× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 47ac96402869b71bf2cbffc5a72f6251289c59350f7227b5ddae7039993e8361
File name: BDUSBImmunizerDropper.exe
Detection ratio: 0 / 51
Analysis date: 2014-04-19 07:36:55 UTC ( 11 hours, 58 minutes ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20140419
Ad-Aware 20140419
AegisLab 20140419
Agnitum 20140418
AhnLab-V3 20140419
AntiVir 20140419
Antiy-AVL 20140419
Avast 20140419
Baidu-International 20140418
BitDefender 20140419
Bkav 20140418
ByteHero 20140419
CAT-QuickHeal 20140418
CMC 20140417
ClamAV 20140419
Commtouch 20140419
Comodo 20140414
DrWeb 20140419
ESET-NOD32 20140419
Emsisoft 20140419
F-Prot 20140419
F-Secure 20140419
Fortinet 20140418
GData 20140419
Ikarus 20140419
Jiangmin 20140419
K7AntiVirus 20140418
K7GW 20140418
Kaspersky 20140419
Kingsoft 20140419
Malwarebytes 20140419
McAfee 20140419
McAfee-GW-Edition 20140419
MicroWorld-eScan 20140419
Microsoft 20140419
NANO-Antivirus 20140419
Norman 20140419
Panda 20140419
Qihoo-360 20140419
Rising 20140419
SUPERAntiSpyware 20140419
Sophos 20140419
Symantec 20140419
TheHacker 20140419
TotalDefense 20140419
TrendMicro 20140419
TrendMicro-HouseCall 20140419
VBA32 20140418
VIPRE 20140419
ViRobot 20140419
nProtect 20140418
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Bitdefender LLC. All rights reserved.

Publisher Bitdefender SRL
Product Bitdefender USB Immunizer
Original name BDUSBImmunizerDropper.exe
Internal name BDUSBImmunizerDropper.exe
File version 2.0.1.9
Description Bitdefender USB Immunizer
Signature verification Signed file, verified signature
Signing date 2:19 PM 10/9/2012
Signers
[+] Bitdefender SRL
Status Certificate out of its validity period
Valid from 1:00 AM 12/14/2011
Valid to 12:59 AM 12/14/2012
Valid usage Code Signing
Algorithm SHA1
Thumbrint 9572E410B5368B5FBB2BA73296EA6275AB10F92E
Serial number 08 10 55 95 FD 14 5F C9 F8 E0 59 4C 7F 02 49 B0
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-10-09 10:43:01
Entry Point 0x000F6C03
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegEnumValueW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
ImageList_GetIconSize
InitCommonControlsEx
GetFileTitleW
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
SetPaletteEntries
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
ScaleViewportExtEx
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
MoveToEx
GetTextCharsetInfo
TextOutW
CreateFontIndirectW
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
FrameRgn
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
Escape
SetViewportExtEx
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetSystemPaletteEntries
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
SelectObject
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
SetPixelV
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
DeleteObject
SetPolyFillMode
CopyMetaFileW
Ellipse
CreateSolidBrush
Polyline
DPtoLP
CreateCompatibleBitmap
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
GetStdHandle
ReleaseMutex
FileTimeToSystemTime
DeactivateActCtx
WaitForSingleObject
EncodePointer
GetFileAttributesW
lstrcmpW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
InterlockedExchange
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
CopyFileW
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
HeapSetInformation
CreateActCtxW
SetThreadPriority
ActivateActCtx
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
GetPrivateProfileStringW
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
SetCurrentDirectoryW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
GlobalFindAtomW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
CreateDirectoryA
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GlobalLock
GetPrivateProfileIntW
GetTempFileNameW
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
GetModuleFileNameW
lstrcmpA
FindNextFileW
FindFirstFileW
DuplicateHandle
GetProcAddress
GlobalAlloc
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GlobalGetAtomNameW
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
WritePrivateProfileStringW
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
LoadLibraryExW
CloseHandle
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
GetLongPathNameW
IsValidCodePage
HeapCreate
WriteFile
CreateProcessW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
DragFinish
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
RedrawWindow
GetForegroundWindow
SetWindowRgn
SetMenuItemBitmaps
DrawTextW
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
DrawIcon
GetMessageTime
SendMessageW
SetActiveWindow
GetDC
GetAsyncKeyState
ReleaseDC
GetDlgCtrlID
DefFrameProcW
UnregisterClassW
GetClassInfoW
DefWindowProcW
SetMenuDefaultItem
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
TrackPopupMenu
GetTopWindow
GetWindowTextW
CopyAcceleratorTableW
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
GetKeyState
OpenClipboard
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
GetMenuState
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
EnumDisplayMonitors
GetCursorPos
PeekMessageW
TranslateMDISysAccel
InsertMenuItemW
SetWindowPlacement
CharUpperW
LoadIconW
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetClipboardData
GetIconInfo
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
DestroyWindow
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
DrawFocusRect
GetScrollRange
SetTimer
GetActiveWindow
GetKeyboardLayout
FillRect
MonitorFromPoint
CreateAcceleratorTableW
GetSysColorBrush
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
GetMenuItemInfoW
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
LockWindowUpdate
IsIconic
BeginPaint
OffsetRect
DefMDIChildProcW
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
MapWindowPoints
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
DrawTextExW
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
GetKeyNameTextW
CheckDlgButton
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
PtInRect
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateMenu
GetDlgItem
RemovePropW
BringWindowToTop
ClientToScreen
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
DestroyAcceleratorTable
GetDesktopWindow
IsDialogMessageW
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
GetClientRect
NotifyWinEvent
GetMenuStringW
EmptyClipboard
CreateDialogIndirectParamW
MapDialogRect
IntersectRect
SetLayeredWindowAttributes
GetScrollInfo
HideCaret
CopyRect
GetCapture
ScreenToClient
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
GetMenu
UnhookWindowsHookEx
SetRectEmpty
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
DispatchMessageW
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
ShowScrollBar
WinHelpW
LoadBitmapW
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
SetWindowsHookExW
ValidateRect
IsRectEmpty
IsMenu
GetFocus
EnableWindow
CloseClipboard
IsWindowVisible
SetCursor
SetMenu
TranslateAcceleratorW
PlaySoundW
DocumentPropertiesW
ClosePrinter
OpenPrinterW
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
CreateStreamOnHGlobal
OleLockRunning
CoCreateInstance
CoInitialize
CoTaskMemAlloc
CoInitializeEx
IsAccelerator
CoCreateGuid
OleTranslateAccelerator
OleCreateMenuDescriptor
CoLockObjectExternal
OleDestroyMenuDescriptor
DoDragDrop
ReleaseStgMedium
CoUninitialize
RevokeDragDrop
OleGetClipboard
OleDuplicateData
CoTaskMemFree
RegisterDragDrop
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 13
RT_ICON 8
RT_DIALOG 3
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 60
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.1.9

