× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e9207dc6c245279263544031d983c6697f48d5ffe5ca70178473d21e159c7a25
File name: ffmpeg.exe
Detection ratio: 0 / 67
Analysis date: 2018-02-22 18:32:14 UTC ( 6 months, 4 weeks ago )
Antivirus Result Update
Ad-Aware 20180222
AegisLab 20180222
AhnLab-V3 20180222
Alibaba 20180222
ALYac 20180222
Antiy-AVL 20180222
Arcabit 20180222
Avast 20180222
Avast-Mobile 20180222
AVG 20180222
Avira (no cloud) 20180222
AVware 20180222
Baidu 20180208
BitDefender 20180222
Bkav 20180212
CAT-QuickHeal 20180222
ClamAV 20180222
CMC 20180222
Comodo 20180222
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180222
Cyren 20180222
DrWeb 20180222
eGambit 20180222
Emsisoft 20180222
Endgame 20180216
ESET-NOD32 20180222
F-Prot 20180222
F-Secure 20180222
Fortinet 20180222
GData 20180222
Ikarus 20180222
Sophos ML 20180121
Jiangmin 20180222
K7AntiVirus 20180222
K7GW 20180222
Kaspersky 20180222
Kingsoft 20180222
Malwarebytes 20180222
MAX 20180222
McAfee 20180221
McAfee-GW-Edition 20180222
Microsoft 20180222
eScan 20180222
NANO-Antivirus 20180222
nProtect 20180222
Palo Alto Networks (Known Signatures) 20180222
Panda 20180222
Qihoo-360 20180222
Rising 20180222
SentinelOne (Static ML) 20180115
Sophos AV 20180222
SUPERAntiSpyware 20180222
Symantec 20180222
Symantec Mobile Insight 20180220
Tencent 20180222
TheHacker 20180219
TrendMicro 20180222
TrendMicro-HouseCall 20180222
Trustlook 20180222
VBA32 20180222
VIPRE 20180222
ViRobot 20180222
Webroot 20180222
WhiteArmor 20180205
Yandex 20180222
Zillya 20180221
ZoneAlarm by Check Point 20180222
Zoner 20180222
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Entry Point 0x000014E0
Number of sections 11
PE sections
PE imports
RegEnumValueW
CryptReleaseContext
RegCloseKey
CryptAcquireContextA
RegQueryInfoKeyW
CryptGenRandom
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
capCreateCaptureWindowA
capGetDriverDescriptionA
GetDIBColorTable
GetTextMetricsW
CreateFontIndirectW
CreatePen
SetDeviceGammaRamp
CombineRgn
Rectangle
GetDeviceGammaRamp
GetDeviceCaps
DeleteDC
SetBkMode
GetPixelFormat
ChoosePixelFormat
CreateDCW
CreateDIBSection
SetTextColor
GetObjectA
ExtTextOutW
DescribePixelFormat
CreateBitmap
BitBlt
GetStockObject
GetDIBits
SetPixelFormat
CreateCompatibleDC
CreateFontW
SwapBuffers
CreateRectRgn
GetTextExtentPoint32W
GetTextExtentPoint32A
CreateSolidBrush
SelectObject
DeleteObject
CreateCompatibleBitmap
ImmSetCompositionStringW
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCandidateListW
ImmGetIMEFileNameA
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringW
ImmAssociateContext
GetStdHandle
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
GetFileAttributesW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
SetFilePointer
SetErrorMode
lstrcatW
IsDBCSLeadByteEx
GetTempPathA
WideCharToMultiByte
GetNumaNodeProcessorMaskEx
GetSystemTimeAsFileTime
SetDllDirectoryA
GlobalMemoryStatusEx
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
GetThreadPriority
InitializeCriticalSection
OutputDebugStringW
FindClose
TlsGetValue
SetThreadPriority
SetLastError
PeekNamedPipe
GetEnvironmentVariableA
GetModuleFileNameW
TryEnterCriticalSection
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
SetConsoleCtrlHandler
InitializeConditionVariable
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
CreateMutexA
CreateEventW
CreateSemaphoreA
CreateThread
MoveFileExW
GetSystemDirectoryW
CreateSemaphoreW
MulDiv
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
TerminateProcess
SetUnhandledExceptionFilter
GetModuleHandleExW
GlobalAlloc
SetThreadGroupAffinity
GetCurrentThreadId
GetModuleHandleExA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
SetConsoleTextAttribute
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
GetStartupInfoA
GetWindowsDirectoryW
WakeAllConditionVariable
GetWindowsDirectoryA
CreateDirectoryW
GetProcAddress
GetConsoleScreenBufferInfo
GetFileSizeEx
FindNextFileW
CompareStringA
SleepConditionVariableCS
CreateFileMappingA
FindFirstFileW
DuplicateHandle
WaitForMultipleObjects
GlobalLock
GetProcessAffinityMask
GetTimeZoneInformation
CreateFileW
CreateEventA
TlsSetValue
LeaveCriticalSection
GetLastError
GetSystemInfo
GetProcessTimes
GlobalUnlock
VirtualQuery
lstrlenW
WaitForSingleObjectEx
SwitchToThread
GetCurrentProcessId
WaitNamedPipeW
GetCommandLineW
SetThreadAffinityMask
VerSetConditionMask
GetCurrentThread
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
SetDllDirectoryW
GetACP
GetModuleHandleW
GetNumaHighestNodeNumber
UnmapViewOfFile
WriteFile
VirtualFree
GetLongPathNameA
