Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1559s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 17:24

General

  • Target

    bdcamsetup.exe

  • Size

    31.5MB

  • MD5

    cbb2dc1b64c5a21da53d79f0ad2e1bdb

  • SHA1

    b2e411fcbccedef4d3a64133aff5d5502291b24f

  • SHA256

    5aa1234eb23bef8628cdc9189879d629b418cd1d176c99c024a15c3bfe5e413a

  • SHA512

    73391f29a027f1184d2ed673667b86bd96eaf97df94e4fc13c03ec8913c9ff36f3a549b7a4f79f67755cdd8f61fe906e61de1559dd884f2623add72413b4841c

  • SSDEEP

    786432:fmDBQyG/qdx5SFTFI/Xoa74EJCvBLRUH0PYNr/h4vW:+D0qd/SFTFIcGyIpr/v

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdcamsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\bdcamsetup.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:236
    • C:\Users\Admin\AppData\Local\Temp\BDMPEG1SETUP.EXE
      "C:\Users\Admin\AppData\Local\Temp\BDMPEG1SETUP.EXE" /S
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\regsvr32.exe
        "regsvr32" /s "C:\Program Files (x86)\BandiMPEG1\bdfilters64.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\BandiMPEG1\bdfilters64.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2124
    • C:\Program Files\Bandicam\bdcam.exe
      "C:\Program Files\Bandicam\bdcam.exe" /install
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk64.dll",RegDll
        3⤵
        • Loads dropped DLL
        PID:1816
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe" "C:\Program Files\Bandicam\bdcamvk32.dll",RegDll
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1848
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.bandicam.com/f.php?id=eng_app_complete_install&v=2&lang=en
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1140
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275471 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1772
  • C:\Program Files\Bandicam\bdcam.exe
    "C:\Program Files\Bandicam\bdcam.exe" 0x0001A5D3
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BandiMPEG1\bdfilters64.dll

    Filesize

    4.6MB

    MD5

    13f7a29baa1e04f74151737cb71bd0e5

    SHA1

    0bc8682c6c96923a729aa6239aa53d95221b13ab

    SHA256

    008fababd36e8fbfd5f610a2c62d47963e78ec91e54ad69a1e20807445c3528d

    SHA512

    4cea11e88e8861c4094b227d85295c0d67452af703b0ec9dfe475797b87d03b40bc1f6b58dcc00996672c1c05d99b82dcc067bc429a1465ae90f4ec966f2bca8

  • C:\Program Files\Bandicam\bdcamvk32.dll

    Filesize

    1.5MB

    MD5

    9051ce47609c3670afedce797b9cc1c3

    SHA1

    6e7929058c8e011b1ac24e72f5c32570fb17b2b6

    SHA256

    07cfb828516e8ab690933df6012c97375b2825fa8784965eab2a4198b9b290da

    SHA512

    8f6712cbc68bdfb1c2b33a6231e33c57d476f20fe05299a22e95e6f47c4115a86efb750a97970aaec5132f99ff073aaa358fba63835fc1e3ef2cbce0a5009922

  • C:\Program Files\Bandicam\bdcamvk64.dll

    Filesize

    1.9MB

    MD5

    f488d01d37cdab9bbecf59632343f12f

    SHA1

    7d2914422378a17fa0551b71336a053e94d5a1c7

    SHA256

    7e3f8e9cb1c074af15384312568ff9b181cebcc452756d229adfd22fb163a1eb

    SHA512

    b605ba7aa17fe43a389061a77e21791845dccd55ca8a2e98cd38e0f730fe73560014de57f9069ae93906dd215c63b4f53b64b63849cdbdc13dce71052d7824b2

  • C:\Program Files\Bandicam\bdcap64.dll

    Filesize

    21.2MB

    MD5

    7214c7b4d2064db6827e2c3308a740de

    SHA1

    45bc92de40161252010dbde86a6637f34bcc46cb

    SHA256

    a7c59f782bc88f2fa39d7e7c8ec2fd2189325eb70c9e4b2dea1434cad1b768bc

    SHA512

    ef0ca3b5cdb5980586d886fa091efd67a51f031764628df01f3f7afb21c26484823bd86a6d29f2434b55fc766e101d80a1197d186404fe332fb1b4b0156700b6

