× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: adb63fa734946d7a7bb7d61c88c133b58a6390a1e1cb045358bfea04f1639d3a
File name: Bandicam_Setup.exe
Detection ratio: 42 / 61
Analysis date: 2017-05-16 17:34:50 UTC ( 6 days, 13 hours ago )
Antivirus Result Update
Ad-Aware Dropped:Trojan.Generic.20494296 20170516
AegisLab Troj.W32.Gen.m119 20170516
ALYac Dropped:Trojan.Generic.20494296 20170516
Antiy-AVL Trojan/MSIL.Disfa 20170516
Arcabit Trojan.Generic.D138B7D8 20170516
Avast Win32:GenMaliciousA-HHW [Trj] 20170516
AVG Generic38.BFLD 20170516
Avira (no cloud) TR/Dropper.MSIL.dvazj 20170516
AVware Trojan.Win32.Generic!BT 20170516
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9901 20170503
BitDefender Dropped:Trojan.Generic.20494296 20170516
Bkav HW32.Packed.1FE2 20170516
CAT-QuickHeal Backdoor.Bladabindi 20170516
Comodo UnclassifiedMalware 20170516
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170130
Cyren W32/Trojan.ZULO-8589 20170516
DrWeb BackDoor.Bladabindi.13678 20170516
Emsisoft Dropped:Trojan.Generic.20494296 (B) 20170516
Endgame malicious (high confidence) 20170515
ESET-NOD32 a variant of MSIL/Kryptik.HFU 20170516
F-Secure Dropped:Trojan.Generic.20494296 20170516
Fortinet W32/Disfa.HFU!tr 20170516
GData Dropped:Trojan.Generic.20494296 20170516
Ikarus Trojan.MSIL.Crypt 20170516
Invincea trojan.win32.coinminer.aq 20170413
K7AntiVirus Trojan ( 004faeb31 ) 20170516
K7GW Trojan ( 004faeb31 ) 20170516
Kaspersky Trojan.MSIL.Disfa.kwvg 20170516
McAfee Artemis!016CA2543792 20170516
McAfee-GW-Edition Artemis 20170516
Microsoft Backdoor:MSIL/Bladabindi 20170516
eScan Dropped:Trojan.Generic.20494296 20170516
NANO-Antivirus Trojan.Win32.Disfa.emmlmo 20170516
Qihoo-360 HEUR/QVM42.0.2F69.Malware.Gen 20170516
SentinelOne (Static ML) static engine - malicious 20170516
Sophos Mal/Generic-S 20170516
Symantec ML.Attribute.HighConfidence 20170516
TrendMicro TROJ_GE.8A994FF5 20170516
TrendMicro-HouseCall TROJ_GE.8A994FF5 20170516
VBA32 Trojan.MSIL.Disfa 20170516
Yandex Trojan.Disfa!iabkxz/DLdQ 20170516
ZoneAlarm by Check Point Trojan.MSIL.Disfa.kwvg 20170516
AhnLab-V3 20170516
Alibaba 20170516
ClamAV 20170516
CMC 20170516
F-Prot 20170516
Jiangmin 20170516
Kingsoft 20170516
Malwarebytes 20170516
nProtect 20170516
Palo Alto Networks (Known Signatures) 20170516
Panda 20170516
Rising 20170516
SUPERAntiSpyware 20170516
Symantec Mobile Insight 20170516
Tencent 20170516
TheHacker 20170516
Trustlook 20170516
VIPRE 20170516
ViRobot 20170516
Webroot 20170516
WhiteArmor 20170512
Zillya 20170516
Zoner 20170516
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-03-31 15:09:55
Entry Point 0x0000315D
Number of sections 5
PE sections
Overlays
MD5 078f47bb47d6b48183664f2291ef7546
File type data
Offset 101376
Size 9461887
Entropy 8.00
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
GetTickCount
CreateDirectoryA
GlobalUnlock
LoadLibraryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
SetFileTime
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
ExitProcess
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
DestroyWindow
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
LoadImageA
GetDlgItemTextA
DialogBoxParamA
MessageBoxA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
BeginPaint
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
CharNextA
CallWindowProcA
EnableWindow
CloseClipboard
SetCursor
ExitWindowsEx
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_ICON 4
RT_DIALOG 3
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2007:03:31 16:09:55+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
23552

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
165376

SubsystemVersion
4.0

EntryPoint
0x315d

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
1024

File identification
MD5 3d469341dacc5a52b73503cf6a8f02dc
SHA1 864ae4f2fc6919959ec0bd614ca5ef10e85eb36b
SHA256 adb63fa734946d7a7bb7d61c88c133b58a6390a1e1cb045358bfea04f1639d3a
ssdeep
196608:krdeCHdHxFMye7dnGj7hrVLB52qj9TCZY6Rbdp0Mxa:SdeuVxkdGfJVLf/yY0bdy

authentihash e011597cd49fdb1042c013aa65a84f94d4790f6847ab8e9d9d9ed9e7e2130bed
imphash 4d17be67c8d0394c5c1b8e725359ed89
File size 9.1 MB ( 9563263 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2017-05-16 17:34:50 UTC ( 6 days, 13 hours ago )
Last submission 2017-05-16 17:34:50 UTC ( 6 days, 13 hours ago )
File names Bandicam_Setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications