bitdefender_antivirus.exe

Bitdefender SRL

This is a setup program which is used to install the application. The file has been seen being downloaded from download.bitdefender.com and multiple other hosts.
Publisher:
Bitdefender SRL  (signed and verified)

MD5:
6881bec396e9e5ed9df5d26fdb935b8d

SHA-1:
bc58d167add35bdb16fef6c20ad43c08b102b51c

SHA-256:
8dd06852b527bddafedb0e355a303c0353c554fa3ac892b8bd6e5a9961be8b16

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 2:44:12 AM UTC  (today)

File size:
9.5 MB (9,963,384 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\bitdefender_antivirus.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/8/2015 6:00:00 PM

Valid to:
3/9/2019 5:59:59 PM

Subject:
CN=Bitdefender SRL, OU=PD, O=Bitdefender SRL, L=Bucharest, S=Romania, C=RO

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3DB29A3651F3F5E49CE079D283957630

File PE Metadata
Compilation timestamp:
6/6/2014 6:29:14 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
196608:TNtuq/OpoXV+2fVxdApGlwEXyerPSwtQAsz9R8aMj4kRTMFOZBeaGA:Tjuq/OpoXV+2fVxxWdAgB0B9MFoOA

Entry address:
0x1D41B

Entry point:
E8, 5D, 64, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 7A, FC, FF, FF, C7, 06, F0, B1, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, F0, B1, 42, 00, E9, 2F, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, F0, B1, 42, 00, E8, 1C, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 86, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Entropy:
7.9804  (probably packed)

Code size:
161.5 KB (165,376 bytes)

The file bitdefender_antivirus.exe has been seen being distributed by the following 2 URLs.