  • C:\Program Files\Bandicam\data\language.dat

    Filesize

    97KB

    MD5

    1a2907234b069c1e52ad296bceb630f0

    SHA1

    202f189aa148ab080225c6fb351b5e664847f8ea

    SHA256

    789704bfc14da7326bb4756b7339026d8915914905e821d57a69804b11a27bf0

    SHA512

    27a8b36ccf0353cb0fc41d1b41f0c66cfe7c41e95a79918498051c1c70b08d9a76ca0c9ca3f5361bf12a5f26be919766a84831ed4171690ab545f68c88612c85

  • C:\Program Files\Bandicam\data\skin.dat

    Filesize

    886KB

    MD5

    2ebf0e7158b899a32ac072cc7d5f8d9b

    SHA1

    1b677c3e9fda3593f1fcbcc4b429800f06f3d5f7

    SHA256

    1814cfd6c5b79f65880fad7558a1cef35fd5f8f1f06f60e61945b58ab29f6ecd

    SHA512

    4b3fe1e6737296216e81b750ccac01a3ce77848fc7f6cb9344ea7ff6c352b988e8c8fe889ad7a850285e8b0fed90808aca12bfbcab206c4fdecb4b3b3f085e8d

  • C:\Program Files\Bandicam\lang\English.ini

    Filesize

    135KB

    MD5

    4eaf9f783fe06f5ed362cdcf735687af

    SHA1

    28a76602a253fc165c83a8026037bbb8d4594242

    SHA256

    a6b5b9dbfb7a51aa91cea093e05699b28b55c92878b04887c72d7a23cfcb07b3

    SHA512

    286db775c95c171cbd4adde118b7af7616530ffeb4d337069b323f73ae966e2de9a75934a1af80c7f103c954c838e8e56acf020c21f65aa789a77bb9fb1ff0e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43039a2b82bf44ac09385256bcfcfc3c

    SHA1

    dd456e401bce477941228abf3001648654aa8f84

    SHA256

    e45d8cf18e8dd9351f38b5917f29962fbd036ac5d46b7c3e5db7ff1cf5ffc81a

    SHA512

    b38ad38951164e48b930a2e27f1dff3d14e0e10e85ed85cd6a5fcc74244c183d0cc017e97196e0fa0127c4e0af519602e6d34bc3bb228b184c78173435c28d90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b91a9d8d7883d2c1bc1660766643ebb6

    SHA1

    4543baea01a16d80aca44d2d4b9268c5699a963e

    SHA256

    7ef9d551d90ef9f84e51a0feb2a5df0d3cad4a074ff4388c23001f10c9a27a68

    SHA512

    987b5fb4debf80595dc9f93f9899c2ad3a2fea40302999a24358cf3ee064c13bb1a58ede5fa6022d8bd170ccf81d49fe9345d4ecf726d5766b9cf9aea3bc3d57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cd31701afc6b656478c5e81330ebdbc

    SHA1

    ca412b9d23d721b6f94f4002edc0d3b8339ce794

    SHA256

    c8d13ecbdc59f650c13029326a837fb3decd39427dac8b24be0ca4ef1032b01e

    SHA512

    a137631e3e426d05b7b9c5540e13d5343fe0cb936a0ed5b95568f429f0f755f1afa0619add25f2f81e7b1e6b33f2eeb989921841a09be2a17b5eba8af702d0f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39189b272d5668924d60813951fdf69f

    SHA1

    cd333c3ba4a81647e1ebfcd578dcac9a9783f242

    SHA256

    01e0c07cab79e5bbe56b0125156e393f537606e0157e7358f0e92c3596d7f5b8

    SHA512

    b3fa52f765f2827ebba1693489e74fdfad75c2ec6330fcd05cea2cf7b57954720b9274c5f27cccc4ecb11e9baf6556ae3c7bf50763628ce34aad492c3dcd1df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2372a47753cd8810c143834698c7c3a1

