15c2c5563ecce2750920903749ce86e7

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2020-Dec-17 20:38:59
Detected languages English - United States
Debug artifacts d:\build\ob\bora-17337674\bora-vmsoft\build\release-x64\tools-for-windows\Win32\services\vmtoolsd\vmtoolsd.pdb
CompanyName VMware, Inc.
FileDescription VMware Tools Core Service
FileVersion 11.2.5.26209
InternalName vmtoolsd
LegalCopyright Copyright © 1998-2021 VMware, Inc.
OriginalFilename vmtoolsd.exe
ProductName VMware Tools
ProductVersion 11.2.5 build-17337674

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Looks for VMWare presence:
  • VMTools
  • VMware
  • vmtools
  • vmware
May have dropper capabilities:
  • CurrentControlSet\Services
Miscellaneous malware strings:
  • Backdoor
Suspicious The PE contains functions most legitimate programs don't use. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryW
Can access the registry:
  • RegCloseKey
  • RegNotifyChangeKeyValue
  • RegOpenKeyExW
  • RegCreateKeyW
  • RegSetValueExW
Interacts with services:
  • CreateServiceW
  • DeleteService
  • OpenSCManagerW
  • OpenServiceW
Info The PE is digitally signed. Signer: VMware
Issuer: DigiCert Assured ID Code Signing CA-1
Safe VirusTotal score: 0/67 (Scanned on 2021-08-31 22:44:02) All the AVs think this file is safe.

Hashes

MD5 15c2c5563ecce2750920903749ce86e7
SHA1 31387d847f5d95e09cf0663a1613080d03334338
SHA256 a71381884650121af2872a547c75d7a956bcf9c8916ece9b11f713519cbafb0c
SHA3 9d37438b32c38ebd18f89c2a9f5d36c3f7cb6eb9e62d228ce1dcd487b814498e
SSDeep 3072:TUpw3WVp2q8JaKvR80RP3TqbrG4icWRHAHbliK9:TKzTW8KvR80R7qWCW1AHbp
Imports Hash f7c621b502236dfa129a64851c102a86

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x120

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2020-Dec-17 20:38:59
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0xa800
SizeOfInitializedData 0xd000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000000000000A3B0 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x1c000
SizeOfHeaders 0x400
Checksum 0x1bf0f
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 bdec5258a6210eb8ca565aa6f3422d68
SHA1 585e3c77aa95257137dcdf65117f8f1ad43c94ea
SHA256 45f1df6093db624a66f171289adf3f1e40022f6fa10fdfa59f61395ba4071e54
SHA3 0c79a7eea2f15bbfec13d47abd0551ecad2445170a6bcb6d6dd19cd3b14b9707
VirtualSize 0xa782
VirtualAddress 0x1000
SizeOfRawData 0xa800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.96856

.rdata

MD5 ee04e27670b7bcd323cbeac744cc7b7d
SHA1 31377895e9e0e5720fa7c496e79646a0f65837df
SHA256 be442ac708ecc29462b3d710abe2b1e87445f1dddcec784a20f9fadff80aee30
SHA3 88448658b6812e803393e6059870a6bc21cbfdf24a08b1cf2b4d1b42b6d17030
VirtualSize 0x8152
VirtualAddress 0xc000
SizeOfRawData 0x8200
PointerToRawData 0xac00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.07083

.data

MD5 7c76e38a64591b61da8b764f2cac9e85
SHA1 fb5623116f8476416564df4db68739b154333528
SHA256 d50336608584761a13d8232666be6cf7ca90417f169b04e7d3fa675f0c0a5868
SHA3 fecbd97fbaddb0f7b01365d1a1cd1fd1950a4f3252138b45e6a2610b70bddedd
VirtualSize 0x928
VirtualAddress 0x15000
SizeOfRawData 0x200
PointerToRawData 0x12e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.84686

.pdata

MD5 e8b4299a4a001fb029f0ff8f0c218122
SHA1 c07ef895ae526f3cd8567fdba5bb5a8c651f1f16
SHA256 973f9af190d8dcc1a3c79e0a230a831b71861f4f06a9b4d730542051a970eec9
SHA3 cdd6906b95cf37b3a8aade45356029f85cdd27dec7254f7edc185b27abc060c8
VirtualSize 0xc78
VirtualAddress 0x16000
SizeOfRawData 0xe00
PointerToRawData 0x13000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.46047

