Wdextract - Extract Windows Defender Database From Vdm Files Too Unpack It
Extract Windows Defender database from vdm files in addition to unpack it
- This programme distributed as-is, without whatsoever warranty;
- No official support, if you lot similar this tool, experience gratuitous to contribute.
Features
- Unpack VDM containers of Windows Defender/Microsoft Security Essentials;
- Decrypt VDM container embedded inwards Malicious software Removal Tool (MRT.exe);
- Extract all PE images from unpacked/decrypted containers on the wing (-e switch):
- dump VDLLs (Virtual DLLs);
- dump VFS (Virtual File System) contents;
- dump signatures auxiliary images;
- dump GAPA (Generic Application Level Protocol Analyzer) images used yesteryear NIS (Network Inspection System);
- code tin survive adapted to dump type specific chunks of database (not implemented);
- Faster than whatsoever script.
List of WD extracted images, mpasbase.vdm (version 1.291.0.0) https://gist.githubusercontent.com/hfiref0x/38e7845304d10c284220461c86491bdf/raw/39c999e59ff2a924932fe6db811555161596b4a7/gistfile1.txt
List of NIS signatures from NisBase.vdm (version 119.0.0.0) https://gist.githubusercontent.com/hfiref0x/e9b3f185032fcd2afb31afe7bc9a05bd/raw/9bd9f9cc7c408acaff7b56b810c8597756d55d14/nis_sig.txt
Usage
wdextract file [-e]
- file - filename of VDM container (*.vdm file or MRT.exe executable);
- -e optional parameter, extract all institute PE icon chunks institute inwards VDM later on unpacking/decrypting (this including VFS components in addition to emulator VDLLs).
- wdextract c:\wdbase\mpasbase.vdm
- wdextract c:\wdbase\mpasbase.vdm -e
- wdextract c:\wdbase\mrt.exe
- wdextract c:\wdbase\mrt.exe -e
Build
- Source code written inwards C;
- Built amongst MSVS 2017 amongst Windows SDK 17763 installed;
- Can survive built amongst previous versions of MSVS in addition to SDK's.
Related references in addition to tools
- PowerShell unpack script for packed VDM containers, https://gist.github.com/mattifestation/3af5a472e11b7e135273e71cb5fed866
- Windows Defender Emulator Tools, https://github.com/0xAlexei/WindowsDefenderTools
- Porting Windows Dynamic Link Libraries to Linux, https://github.com/taviso/loadlibrary
- MpEnum, https://github.com/hfiref0x/MpEnum
- libmpclient, https://github.com/UldisRinkevichs/libmpclient
N.B.
No actual dumped/extracted/unpacked binary information included or volition survive included inwards this repository.
3rd political party code usage
Uses ZLIB Data Compression Library (https://github.com/madler/zlib)
Authors
(c) 2019 WDEXTRACT Project