    SHA1

    3bfe13c338a430db8c89d5cca48f819526bb28b7

    SHA256

    7d553194953f3ae07fe49baaaa82d75bddfc317ebe32dc7e5d9935d641a95d1c

    SHA512

    d010132971fca2fce651be226b3f5c88624f279089251e9f4373ab4660c161e116ce64a2f77c4bd4e3ef9d6800ad9b7f4e4244ce0d775c038353edd95c811b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7af94d83c23690cf6f99e11d5aa3cab

    SHA1

    8f6ff890fba362da4c1ee21bbf3a7b52c006f7ec

    SHA256

    ee3e0cbaa720feb8f1317a825cfd7b0ceae1687046ce2e6be5591c217b4f5ea3

    SHA512

    8939cff5dc615fd4926dbc6b7d2909ceafcd72a9fd6abacb4ccd7a7a58b6feae006eb0242a94aa4b1355a0f4fe53f6b41c20781dec5522cac82fd33223236f75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    650dce6bcc540b413fae0655bfea95dd

    SHA1

    32be869c4a7dc7c91c4e3cafa5c8a7ec02e710e1

    SHA256

    8b21035097d6853658ad2ef3398ef80e00a14891698c94a44f824c2e0f1476ae

    SHA512

    0f3e062539e0443f00a0b6d71d4e8003143d9fa6058b159805a56bfcd8a4a32bb4298ee0e429681d16c6ca719227b81809b2a0c0e3b5cb3c12e6e8dca167524e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff9cdfe1839038757a106baa97088871

    SHA1

    90bac13520b97290ebad26c62afd7d73f3e380a9

    SHA256

    ec2f2d0ba9f138b5ea80aac2bc108efdd41733abd3c2dd775c0d3e4bd3cd8bce

    SHA512

    41ef7807592ae2cc97b947ba37cbe9c43b2083431cb0a7062f35aae487739bc351b500a67dc5e4b413263e17d9ffaf4beb101e4bfbdcb1de99d1bf4fec5e365f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    deac5269bf5bb01176404dec5df5a130

    SHA1

    dca41123d3ec4343cce4ed923c8e575815a5232d

    SHA256

    5514e1ae8e70fe42ef4a2b1cc429ae915668e9c4388a9cc6f9a7fcae26ac3d72

    SHA512

    9b90cf2b4ff87cf4886d7be1a5ba3ae680c7996fd214efaa3d1d932a87cbce2a1226c19e98efee8f850f1db99941e31814e7386ee088f3217af7eb64deaa248c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b75ef914b2dab256f46bb90f2898b3e

    SHA1

    ecf258157e811bbb999b5759d0c63175e5e9d346

    SHA256

    413edd9ecb187f694080b8027f2fdf2f2f0b7e3435d3287da814fa9a6b83667b

    SHA512

    74f1b3bc88d736ecd00f49221734438ddd4d052ccfb506e4a7fc0def8a4e32cd6e2135714f3d4cd8bf8ad90dbcd919cdee8700b08c372d41081c685294c8ef23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c49f3697331d7f38885a1a69aeefc5a

    SHA1

    f96e2d0fa73c3e60acdabbca79ee4b891d3b0aec

    SHA256

    0074a6602a7bf6bb7a95fa4cd4e0f02599eb1c0f9f32cfa10b52c81a8b239573

    SHA512

    f8d8a999a6558d13558ffebc75935083349473869ac3493fab6e67ce9d2c0cf72296ee205bb5cd0acb8442d88262f6c461f0f135ea3c8edf3f6824d166953067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea1166920ca26b8dc763f2182c561924

    SHA1

    3cdb3cfb9ecc7f480caa69961b51bf7d1db466f9

    SHA256

    829c39227b7478a81882737740b1e26ee9c313ed5b13f9a9177fa78c0b22e56b

    SHA512

    521af395aef12a37453536434f2e41df0efff28d2249cb70b139f592f1b78895060e3e8ebab5ca69e59805264eb04c9333babbcaf6a7be2ab8c19655f8fd74a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bbf895b49f961ae3544da062b273acf

    SHA1

    6f0ad684afdf1bd80e0fa1983a36043f96ab5bdc

    SHA256

    cb37250d11f6995c6d09cf905dbcef38b603fb2d0dd8c6de6843e326ab6e8a23

    SHA512

    3a126d2ff8da8b6c532672eeb2d69e7bfaaf1ba89fa3e566b561f4cdf21d625b522c0a9567e500c23cc447c444a4569c54d7e39b0b388ea0187d3dcaa16f64c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ec8a43257522eb13e2d84a8b372a8f5

    SHA1

    a729602ec447436874be24266f8eeb0bb7cbb170

    SHA256

    f58e042979c06c6c2621139c8e1a11a6222425502e115bc8fdc5fd6069eab74e

    SHA512

    33ff28af8434f1ac1546bbab4fa7d56f99a5d9853e7c2813734ec09fc047de945af0e7e29611664c2ad874a02d344d445e771fea4c3411ce0cd46f097db5e654

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e07c7aa3a0c5fd4d5a551acefdc54b86

    SHA1

    1e0fc9ad383df6cbc02e01ac5604733148fe4205

    SHA256

    46c8188429169bce1e254d9072a8a90f567faa85081903786f8b56bd252733ee

    SHA512

    98393f0f8564d98fe4ddd0d0c097863075fe5256cf32704e1c09bb0dcc4f4d4feb47ceacc6e9ad370b845845018f2b8fb5d5d61c405031f44cb8d1aa06780a2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4c25fbf7449b37f78d8eaef241c2d99

    SHA1

    7e891dce981e66e8f0e5cf77f96b1905cef8b4f2

    SHA256

    70089e648ef974a6a2767f876763ee7533afb08ff4ebac2f92b14044e63c5036

    SHA512

    741ca0b6c3b4e9bf8eb10a16c855b5466e1b2181f97d543fa875446567263d13dc4b7ef3184c05f809b06110e418551c633327db4d6d500597bcf6cf128eb0a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abe2d11b55bc83faca8f434565415ced

    SHA1

    92675012018fcf22a9a30093604b37e8faad69b0

    SHA256

    24c1ac6e4330ab2dd2e97269e24d7e3dab93d495a08a07f0a581ba0ebd85c18e

    SHA512

    37981ee4996aa32e7c20e99bbc1aaa22015c65ec1314c534cc1adc6511e36cc62d52fc9bd1dfc2418bcf772d879856d6226924173f740a172b10e2f23338b91b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f1515398e2a4a483998e7e041901e76

    SHA1

    04fd32e1a448424a4fcd5971f65cc871c177ae28

    SHA256

    6082888f3ce91f4771c4993bdece357f6cd9e442345eeed9abb4e6067180fe55

    SHA512

    7e5424c37c4f5412dac1381939948c1529c6051ec72483ef3ab6394a27f194bd5c4aa6b6857d16f81a08be8a51bbe3ace1ebc0aab779b53cb79155da80c275a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    287b217be3a6991816692df04dbbc88f

    SHA1

    9688f0cab0a7b798a7e8f9fac5be4eb75f27c475

    SHA256

    457340ab59660ab13f5eed6c133bfbe3481938840a973927dae291a0ba3bf127

    SHA512

    1d02474979769310299e5badda2e3bad96f3f8f12022c6eb5a37b95469980ace612ed9b386fabb5ea357b37fddebe01f85dc89c54a8b478aa4dcffd24ade6213

  • C:\Users\Admin\AppData\Local\Temp\CabADB0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAE30.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nso2E23.tmp\ShellExecAsUser.dll

    Filesize

    43KB

    MD5

    552cba3c6c9987e01be178e1ee22d36b

    SHA1

    4c0ab0127453b0b53aeb27e407859bccb229ea1b

    SHA256

    1f17e4d5ffe7b2c9a396ee9932ac5198f0c050241e5f9ccd3a56e576613d8a29

    SHA512

    9bcf47b62ca8ffa578751008cae523d279cdb1699fd916754491899c31ace99f18007ed0e2cbe9902abf132d516259b5fb283379d2fead37c76b19e2e835e95a

  • C:\Users\Admin\AppData\Local\Temp\nso2E23.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    58a9cb88ef48da73e51968fd08e72fc5

