| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2026-Apr-16 08:29:33 |
| Detected languages |
English - United States
|
| Debug artifacts |
C:\BUILD\work\5352ccc9d6f46610\Bootstrapper\Bootstrapper.Presetup\bin\Release\Avira.Spotlight.Bootstrapper.Presetup.pdb
|
| CompanyName | Avira Operations GmbH |
| FileDescription | Avira Security |
| FileVersion | 1.0.55.984 |
| InternalName | avira.exe |
| LegalCopyright | Copyright © 2026 Avira Operations GmbH and its Licensors |
| OriginalFilename | avira.exe |
| ProductName | Avira Security |
| ProductVersion | 1.0.55.984 |
| Info | Matching compiler(s): |
Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C# v7.0 / Basic .NET .NET DLL -> Microsoft .NET executable -> Microsoft |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to MD5
Uses constants related to SHA1 Uses constants related to SHA256 Uses known Mersenne Twister constants |
| Suspicious | The PE is possibly packed. | Unusual section name found: .fptable |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | The PE is possibly a dropper. |
Resource ACSSIGNEDIC.EXE detected as a PE Executable.
Resource AVIRA.COMMON.GUARDS.DLL detected as a PE Executable. Resource AVIRA.COMMON.MIXPANEL.DLL detected as a PE Executable. Resource AVIRA.FILEDOWNLOADER.DLL detected as a PE Executable. Resource AVIRA.FUNCTIONAL.DLL detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.CORE.DLL detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.ENGINE.DLL detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.EXE detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.LOGGING.DLL detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.REACTIVE.DLL detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.REPORTINGTOOL.EXE detected as a PE Executable. Resource AVIRA.SPOTLIGHT.BOOTSTRAPPER.RUNNER.EXE detected as a PE Executable. Resource DE-DE\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource DRYIOC.DLL detected as a PE Executable. Resource DRYIOC.MEFATTRIBUTEDMODEL.DLL detected as a PE Executable. Resource DRYIOCATTRIBUTES.DLL detected as a PE Executable. Resource EN-US\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource ENDPOINTPROTECTIONSDK.LIC is possibly compressed or encrypted. Resource ES-ES\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource FR-FR\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource IT-IT\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource JA-JP\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource MICROSOFT.WIN32.TASKSCHEDULER.DLL detected as a PE Executable. Resource MICROSOFT.WINDOWS.SHELL.DLL detected as a PE Executable. Resource NEWTONSOFT.JSON.DLL detected as a PE Executable. Resource NL-NL\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource PRODUCTLABEL.COMMON.DLL detected as a PE Executable. Resource PRODUCTLABEL.DLL detected as a PE Executable. Resource PT-BR\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource RU-RU\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource SHARPRAVEN.DLL detected as a PE Executable. Resource TR-TR\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource ZH-CN\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resource ZH-TW\AVIRA.SPOTLIGHT.BOOTSTRAPPER.RESOURCES.DLL detected as a PE Executable. Resources amount for 93.6885% of the executable. |
| Info | The PE is digitally signed. |
Signer: Avira Operations GmbH
Issuer: Sectigo Public Code Signing CA EV R36 |
| Safe | VirusTotal score: 0/70 (Scanned on 2026-05-17 12:30:26) | All the AVs think this file is safe. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x118 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 7 |
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x3ae00 |
| SizeOfInitializedData | 0x631600 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0001A8F0 (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x3c000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x671000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x67e717 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| ADVAPI32.dll |
InitializeSecurityDescriptor
FreeSid SetEntriesInAclW AllocateAndInitializeSid SetSecurityDescriptorDacl RegSetValueExW RegCreateKeyExW RegDeleteKeyW RegCloseKey StartServiceCtrlDispatcherW RegisterServiceCtrlHandlerW SetServiceStatus OpenProcessToken AdjustTokenPrivileges LookupPrivilegeValueW RegQueryValueExW RegDeleteValueW RegOpenKeyExW |
|---|---|
| ole32.dll |
CoTaskMemFree
|
| SHELL32.dll |
SHGetKnownFolderPath
|
| USER32.dll |
ExitWindowsEx
|
| KERNEL32.dll |
HeapSize
