× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: afd3705cbd99903debdf5ec03d6433e02578ab691d71a36e650f4167ddb18663
File name: mp4tomp3.exe
Detection ratio: 0 / 64
Analysis date: 2019-03-14 18:59:05 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis 20190313
Ad-Aware 20190314
AegisLab 20190314
AhnLab-V3 20190314
Alibaba 20190306
ALYac 20190314
Antiy-AVL 20190314
Arcabit 20190314
Avast 20190314
Avast-Mobile 20190314
AVG 20190314
Avira (no cloud) 20190314
Baidu 20190306
BitDefender 20190314
Bkav 20190314
CAT-QuickHeal 20190314
ClamAV 20190314
CMC 20190314
Comodo 20190314
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cyren 20190314
DrWeb 20190314
eGambit 20190314
Emsisoft 20190314
Endgame 20190215
ESET-NOD32 20190314
F-Secure 20190314
Fortinet 20190314
GData 20190314
Ikarus 20190314
Sophos ML 20190313
Jiangmin 20190314
K7AntiVirus 20190314
K7GW 20190314
Kaspersky 20190314
Kingsoft 20190314
Malwarebytes 20190314
MAX 20190314
McAfee 20190314
McAfee-GW-Edition 20190314
Microsoft 20190314
eScan 20190314
NANO-Antivirus 20190314
Palo Alto Networks (Known Signatures) 20190314
Panda 20190314
Qihoo-360 20190314
Rising 20190314
SentinelOne (Static ML) 20190311
Sophos AV 20190314
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TACHYON 20190314
Tencent 20190314
TheHacker 20190308
TotalDefense 20190314
Trapmine 20190301
TrendMicro-HouseCall 20190314
Trustlook 20190314
VBA32 20190314
ViRobot 20190314
Yandex 20190314
Zillya 20190314
ZoneAlarm by Check Point 20190314
Zoner 20190314
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
https://www.MP4ToMP3Converter.net

Product MP4 To MP3 Converter
File version 4.2.1
Description MP4 To MP3 Converter Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 3:15 PM 12/11/2018
Signers
[+] Xi'an Pantuowangluokeji co, ltd.
Status Valid
Issuer DigiCert EV Code Signing CA (SHA2)
Valid from 01:00 AM 01/08/2018
Valid to 01:00 PM 02/16/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint D2091907949685264BA17405E29718314FF83D46
Serial number 0B 03 15 77 78 AC 9E CB FD E1 D3 26 4C A9 79 71
[+] DigiCert EV Code Signing CA (SHA2)
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 12:00 PM 04/18/2012
Valid to 12:00 PM 04/18/2027
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 60EE3FC53D4BDFD1697AE5BEAE1CAB1C0F3AD4E3
Serial number 03 F1 B4 E1 5F 3A 82 F1 14 96 78 B3 D7 D8 47 5C
[+] DigiCert
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 01:00 AM 11/10/2006
Valid to 01:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Serial number 02 AC 5C 26 6A 0B 40 9B 8F 0B 79 F2 AE 46 25 77
Counter signers
[+] DigiCert Timestamp Responder
Status Valid
Issuer DigiCert Assured ID CA-1
Valid from 12:00 AM 10/22/2014
Valid to 12:00 AM 10/22/2024
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 614D271D9102E30169822487FDE5DE00A352B01D
Serial number 03 01 9A 02 3A FF 58 B1 6B D6 D5 EA E6 17 F0 66
[+] DigiCert Assured ID CA-1
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 01:00 AM 11/10/2006
Valid to 01:00 AM 11/10/2021
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing
Algorithm sha1RSA
Thumbrint 19A09B5A36F4DD99727DF783C17A51231A56C117
Serial number 06 FD F9 03 96 03 AD EA 00 0A EB 3F 27 BB BA 1B
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 01:00 AM 11/10/2006
Valid to 01:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009B60
Number of sections 8
PE sections
Overlays
MD5 5d79401912d6ca433d9d29f1b55b3165
File type data
Offset 163328
Size 14467328
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_ICON 10
RT_STRING 6
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 13
NEUTRAL 7
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
4.2.1.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
MP4 To MP3 Converter Setup

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
124416

EntryPoint
0x9b60

MIMEType
application/octet-stream

LegalCopyright
https://www.MP4ToMP3Converter.net

FileVersion
4.2.1

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
4.2.1

UninitializedDataSize
0

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
https://www.MP4ToMP3Converter.net

CodeSize
37888

ProductName
MP4 To MP3 Converter

ProductVersionNumber
4.2.1.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 07cb3bb99a33f947b157a27376731db9
SHA1 720abf1e1e4078652289eed66b28d6abf69537f9
SHA256 afd3705cbd99903debdf5ec03d6433e02578ab691d71a36e650f4167ddb18663
ssdeep
393216:bn8vNwkl91cgbwZkurwAHfCA26frsjWkFRUCZdSf:bn8VwI10rxfr7kFRUbf

authentihash 3f5f2ca5324b90a2fe9f0a0d30ef207f0ea81cab6a09e98c528e715e2d8ba34f
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 14.0 MB ( 14630656 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (80.3%)
Win32 Executable Delphi generic (10.3%)
Win32 Executable (generic) (3.3%)
Win16/32 Executable Delphi generic (1.5%)
OS/2 Executable (generic) (1.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-12-11 13:21:01 UTC ( 4 months, 1 week ago )
Last submission 2018-12-16 16:43:20 UTC ( 4 months, 1 week ago )
File names mp4tomp3.exe
mp4tomp3.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs