d:\projects\em\branches\3.0.5.3.downadup\bin\win32\release\bitdefender deployment tool\BDDepSrv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d5aaa7097d260f23df8cbda4d31baa90.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5aaa7097d260f23df8cbda4d31baa90.exe
Resource
win10v2004-20240226-en
General
-
Target
d5aaa7097d260f23df8cbda4d31baa90
-
Size
2.8MB
-
MD5
d5aaa7097d260f23df8cbda4d31baa90
-
SHA1
8bfd12a574e5df060879b4562be6f19a3edfa531
-
SHA256
be08e5ccc32e05f3ae0e95b2984b68c6eae0aa2b0ce6025672f696c40c3acb09
-
SHA512
3460d0398c65f1c8218fe3ef515e245c9ef9cd4e07dab7c4762949ce4a47a7c9fdb7987151d9c361c64072acd6ce1a52550b2a46583ecc834c2b47051745c032
-
SSDEEP
49152:3OdWBdAXN8W2c2Ywo+8reWV237lSGsY+BGgmRAMMiu+pj/Pxh7kQpN35O:3cWTAXNrH+rWqxqY+kb0iVpj/ZmQVO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5aaa7097d260f23df8cbda4d31baa90
Files
-
d5aaa7097d260f23df8cbda4d31baa90.exe windows:4 windows x86 arch:x86
23d62a1db449a9949cb25efe9820b55b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathAppendW
wtsapi32
WTSSendMessageW
kernel32
SetEvent
FreeLibrary
LoadLibraryW
GetCurrentProcess
GetVersion
RemoveDirectoryW
CreateDirectoryW
FormatMessageW
ExitProcess
GetModuleFileNameW
CreateEventW
ResetEvent
Sleep
LocalAlloc
ReadFile
SetEndOfFile
CreateFileA
LoadLibraryA
CreateFileW
InitializeCriticalSection
SetFilePointer
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleHandleW
GetProcAddress
VerSetConditionMask
VerifyVersionInfoW
FindResourceW
LoadResource
LockResource
SizeofResource
EnumResourceTypesW
EnumResourceNamesW
DeleteFileW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetEnvironmentVariableW
GetLastError
GetWindowsDirectoryW
ExpandEnvironmentStringsW
OutputDebugStringW
LocalFree
TerminateProcess
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
ExitThread
GetCurrentThreadId
CreateThread
ResumeThread
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LCMapStringA
WideCharToMultiByte
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
user32
CreateWindowExW
ShowWindow
GetMessageW
DispatchMessageW
TranslateMessage
RegisterClassW
PostQuitMessage
FindWindowW
SendMessageW
ExitWindowsEx
MessageBoxW
DefWindowProcW
advapi32
CreateServiceW
LockServiceDatabase
QueryServiceLockStatusW
ChangeServiceConfigW
UnlockServiceDatabase
RegDeleteValueW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegisterServiceCtrlHandlerW
SetServiceStatus
ControlService
QueryServiceStatus
StartServiceW
OpenServiceW
DeleteService
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