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

InitializedDataSize
701952

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Bitdefender LLC. All rights reserved.

FileVersion
2.0.1.9

TimeStamp
2012:10:09 11:43:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
BDUSBImmunizerDropper.exe

FileAccessDate
2014:04:19 14:14:54+01:00

ProductVersion
2.0.1.9

FileDescription
Bitdefender USB Immunizer

OSVersion
5.1

FileCreateDate
2014:04:19 14:14:54+01:00

OriginalFilename
BDUSBImmunizerDropper.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Bitdefender LLC

CodeSize
1155072

ProductName
Bitdefender USB Immunizer

ProductVersionNumber
2.0.1.9

EntryPoint
0xf6c03

ObjectFileType
Executable application

File identification
MD5 c974343ed2ede2304b85f5b30f88785d
SHA1 99f2bf64f9f0ab4470b363dbd6e8b1dbcd9475af
SHA256 47ac96402869b71bf2cbffc5a72f6251289c59350f7227b5ddae7039993e8361
ssdeep
98304:zrjhl8moQ83/SECnH7Adt2CbEN5oQhkwJPxX9PPz1PdtLLWt6e:zMIHqnO5oQhkwJLz1FtLWMe

imphash f9d2c445816ebc68b164dc5c39f99561
File size 3.9 MB ( 4071672 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (78.5%)
Win32 Executable (generic) (11.3%)
Generic Win/DOS Executable (5.0%)
DOS Executable Generic (5.0%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed

VirusTotal metadata
First submission 2012-10-09 17:53:17 UTC ( 1 year, 6 months ago )
Last submission 2014-04-18 19:52:43 UTC ( 23 hours, 43 minutes ago )
File names BDUSBImmunizer.exe
BitDefender USB Immunizer.exe
test.exe
BDUSBImmunizer2019Launcher.exe
BDUSBImmunizerLauncher.exe
2543879
bitdefender-usb-immunizer.exe
BDUSBImmunizerLauncher (1).exe
B.exe
BDUSBImmunizerLauncher.exe
حل مشكلة فيروسات الفلاش ميموري.exe
download.php
BDUSBImmunizerLauncher(Chong virus Autorun).exe
bitdefender BDUSBImmunizerLauncher.exe
bdusbimmunizerlauncher.exe
BDUSBImmunizerLauncher.exe
USB immunizer.exe
output.2543879.txt
file-4793921_exe
Bitdefender USB Immunizer.exe
BDUSBImmunizerDropper.exe
BDUSBImmunizerLauncher.exe
BitDefender USB Immunizer 2.0.1.9_rasekhoon.net.exe
le logiciel BDUSBImmunizerLauncher.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.