.rsrc

MD5 5780f055f17826cc4f9476354d7e4cf2
SHA1 22f1d3ae39865aaed2b5bd2b012a37a51c871828
SHA256 b85c6f47e541f1f09a1b7808054f9efaa07167a9d3af39a8e81664153744ee4a
SHA3 9a7bd772bcdf86ae043129f09fd29acd2cc833ad0c2240656b0dadec425aab14
VirtualSize 0x32d0
VirtualAddress 0x17000
SizeOfRawData 0x3400
PointerToRawData 0x13e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.62894

.reloc

MD5 0ffcadc368ff5998e89e47d1713d5d9e
SHA1 4882733bad4ebdb643b63c742646d1f3e776d560
SHA256 8357eedb8215ae8d5eea0233b675fa83aeadb926dce36b103f15451a501e9ce8
SHA3 81e80dc6c65e807c8f3da44285786c3ad43a5b8cd5e079569fa74107820207b4
VirtualSize 0xf8
VirtualAddress 0x1b000
SizeOfRawData 0x200
PointerToRawData 0x17200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 2.94954

Imports

ADVAPI32.dll AllocateAndInitializeSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
SetEntriesInAclW
RegCloseKey
RegNotifyChangeKeyValue
RegOpenKeyExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
RegCreateKeyW
RegSetValueExW
CloseServiceHandle
CreateServiceW
DeleteService
OpenSCManagerW
OpenServiceW
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
ole32.dll CoUninitialize
USER32.dll GetDesktopWindow
RegisterDeviceNotificationW
UnregisterDeviceNotification
MessageBoxW
GetWindowLongPtrW
GetSystemMetrics
DestroyWindow
CreateWindowExW
UnregisterClassW
TranslateMessage
DispatchMessageW
PeekMessageW
DefWindowProcW
RegisterClassW
SetWindowLongPtrW
VERSION.dll GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
intl.dll libintl_gettext
glib-2.0.dll g_malloc
g_main_context_unref
g_main_context_default
g_main_loop_new
g_main_loop_run
g_main_loop_unref
g_source_remove
g_timeout_add
g_key_file_new
g_key_file_free
g_key_file_get_keys
g_strdup_printf
g_strfreev
g_strcmp0
g_array_new
g_cond_wait
g_array_append_vals
g_ptr_array_new
g_ptr_array_free
g_ptr_array_remove_index
g_mutex_clear
g_ptr_array_add
g_ptr_array_sort
g_dir_open
g_dir_read_name
g_dir_close
g_strchomp
g_build_filename
g_win32_error_message
g_option_group_set_error_hook
g_option_context_get_main_group
g_get_monotonic_time
g_source_destroy
g_cond_wait_until
g_cond_signal
g_snprintf
g_atomic_int_add
g_atomic_int_set
g_key_file_get_boolean
g_thread_pool_set_max_idle_time
g_option_context_parse
g_main_loop_quit
g_thread_pool_set_max_unused_threads
g_mutex_lock
g_thread_pool_push
g_thread_pool_free
g_thread_pool_new
g_stat
g_queue_delete_link
g_queue_remove
g_queue_pop_tail
g_queue_push_head
g_queue_find_custom
g_queue_free
g_main_loop_is_running
g_queue_new
g_key_file_get_integer
g_rand_int_range
g_rand_free
g_rand_new
g_idle_add_full
g_mutex_unlock
g_key_file_load_from_file
g_file_test
g_main_loop_get_context
g_array_free
g_source_unref
g_source_attach
g_source_set_callback
g_idle_add
g_log
g_logv
g_malloc0
g_str_has_prefix
g_clear_error
g_file_get_contents
g_free
g_print
g_printerr
g_option_context_new
g_option_context_set_summary
g_option_context_free
g_mutex_init
g_thread_join
g_thread_try_new
g_ptr_array_remove
g_strdup
g_str_has_suffix
g_return_if_fail_warning
g_option_context_add_main_entries