    SHA1

    48d072b7d523f54320bfac847306b08f8b9dea38

    SHA256

    eca4b66ded0c2c81db9f10200bb318ae82f5b4f7fdfd60561b1ca399ccb1d1f7

    SHA512

    14ff96b6a5480352e47163c08219fe65a84662ec9ef8b3b954c0eee3e748151746824498a9e6e1e7b30ad44976d3b66e10955f025f9ac98cf5aa24d97c99f845

  • C:\Users\Admin\AppData\Local\Temp\nso2E23.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    7b6e59deb9e156823332c1d331069de5

    SHA1

    cc2464df37b5a63279835715c852ca162668a684

    SHA256

    e0ba462c6d500a5444bb6d7dfbde0d461d262255945da9b3d50fd6a9ecec6e1c

    SHA512

    7df8b59b6f8b06b5fb9c929136a812dee1fa686d968a2061726a1cc9dabac0016e8cc7a163caaa589a55e900fb197b66a27256f2343d88bf2a78087c292638be

  • C:\Users\Admin\AppData\Local\Temp\~DFE24F8BCDAE6FDF9C.TMP

    Filesize

    16KB

    MD5

    0cf850e53a134686c6d0d73b97df2717

    SHA1

    d1a726d4d3349fc01eadf9c022871a8aeed017a5

    SHA256

    76ffc21f94493417a47b06837d48dc4ca0809731c5144254aee1eab566fc2c81

    SHA512

    78efd39041ae6f30ce6f6404c331fe9795063b096d98ab7e73991fb4735a4d852acf7671ad810d509d6de98a1c6b64f109c24ffc80336b7286b368efbfc67b18

  • C:\Users\Admin\AppData\Roaming\Bandicam Company\BANDICAM\version.ini

    Filesize

    88B

    MD5

    af923cd9678eb10e4da1cbeb74413bf0

    SHA1

    7c1461527d2dc58884294cf6b9f70a85caf24390

    SHA256

    b3dfab5d1b753121252c149284465ba1c1651e3af1e80ce2ed5b7e7cd84efb7d

    SHA512

    c2905935c2945daee449f81f76254f18766dcbd4f18c832acc91728e996e60399ff0dff8d09f2aab9dc5ff477a094aa109ad8e01d98f98dca749b60a67cd7921

  • \Program Files\Bandicam\bdcam.exe

    Filesize

    13.4MB

    MD5

    995a92cc9018419ee100c0f19f40fc7f

    SHA1

    6a6347ac627a9fd035945c4a22b30a6d089a070a

    SHA256

    a8c3439c80e27c0a9eea4c13dd0fc263476a9d39ac7b0d3278be62e6e14f9ec0

    SHA512

    47ecd16b5d7fa1fdaedaebc075d5f12a6fed150e5309139a2d3c0559a04ced202788d24f252e7b0a775682adf90444cb1ad8be643f145dc91ab47ede55c00935

  • \Program Files\Bandicam\bdfix.exe

    Filesize

    3.5MB

    MD5

    f2e8726551d0700e627609fe2ba536da

    SHA1

    4144c862d8c9b82e3e734bbc72f4a8ae37ca3086

    SHA256

    a4f3a6df37e7fafe48dc7bb610f7525ae728b83a1acfb6837dd38e21be7e6d9c

    SHA512

    98262c569e63928a950be50260d4f8a47278fc9bbe1774eabf05af99af5384be2121fd0b7b5641083e37d2af6c15c32e940bbd1fa22908ec87959c98de3fd857

  • \Program Files\Bandicam\uninstall.exe

    Filesize

    174KB

    MD5

    82fde2252e6011362c52fa4f5e837348

    SHA1

    f8ffcdcb1faf46b9d21ad3aa7e82f80a318f5032

    SHA256

    0ff2cb8e8f79350255dcabc9572b6e518f368a8a181e6eb649a7b15fd285aa0b

    SHA512

    4bb4f696be45fb61ea0c02c3f95d5807eaf22f7358a8bf852228e3dd4e58dc6e3cf44c19077b41a97d27ce2e65806ac7e6419a215737d3779108ef076a848626

