Lucene search

K
kitploitKitPloitKITPLOIT:329925661896306287
HistoryJul 30, 2019 - 10:00 p.m.

WDExtract - Extract Windows Defender Database From Vdm Files And Unpack It

2019-07-3022:00:00
www.kitploit.com
226

7.5 High

AI Score

Confidence

Low

Extract Windows Defender database from vdm files and unpack it

  • This program distributed as-is, without any warranty;
  • No official support, if you like this tool, feel free to contribute.

Features

Usage
wdextract file [-e]

  • file - filename of VDM container (*.vdm file or MRT.exe executable);

  • -e optional parameter, extract all found PE image chunks found in VDM after unpacking/decrypting (this including VFS components and emulator VDLLs).
    Example:

  • wdextract c:\wdbase\mpasbase.vdm

  • wdextract c:\wdbase\mpasbase.vdm -e

  • wdextract c:\wdbase\mrt.exe

  • wdextract c:\wdbase\mrt.exe -e
    Note: base will be unpacked/decrypted to source directory as %originalname%.extracted (e.g. if original file c:\wdbase\mpasbase.vdm, unpacked will be c:\wdbase\mpasbase.vdm.extracted). Image chunks will be dumped to created β€œchunks” directory in the wdextract current directory (e.g. if wdextract run from c:\wdbase it will be c:\wdbase\chunks directory). Output files always overwrite existing.

Build

  • Source code written in C;
  • Built with MSVS 2017 with Windows SDK 17763 installed;
  • Can be built with previous versions of MSVS and SDK’s.

Related references and tools

N.B.
No actual dumped/extracted/unpacked binary data included or will be included in this repository.

3rd party code usage
Uses ZLIB Data Compression Library (<https://github.com/madler/zlib&gt;)

Authors
Β© 2019 WDEXTRACT Project

Download WDExtract

7.5 High

AI Score

Confidence

Low