gmodule-2.0.dll g_module_open
g_module_symbol
g_module_make_resident
g_module_error
g_module_close
gobject-2.0.dll g_object_notify
g_object_class_install_property
g_signal_new
g_cclosure_marshal_VOID__POINTER
g_type_check_class_cast
g_type_check_instance_cast
g_type_register_static
g_type_class_peek_parent
g_value_get_boolean
g_object_unref
g_object_get
g_object_set
g_object_new
g_signal_connect_data
g_signal_lookup
g_type_init
g_signal_emit_by_name
g_param_spec_pointer
g_value_set_uint
g_value_get_uint
g_value_set_pointer
g_value_peek_pointer
g_value_get_pointer
g_signal_parse_name
g_value_set_boolean
vmtools.dll Win32U_RegQueryValueEx
Win32U_RegOpenKeyEx
GuestStoreClient_GetContent
VMTools_ConfigGetBoolean
VMTools_CompareConfig
File_MakeSafeTemp
File_UnlinkIfExists
BackdoorChannel_New
VMTools_CreateTimer
RpcChannel_New
RpcChannel_SetRetVals
RpcChannel_Setup
StrUtil_GetNextToken
GuestApp_GetConfPath
GuestApp_GetInstallPath
RpcChannel_RegisterCallback
Win32U_FormatMessage
Win32U_SetEnvironmentVariable
Win32U_GetEnvironmentVariable
GuestStoreClient_DeInit
GuestStoreClient_Init
RpcChannel_Send
RpcChannel_Start
Str_Snwprintf
VMTools_SuspendLogIO
VMTools_WriteConfig
VMTools_ConfigGetInteger
VMTools_AddConfig
VMTools_LoadConfig
VMTools_GetString
VmCheck_IsVirtualWorld
Str_SafeAsprintf
RpcChannel_SendOne
VMTools_BindTextDomain
VMTools_TeardownVmxGuestLog
VMTools_SetupVmxGuestLog
Str_Wcscpy
VMTools_UseVmxGuestLog
Str_Vaswprintf
VMTools_ConfigLogging
Str_SafeVaswprintf
Str_Aswprintf
Hostinfo_GetOSType
CodeSet_Utf8ToUtf16le
Unicode_InitW
Panic
RpcChannel_Destroy
RpcChannel_Stop
VMTools_NewHandleSource
Str_Vasprintf
VMTools_AttachConsole
VMTools_ResumeLogIO
vm_free
VMTools_ConfigGetString
KERNEL32.dll CloseHandle
GetLastError
SetErrorMode
SetEvent
WaitForSingleObject
CreateEventW
GetCurrentProcess
GetCurrentThread
SetThreadPriority
SetPriorityClass
GetModuleHandleW
GetProcAddress
LocalFree
SetDllDirectoryW
VerifyVersionInfoW
SetConsoleCtrlHandler
OpenEventW
SetLastError
ResetEvent
WaitForMultipleObjects
LocalAlloc
OutputDebugStringA
OutputDebugStringW
FreeLibrary
GetModuleFileNameW
LoadLibraryW
RtlCaptureContext
RtlLookupFunctionEntry
VerSetConditionMask
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
VCRUNTIME140.dll __std_exception_copy
__C_specific_handler
__CxxFrameHandler3
__std_exception_destroy
_purecall
strchr
memset
_CxxThrowException
api-ms-win-crt-heap-l1-1-0.dll free
_set_new_mode
_callnewh
malloc
api-ms-win-crt-runtime-l1-1-0.dll _c_exit
_errno
strerror
_seh_filter_exe
_set_app_type
_configure_wide_argv
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
_exit
__p___argc
__p___wargv
_cexit
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_register_onexit_function
_crt_atexit
terminate
exit
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
setlocale
api-ms-win-crt-string-l1-1-0.dll strncmp
_wcsicmp
strcmp
api-ms-win-crt-stdio-l1-1-0.dll _close
__stdio_common_vswprintf
__p__commode
__acrt_iob_func
__stdio_common_vfwprintf
_set_fmode
api-ms-win-crt-math-l1-1-0.dll __setusermatherr