Sleep
GetFileAttributesExA
VirtualAlloc
ResetEvent
SysFreeString
OleCreatePropertyFrame
GetProcessMemoryInfo
DragQueryFileW
DragFinish
SHGetFolderPathW
DragAcceptFiles
ExtractIconExW
CommandLineToArgvW
SHCreateStreamOnFileA
InitializeSecurityContextA
AcquireCredentialsHandleA
DeleteSecurityContext
ApplyControlToken
FreeContextBuffer
DecryptMessage
QueryContextAttributesA
EncryptMessage
FreeCredentialsHandle
SetWindowRgn
ValidateRect
SetWindowPos
DispatchMessageA
EndPaint
WindowFromPoint
GetClipboardSequenceNumber
DispatchMessageW
GetCursorPos
ReleaseDC
GetMenu
SendMessageA
UnregisterClassW
GetClientRect
DrawTextW
TrackMouseEvent
IsClipboardFormatAvailable
ClientToScreen
GetWindowTextW
ChangeDisplaySettingsExW
GetWindowTextLengthW
DestroyWindow
GetClassInfoExW
GetCursorInfo
GetPropW
GetRawInputDeviceList
GetMessageW
ShowWindow
SetPropW
EnumDisplayMonitors
PeekMessageW
PeekMessageA
TranslateMessage
GetAsyncKeyState
RegisterClassW
GetIconInfo
SetClipboardData
RegisterRawInputDevices
IsIconic
EnumDisplayDevicesW
GetWindowLongA
CreateWindowExA
GetKeyboardLayout
CreateWindowExW
GetWindowLongW
GetUpdateRect
GetMonitorInfoW
EnumDisplaySettingsW
BeginPaint
DefWindowProcW
CopyIcon
KillTimer
MapVirtualKeyW
ClipCursor
SetTimer
DefWindowProcA
GetClipboardData
GetParent
GetSystemMetrics
SetWindowLongW
GetWindowRect
DrawIcon
GetMessageExtraInfo
RegisterDeviceNotificationW
SetWindowLongA
GetRawInputData
SetWindowTextW
GetRawInputDeviceInfoA
RemovePropW
ScreenToClient
LoadCursorA
GetKeyboardState
PostThreadMessageW
GetDesktopWindow
CreateIconFromResource
LoadCursorW
LoadIconW
GetDC
SetForegroundWindow
OpenClipboard
EmptyClipboard
SetLayeredWindowAttributes
EndDialog
CreateIconIndirect
FindWindowA
MessageBoxW
SendMessageW
RegisterClassExW
DialogBoxIndirectParamW
DestroyCursor
AdjustWindowRectEx
GetKeyState
SystemParametersInfoA
GetDoubleClickTime
DestroyIcon
SetCursorPos
SystemParametersInfoW
FrameRect
InvalidateRect
CallWindowProcW
UnregisterDeviceNotification
IsRectEmpty
ToUnicode
GetFocus
CloseClipboard
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
waveOutGetErrorTextW
waveOutReset
waveInOpen
waveOutOpen
waveInPrepareHeader
waveOutPrepareHeader
waveOutUnprepareHeader
waveInAddBuffer
waveOutClose
waveInGetNumDevs
timeGetTime
waveOutGetNumDevs
timeEndPeriod
waveInClose
waveInUnprepareHeader
timeBeginPeriod
waveOutWrite
waveOutGetDevCapsW
waveInReset
waveInGetDevCapsW
waveInStart
getaddrinfo
htonl
shutdown
accept
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
getpeername
WSAGetLastError
gethostname
getsockopt
closesocket
ntohl
inet_addr
send
getservbyport
ntohs
select
gethostbyaddr
listen
__WSAFDIsSet
WSACleanup
gethostbyname
getnameinfo
WSASetLastError
setsockopt
recv
socket
bind
recvfrom
inet_ntoa
sendto
getservbyname
__lconv_init
fseek
_wfindfirst
__p__fmode
_ui64toa
cosh
_snwprintf
strtoul
fflush
isxdigit
_wrename
strtol
__initenv
wcscmp
_mbsrchr
strtok
fwrite
_wcsdup
fputs
realloc
exit
_wstat
isspace
_close
_exit
_wfopen_s
_aligned_free
_strupr
_isatty
_wunlink
_wfopen
strstr
_write
memcpy
perror
memmove
_ltoa
tanh
_get_osfhandle
_mkdir
_initterm
div
signal
fgetws
strncmp
_kbhit
_ultoa
rewind
_endthread
_hypot
memset
wcschr
strcat
___mb_cur_max_func
_setmode
_chmod
__pioinfo
strchr
asin
fopen
_wfindnext
clock
_beginthread
fgetpos
fsetpos
_fullpath
ftell
_strlwr
sprintf
_unlink
_locking
_wsopen
swscanf_s
strcspn
fputc
ferror
gmtime
free
ungetc
_aligned_malloc
_fstati64
sinh
__getmainargs
_wstati64
_stat
_lseeki64
_vsnprintf
putchar
_read
_findnext
strcmp
_findfirst
strcpy
bsearch
islower
acos
isupper
_ftime
_iob
_sopen
rand
toupper
setlocale
_wrmdir
_getcwd
__doserrno
fwprintf
__p__acmdln
strncat
_setjmp3
_access
printf
_rmdir
memchr
strncpy
getchar
_cexit
_itoa
raise
puts
mktime
qsort
_open
_onexit
wcslen
fgetc
isalpha
fclose
memcmp
__setusermatherr
log10
srand
_fdopen
getenv
_stati64
wcscat
wcscspn
atoi
frexp
_stricmp
atof
fscanf
localeconv
strerror
wcscpy
strrchr
_beginthreadex
strspn
_aligned_realloc
_strnicmp
localtime
vsprintf
rename
malloc
sscanf
fread
strtok_s
_waccess
fgets
abort
fprintf
_i64toa
tan
feof
_endthreadex
_amsg_exit
_wremove
_errno
strlen
_lock
_findclose
_strdup
vfprintf
_fileno
wcsrchr
_strrev
longjmp
tolower
atan
_unlock
strpbrk
calloc
_getch
_wmkdir
_filelengthi64
strftime
time
wcsstr
getc
setvbuf
__set_app_type
CoInitializeEx
CoUninitialize
CoInitialize
CoTaskMemAlloc
OleLoadFromStream
OleSaveToStream
CoCreateInstance
CreateBindCtx
CoGetMalloc
PropVariantClear
CoTaskMemFree
PE exports
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

TimeStamp
0000:00:00 00:00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
27892224

LinkerVersion
2.3

FileTypeExtension
exe

InitializedDataSize
36084224

SubsystemVersion
4.0

EntryPoint
0x14e0

OSVersion
4.0

ImageVersion
1.0

UninitializedDataSize
10489856

File identification
MD5 3e0181ee79d19a4bc7994d11228f1dcc
SHA1 dc02a1410979b145fafbf125bbd32a8e271b3f0f
SHA256 e9207dc6c245279263544031d983c6697f48d5ffe5ca70178473d21e159c7a25
ssdeep
393216:eE5CY3O0wRFtRkFqJhvgSjPj/hbu1auKpCu4PshXNHxQ5U0z/Mi/u5gwGH4pGBIt:eE5CYOTtGECSwkFNHxQ5U0zU1KoZd

authentihash 8b8b583ffbc52c5dfbac2ea4641ac1bd99f2537f35cce21e4faf4e5c2a22d94f
imphash 7fe433edc1b77256fc7b383867654b30
File size 34.5 MB ( 36197376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-02-22 18:30:27 UTC ( 6 months, 4 weeks ago )
Last submission 2018-02-22 18:32:14 UTC ( 6 months, 4 weeks ago )
File names ffmpeg.exe
ffmpeg.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!