41f6e81bfdd0219ac691c7
SHA18348f369d6b61959f1246e46e6c8af2267904123
SHA256865f91ecd933366ac960decb8e5e332d103f47c50eedf31101e63b6709462ce3
SHA5123227aff461fccbdacfb9509a5319a0ab7da45c34ec2b1b3db2246a1da85df86df42137f86a6ff7925fdf63e36619d0b37d40b7a9b53afe75f6e57a0fb912b79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD57dfcc843c7d57f794462a5567e88c5ef
SHA18a497037a5db79ea8c8524c3b1d7eadbb9a0854a
SHA256178348f90ddb6062ea965f839f400748189a2f11ab0047b64fb2998bac3e4ade
SHA512e916da19fd3fa86b83a93d956d6f5025d58e5d1589426656707145c75d61d1fb5a62718efefb21d7fb5a1d483f1443a0db010a9d7b4ab9a3c907f384c407dc7d
-
Filesize
1KB
MD500224cc7bc649b8c9189f903915f427f
SHA101fc44ccff2660261e33f87e56b6d837394355e0
SHA256faaf8a99884c188175a8ba22eeb28fbd230986b2da37d9a3d61b9a377a3f8071
SHA51262d88924a0b7f9deadc60e322ef41fdb51c976fb7cbef5c0b05d5195038a2bce1ca62f2126996030df863fae5bf7c73e0049df078a330c2b9463efff475cd881
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\CFNGC9XN\256-bandicam[1].png
Filesize12KB
MD55536ee3f61e2fefed336975a381964ea
SHA1ab75c5c3df3ee34af317926ee297319a74bab63e
SHA25677238dacdffe96bb67f270c8b0c7fecab7b221c2e12367e7060f28a359c35b9e
SHA51229b5c832ae3c15cf819c6c13f7355a4e5719b511c3b0166c5e0901db4341f06c193f6ef0d0019ea47a9ccd20e6bb2e9c18f138f049280628139481140d5f0880
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF3C44D6D89DF4D898.TMP
Filesize16KB
MD5e3663498362def0d8ac8986dba1b5e55
SHA128a85eb2f602ac1121feebc6b984a69751a0ee48
SHA256d1bdcf9fb10323bb01fa0126f3ad389ad63cfd0d5dd8b23ca03afb948ecafd29
SHA5123ba58ef826e914d23d2dbca5b5ed9bfce4533cb2c803ba99fccebafb7595a350f5689f3d2004238ee40f2ff67b44903a1671d6034202dae9eeeaf2db7912df9d
-
Filesize
1.4MB
MD5461d135a4fccd51bbae38f742e123fd3
SHA1c12a442fbcd4a9c44102f0a560ba03d59bc501ed
SHA2564c441e7d744a2a273f780103bcf5bcb1e32c2d9c6a32b62f9044b32107544079
SHA51241eb816bf0cc0ca12b5c6c07517cd718b8701255ea81e94ffc937f2538b8cdf5db24751cdbc22fefd6496b767fc0d631fea76216b0363f4b625557097b3caaee
-
Filesize
1KB
MD54e760c60555fab55d12318e05742e68d
SHA1fa73fd0e4ed21553c4b6a7a6cb13fe3cf588635c
SHA25632dc4dd63103682a70c04e40b426ce4f4898a7637eb03c8682b90f025348ad04
SHA512718ab17c9c1700c467992883fed3ea25799ddf5756325d06dfb804644dd08196ae34fca173af374a7888501dd8af23bd4293159c8e7725c833e6ed15f1406bc7
-
Filesize
1KB
MD58f00bf60aa6c46c2bd656b5cb90c9f6c
SHA1f85bf98ae5b330f302b250d6f6f445e830022c5d
SHA256c41601e89102a6289cd44d87cbefee0f127ca3b8be4658006badcd7a21f54898
SHA5129683fd6f6e74cf1614d1988329fc3f8b397f82d0da4eaa8cfaf99ba0fe5f1f2f7fa68fa1113464993be11dae4832f38f4d7956a11baa6205b9606f2c37cdb67a
-
Filesize
1KB
MD5bc632e1d30c239894978fdae20b69e72
SHA1213aa2693298797e9657245bf18f6b160c0c6ed7
SHA256bc39c19cea1e16789ad54518eca329c64add9877f62b1f1eba99ec56667e5718
SHA512c32aba335ce32f5dc612483afd69cef4c9d3f1d38084794c0b6c6e1c046f801e03db1afa4000d5eaf23445f589ac1f6a02c0b7c317c4460690803ad7c1eab10f
-
Filesize
886B
MD57f542cea5c08382ee4c5d54368e80e18
SHA1b8469bab809d966d65a1f5960df1103727605eef
SHA256a4f776b17e036c38aa125a26feafc6a36eece03441e8a7a08cacb12ca2ee0ee0
SHA512c595f0a4f0b4177dfd36e5d12b09ac2af1a0adf0be2936f8c083fcb148f9806d3048cbbe50631018d2e9a065e403ccb3bf94614b2152f23c248d4f2dcbe3924a
-
Filesize
3KB
MD56e7e197ffa13cea15434b221b96b3202
SHA15fc93dca4a33d79d8601e888daa21a1d0e02eab3
SHA256cb94aead070194af4d3b01f80ef85f227a70b5cfcfa305d26c3b42b8853ac6b4
SHA5124d294929ba55e145027107aeef135d918f2d6ec4a7e3b9fc8fc028924019d1987c12202cf37e9adf18a70a02fb321de7f060c4977de874687fc8a4d924cfb19e
-
Filesize
15KB
MD5720304c57dcfa17751ed455b3bb9c10a
SHA159a1c3a746de10b8875229ff29006f1fd36b1e41
SHA2566486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9
SHA512c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04
-
Filesize
5KB
MD5f1e9eed02db3a822a7ddef0c724e5f1f
SHA165864992f5b6c79c5efbefb5b1354648a8a86709
SHA2566dff504c6759c418c6635c9b25b8c91d0d9ef7787a3a93610d7670bb563c09df
SHA512c22b64fff76b25cf53231b8636f07b361d95791c4646787ce7beac27ad6a0de88337dcceb25b5196f97c452dda72e2614647f51a8a18cb4d5228a82ed2e0780c
-
Filesize
43KB
MD5552cba3c6c9987e01be178e1ee22d36b
SHA14c0ab0127453b0b53aeb27e407859bccb229ea1b
SHA2561f17e4d5ffe7b2c9a396ee9932ac5198f0c050241e5f9ccd3a56e576613d8a29
SHA5129bcf47b62ca8ffa578751008cae523d279cdb1699fd916754491899c31ace99f18007ed0e2cbe9902abf132d516259b5fb283379d2fead37c76b19e2e835e95a
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5
-
Filesize
4KB
MD51b446b36f5b4022d50ffdc0cf567b24a
SHA1d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9
SHA2562862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922
SHA51204ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64