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.37925
MD5 7fef88bb6176e299de004c33694b5acc
SHA1 b166acef2038b5294eb30c885a2ac2d97041560e
SHA256 946d53ef3c3e09b367ec93f43aa04bcb23d39ee80f7f2c6edf723d9b47161cf7
SHA3 eff10a859794aa430604374dccf60c0ba12c97b029eca06d96d928661e3518ae

1 (#2)

Type RT_MESSAGETABLE
Language English - United States
Codepage UNKNOWN
Size 0x2c8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.19626
MD5 759168652afe291ecb7dc3ffc46b2561
SHA1 b291f5ccf4cea5eb10d3677298be52373f44d551
SHA256 657fb220e4f919cbf2b87e272649a17c8dc47bfb2126be67b2b9993667f01191
SHA3 5a5a4910cd7326ae953890dfba8e553943340c5f52cdf43f1818875974ef1441

101

Type RT_GROUP_ICON
Language UNKNOWN
Codepage UNKNOWN
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 1.91924
Detected Filetype Icon file
MD5 6da8e7d5ae1d5d15e0230a67a7c16c6d
SHA1 678db52cbe5d617c33c6269bfd4b6d8d1a17f956
SHA256 6eb54801f91b6d8effccbfaefe6b2d7705a274a75940e6226e24e0d4ec58c396
SHA3 994fc217c7b8bc8008ac262ff58044403206de6eceafd424d4640ecad395eb2f

1 (#3)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x320
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.51153
MD5 48d899e194ff4280b71f67160f78c355
SHA1 00e64b5f041839f4f6155cf1871007fc5bb52c6b
SHA256 afd5908e276c5fb3644d76a4b577518d5ed41eb79d3321503bfb0d1cd73e8012
SHA3 bee955ed759ee3b387aa62cd556b8460c46d55a12f899cf89174583eb1a913e5

1 (#4)

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x5a6
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.08943
MD5 1de45c3ee8b586ac7a5d7ba628b7ca68
SHA1 9e73c5d9ab857ef568221fa30c76a3b9b13d680a
SHA256 ee47a99bb307726dd743f21a8488cf44140375824697efc6e45d93eb8d872454
SHA3 dfd10caa76a46ad5bee7e03dafd53853ff3ff47ef1c54435e833e83705e64171

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 11.2.5.26209
ProductVersion 11.2.5.26209
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName VMware, Inc.
FileDescription VMware Tools Core Service
FileVersion (#2) 11.2.5.26209
InternalName vmtoolsd
LegalCopyright Copyright © 1998-2021 VMware, Inc.
OriginalFilename vmtoolsd.exe
ProductName VMware Tools
ProductVersion (#2) 11.2.5 build-17337674
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2020-Dec-17 20:38:59
Version 0.0
SizeofData 135
AddressOfRawData 0x10b4c
PointerToRawData 0xf74c
Referenced File d:\build\ob\bora-17337674\bora-vmsoft\build\release-x64\tools-for-windows\Win32\services\vmtoolsd\vmtoolsd.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2020-Dec-17 20:38:59
Version 0.0
SizeofData 20
AddressOfRawData 0x10bd4
PointerToRawData 0xf7d4

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2020-Dec-17 20:38:59
Version 0.0
SizeofData 692
AddressOfRawData 0x10be8
PointerToRawData 0xf7e8

TLS Callbacks

Load Configuration

Size 0x100
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x140015078
GuardCFCheckFunctionPointer 5368760808
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0xaa901743
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 12
Imports (VS 2015/2017 runtime 26706) 2
199 (41118) 1
Imports (VS2017 v15.8.4 compiler 26729) 8
Imports (VS2019 Update 2 (16.2) compiler 27905) 2
ASM objects (VS 2015/2017 runtime 26706) 2
C++ objects (VS 2015/2017 runtime 26706) 25
C objects (VS 2015/2017 runtime 26706) 10
Imports (VS2015/2017 runtime 25711) 11
Total imports 309
C objects (VS2017 v15.8.4 compiler 26729) 10
C++ objects (VS2017 v15.8.4 compiler 26729) 2
Resource objects (VS2017 v15.8.4 compiler 26729) 1
151 1
Linker (VS2017 v15.8.4 compiler 26729) 1

Errors

<-- -->