  • \Users\Admin\AppData\Local\Temp\BDMPEG1SETUP.EXE

    Filesize

    1.4MB

    MD5

    461d135a4fccd51bbae38f742e123fd3

    SHA1

    c12a442fbcd4a9c44102f0a560ba03d59bc501ed

    SHA256

    4c441e7d744a2a273f780103bcf5bcb1e32c2d9c6a32b62f9044b32107544079

    SHA512

    41eb816bf0cc0ca12b5c6c07517cd718b8701255ea81e94ffc937f2538b8cdf5db24751cdbc22fefd6496b767fc0d631fea76216b0363f4b625557097b3caaee

  • \Users\Admin\AppData\Local\Temp\bdfilters.dll

    Filesize

    4.1MB

    MD5

    ed730387fdcd684b756601b863c47417

    SHA1

    c49ed6d0d46facf4ceaeb21f5d6bfdf9e3587fde

    SHA256

    9cbc29696ad2d582e251bf9c4be5cce618753fa43551d2474e1ae5cc5e1245e5

    SHA512

    e32df727799d33922c6e92f94a7bdb0bc2772d6a6636d15e285d94d3ae4661062e5bc89ec3546b76ec853398f88d972f461327ef687f89093acf1096560d5c3f

  • \Users\Admin\AppData\Local\Temp\nso2E23.tmp\Dialer.dll

    Filesize

    3KB

    MD5

    6e7e197ffa13cea15434b221b96b3202

    SHA1

    5fc93dca4a33d79d8601e888daa21a1d0e02eab3

    SHA256

    cb94aead070194af4d3b01f80ef85f227a70b5cfcfa305d26c3b42b8853ac6b4

    SHA512

    4d294929ba55e145027107aeef135d918f2d6ec4a7e3b9fc8fc028924019d1987c12202cf37e9adf18a70a02fb321de7f060c4977de874687fc8a4d924cfb19e

  • \Users\Admin\AppData\Local\Temp\nso2E23.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    720304c57dcfa17751ed455b3bb9c10a

    SHA1

    59a1c3a746de10b8875229ff29006f1fd36b1e41

    SHA256

    6486029d3939231bd9f10457fd9a5ab2e44f30315af443197a3347df4e18c4e9

    SHA512

    c64c161290f5c21d642ecf16cc6ad3ee4a31bf5bab41c65c74907a5c158eaca429ef99cd8d2b55dc2ecb8478bb0b85c1576402389a07568f36c871b2772ead04

  • \Users\Admin\AppData\Local\Temp\nso2E23.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    f1e9eed02db3a822a7ddef0c724e5f1f

    SHA1

    65864992f5b6c79c5efbefb5b1354648a8a86709

    SHA256

    6dff504c6759c418c6635c9b25b8c91d0d9ef7787a3a93610d7670bb563c09df

    SHA512

    c22b64fff76b25cf53231b8636f07b361d95791c4646787ce7beac27ad6a0de88337dcceb25b5196f97c452dda72e2614647f51a8a18cb4d5228a82ed2e0780c

  • \Users\Admin\AppData\Local\Temp\nso2E23.tmp\System.dll

    Filesize

    11KB

    MD5

    17ed1c86bd67e78ade4712be48a7d2bd

    SHA1

    1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    SHA256

    bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    SHA512

    0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

  • \Users\Admin\AppData\Local\Temp\nso2E23.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • \Users\Admin\AppData\Local\Temp\nso7438.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • memory/236-464-0x0000000000770000-0x0000000000772000-memory.dmp

    Filesize

    8KB

  • memory/844-250-0x000000013F860000-0x00000001405C9000-memory.dmp

    Filesize

    13.4MB

  • memory/844-249-0x0000000077A10000-0x0000000077A12000-memory.dmp

    Filesize

    8KB

  • memory/844-245-0x0000000077A10000-0x0000000077A12000-memory.dmp

    Filesize

    8KB

  • memory/844-247-0x0000000077A10000-0x0000000077A12000-memory.dmp

    Filesize

    8KB

  • memory/1968-496-0x000000013FDE0000-0x0000000140B49000-memory.dmp

    Filesize

    13.4MB

  • memory/1968-944-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1968-945-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1968-495-0x0000000077A10000-0x0000000077A12000-memory.dmp

    Filesize

    8KB

  • memory/1968-499-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1968-497-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1968-498-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB