× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9f21ddeaa3ed934f84296f308630fa64b157de6904f23327c83a4e09130a7b8c
File name: flash-video-converter.exe
Detection ratio: 0 / 68
Analysis date: 2018-02-12 05:08:02 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180212
AegisLab 20180212
AhnLab-V3 20180212
Alibaba 20180209
ALYac 20180212
Antiy-AVL 20180212
Arcabit 20180212
Avast 20180212
Avast-Mobile 20180211
AVG 20180212
Avira (no cloud) 20180211
AVware 20180210
Baidu 20180208
BitDefender 20180212
Bkav 20180209
CAT-QuickHeal 20180211
ClamAV 20180212
CMC 20180212
Comodo 20180212
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180212
Cyren 20180212
DrWeb 20180212
eGambit 20180212
Emsisoft 20180212
Endgame 20171130
ESET-NOD32 20180211
F-Prot 20180212
F-Secure 20180212
Fortinet 20180212
GData 20180212
Ikarus 20180211
Sophos ML 20180121
Jiangmin 20180212
K7AntiVirus 20180212
K7GW 20180212
Kaspersky 20180212
Kingsoft 20180212
Malwarebytes 20180212
MAX 20180212
McAfee 20180212
McAfee-GW-Edition 20180212
Microsoft 20180212
eScan 20180212
NANO-Antivirus 20180212
nProtect 20180209
Palo Alto Networks (Known Signatures) 20180212
Panda 20180211
Qihoo-360 20180212
Rising 20180212
SentinelOne (Static ML) 20180115
Sophos AV 20180212
SUPERAntiSpyware 20180212
Symantec 20180211
Symantec Mobile Insight 20180212
Tencent 20180212
TheHacker 20180208
TotalDefense 20180211
TrendMicro 20180212
TrendMicro-HouseCall 20180212
Trustlook 20180212
VBA32 20180209
VIPRE 20180212
ViRobot 20180212
Webroot 20180212
WhiteArmor 20180205
Yandex 20180210
Zillya 20180209
ZoneAlarm by Check Point 20180212
Zoner 20180212
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
WonderFox Soft, Inc. All Rights Reserved.

Product Flash Video Converter Factory
Original name Video Converter Factory Software
Internal name Flash Video Converter Factory
File version 2.0.0.0
Description Flash Video Converter Factory
Comments Author
Packers identified
F-PROT UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00EBC870
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
ImageList_Add
SaveDC
CoInitialize
VariantCopy
SHGetMalloc
VerQueryValueA
Number of PE resources by type
RT_STRING 20
RT_BITMAP 11
RT_ICON 9
RT_GROUP_CURSOR 7
RT_CURSOR 7
RT_RCDATA 3
1A 1
3A 1
5A 1
RT_VERSION 1
12A 1
RT_DIALOG 1
7A 1
9A 1
10A 1
16A 1
RT_MANIFEST 1
14A 1
2A 1
4A 1
6A 1
13A 1
11A 1
8A 1
15A 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 49
CHINESE SIMPLIFIED 27
ENGLISH US 1
PE resources
ExifTool file metadata
LegalTrademarks
WonderFox

SubsystemVersion
4.0

Comments
Author

LinkerVersion
2.25

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Flash Video Converter Factory

CharacterSet
Windows, Latin1

InitializedDataSize
122880

EntryPoint
0xebc870

OriginalFileName
Video Converter Factory Software

MIMEType
application/octet-stream

LegalCopyright
WonderFox Soft, Inc. All Rights Reserved.

FileVersion
2.0.0.0

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Flash Video Converter Factory

ProductVersion
2.0.0.0

UninitializedDataSize
7643136

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
WonderFox Soft, Inc.

CodeSize
7806976

ProductName
Flash Video Converter Factory

ProductVersionNumber
2.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e22e0a19e80ac659224d98dfd4d5df10
SHA1 8e2fefe096887557e9443560d4265aed9f89858e
SHA256 9f21ddeaa3ed934f84296f308630fa64b157de6904f23327c83a4e09130a7b8c
ssdeep
196608:ELOtfA02wbdahUFGYIn+aYSog3Xi+n/y/AIZFPSkb:aOtfA6wT2gieyFt

authentihash 0dc20c6508a13e5dfb9380c5e5bfa1643dafe57ab3e5d7a090c23689283972e3
imphash 5dba25a43b1337e5662dfccdbc41ae54
File size 7.6 MB ( 7926784 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (40.8%)
Win32 EXE Yoda's Crypter (40.1%)
Win32 Executable (generic) (6.8%)
Win16/32 Executable Delphi generic (3.1%)
OS/2 Executable (generic) (3.0%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-01-19 05:10:24 UTC ( 5 years, 6 months ago )
Last submission 2018-05-23 14:49:03 UTC ( 1 month, 3 weeks ago )
File names 9F21DDEAA3ED934F84296F308630FA64B157DE6904F23327C83A4E09130A7B8C
flash-video-converter.exe
e22e0a19e80ac659224d98dfd4d5df10
e22e0a19e80ac659224d98dfd4d5df10
Video Converter Factory Software
Flash Video Converter Factory
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
UDP communications