SetStdHandle GetProcessHeap FreeEnvironmentStringsW LocalAlloc GetLastError LocalFree GetModuleFileNameW DeviceIoControl CreateFileW GetCurrentThreadId CloseHandle GetCurrentProcessId CreateDirectoryW GetLongPathNameW GetTempPathW MultiByteToWideChar GetLocalTime GetSystemTimeAsFileTime TerminateProcess WaitForSingleObject CreateProcessW GetExitCodeProcess SizeofResource EnumResourceNamesW UnmapViewOfFile LockResource LoadResource FindResourceW WideCharToMultiByte CreateFileMappingW MapViewOfFile GetWindowsDirectoryW GetCurrentProcess GetSystemDefaultUILanguage GetVersionExW LCIDToLocaleName GetProcAddress GetModuleHandleW CreateEventW SetEvent WaitForMultipleObjects CreateMutexW ReleaseMutex lstrcmpiW MoveFileExW GetSystemDirectoryW RaiseException GetSystemInfo VirtualProtect VirtualQuery FreeLibrary LoadLibraryExA FormatMessageA GetStringTypeW FindClose FindFirstFileExW FindNextFileW GetFileAttributesW GetFileAttributesExW GetFileInformationByHandle GetFinalPathNameByHandleW SetEndOfFile SetFileInformationByHandle SetFilePointerEx AreFileApisANSI CopyFileW CreateHardLinkW GetFileInformationByHandleEx CreateSymbolicLinkW InitializeSRWLock ReleaseSRWLockExclusive AcquireSRWLockExclusive EnterCriticalSection LeaveCriticalSection InitializeCriticalSectionEx TryEnterCriticalSection DeleteCriticalSection QueryPerformanceCounter QueryPerformanceFrequency WaitForSingleObjectEx Sleep EncodePointer DecodePointer LCMapStringEx FlsAlloc FlsGetValue FlsSetValue FlsFree GetCPInfo InitializeCriticalSectionAndSpinCount ResetEvent UnhandledExceptionFilter SetUnhandledExceptionFilter IsProcessorFeaturePresent IsDebuggerPresent GetStartupInfoW InitializeSListHead GetEnvironmentStringsW RtlUnwind SetLastError TlsAlloc TlsGetValue TlsSetValue TlsFree LoadLibraryExW GetModuleHandleExW ExitProcess GetStdHandle WriteFile HeapAlloc HeapFree GetFileType GetFileSizeEx FlushFileBuffers GetConsoleOutputCP GetConsoleMode LCMapStringW GetLocaleInfoW IsValidLocale GetUserDefaultLCID EnumSystemLocalesW ReadFile ReadConsoleW HeapReAlloc IsValidCodePage GetACP GetOEMCP GetCommandLineA GetCommandLineW WriteConsoleW |
| VERSION.dll (delay-loaded) |
GetFileVersionInfoW
VerQueryValueW GetFileVersionInfoSizeW |
| Attributes | 0x1 |
|---|---|
| Name | VERSION.dll |
| ModuleHandle | 0x536c0 |
| DelayImportAddressTable | 0x55000 |
| DelayImportNameTable | 0x50da8 |
| BoundDelayImportTable | 0x50dfc |
| UnloadDelayImportTable | 0 |
| TimeStamp | 1970-Jan-01 00:00:00 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.55.984 |
| ProductVersion | 1.0.55.984 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| CompanyName | Avira Operations GmbH |
| FileDescription | Avira Security |
| FileVersion (#2) | 1.0.55.984 |
| InternalName | avira.exe |
| LegalCopyright | Copyright © 2026 Avira Operations GmbH and its Licensors |
| OriginalFilename | avira.exe |
| ProductName | Avira Security |
| ProductVersion (#2) | 1.0.55.984 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| Version | 0.0 |
| SizeofData | 144 |
| AddressOfRawData | 0x4cefc |
| PointerToRawData | 0x4c0fc |
| Referenced File | C:\BUILD\work\5352ccc9d6f46610\Bootstrapper\Bootstrapper.Presetup\bin\Release\Avira.Spotlight.Bootstrapper.Presetup.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x4cf8c |
| PointerToRawData | 0x4c18c |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| Version | 0.0 |
| SizeofData | 1136 |
| AddressOfRawData | 0x4cfa0 |
| PointerToRawData | 0x4c1a0 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Apr-16 08:29:33 |
| Version | 0.0 |
| SizeofData | 4 |
| AddressOfRawData | 0x4d410 |
| PointerToRawData | 0x4c610 |
| StartAddressOfRawData | 0x44d424 |
|---|---|
| EndAddressOfRawData | 0x44d42c |
| AddressOfIndex | 0x453e90 |
| AddressOfCallbacks | 0x43c2d0 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_4BYTES
|
| Callbacks | (EMPTY) |
| Size | 0xbc |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x452054 |
| SEHandlerTable | 0x44c8d8 |
| SEHandlerCount | 185 |
| GuardCFCheckFunctionPointer | 4440692 |
| GuardCFDispatchFunctionPointer | 0 |
| GuardCFFunctionTable | 0 |
| GuardCFFunctionCount | 0 |
| GuardFlags | (EMPTY) |
| CodeIntegrity.Flags | 0 |
| CodeIntegrity.Catalog | 0 |
| CodeIntegrity.CatalogOffset | 0 |
| CodeIntegrity.Reserved | 0 |
| GuardAddressTakenIatEntryTable | 0 |
| GuardAddressTakenIatEntryCount | 0 |
| GuardLongJumpTargetTable | 0 |
| GuardLongJumpTargetCount | 0 |
| XOR Key | 0xfbd287fe |
|---|---|
| Unmarked objects | 0 |
| ASM objects (33140) | 14 |
| C++ objects (33140) | 178 |
| C objects (33140) | 20 |
| C objects (30034) | 18 |
| ASM objects (30034) | 23 |
| C++ objects (30034) | 95 |
| C objects (CVTCIL) (33140) | 1 |
| Imports (33140) | 11 |
| Total imports | 208 |
| C++ objects (LTCG) (30152) | 23 |
| Resource objects (30152) | 1 |
| 151 | 1 |
| Linker (30152) | 1 |
No comments yet.