× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f9876007e012196cf08bc937bf7f96c3c10db5f4a0db2e05431c2926762a74c0
File name: ffmpeg.exe
Detection ratio: 0 / 69
Analysis date: 2019-05-20 21:29:30 UTC ( 5 days, 9 hours ago )
Antivirus Result Update
Acronis 20190520
Ad-Aware 20190520
AegisLab 20190520
AhnLab-V3 20190520
Alibaba 20190513
ALYac 20190520
Antiy-AVL 20190520
APEX 20190520
Arcabit 20190520
Avast 20190520
Avast-Mobile 20190520
AVG 20190520
Avira (no cloud) 20190520
Babable 20190424
Baidu 20190318
BitDefender 20190520
Bkav 20190520
CAT-QuickHeal 20190520
ClamAV 20190520
CMC 20190321
Comodo 20190520
CrowdStrike Falcon (ML) 20190212
Cybereason 20190417
Cylance 20190520
Cyren 20190520
DrWeb 20190520
eGambit 20190520
Emsisoft 20190520
Endgame 20190403
ESET-NOD32 20190520
F-Prot 20190520
F-Secure 20190520
FireEye 20190520
Fortinet 20190520
GData 20190520
Ikarus 20190520
Sophos ML 20190313
Jiangmin 20190520
K7AntiVirus 20190520
K7GW 20190520
Kaspersky 20190520
Kingsoft 20190520
Malwarebytes 20190520
MAX 20190520
MaxSecure 20190520
McAfee 20190520
McAfee-GW-Edition 20190520
Microsoft 20190520
eScan 20190520
NANO-Antivirus 20190520
Palo Alto Networks (Known Signatures) 20190520
Panda 20190520
Qihoo-360 20190520
Rising 20190520
SentinelOne (Static ML) 20190511
Sophos AV 20190520
SUPERAntiSpyware 20190514
Symantec Mobile Insight 20190516
TACHYON 20190520
Tencent 20190520
TheHacker 20190516
TotalDefense 20190520
Trapmine 20190325
Trustlook 20190520
VBA32 20190520
VIPRE 20190520
ViRobot 20190520
Webroot 20190520
Zillya 20190520
ZoneAlarm by Check Point 20190520
Zoner 20190520
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem that targets 64bit architectures.
FileVersionInfo properties
PE header basic information
Target machine x64
Entry Point 0x000014E0
Number of sections 13
PE sections
PE imports
CryptSetProvParam
RegEnumValueW
CryptReleaseContext
RegCloseKey
RegQueryInfoKeyW
CryptAcquireContextA
RegQueryValueExW
CryptGetHashParam
RegOpenKeyExW
CryptGenRandom
CryptSetHashParam
RegEnumKeyExW
CryptAcquireContextW
CryptSignHashA
CryptDecrypt
CryptGetProvParam
CryptDestroyHash
CryptCreateHash
capCreateCaptureWindowA
capGetDriverDescriptionA
CertEnumCertificatesInStore
PFXImportCertStore
CertGetCertificateContextProperty
CertFreeCertificateContext
CertCloseStore
CertEnumCRLsInStore
CertDeleteCertificateFromStore
CertFindCertificateInStore
CertOpenSystemStoreA
GetDIBColorTable
GetTextMetricsW
CreateFontIndirectW
CreatePen
SetDeviceGammaRamp
CombineRgn
Rectangle
GetDeviceGammaRamp
GetDeviceCaps
DeleteDC
SetBkMode
GetPixelFormat
ChoosePixelFormat
CreateDCW
CreateDIBSection
SetTextColor
GetObjectA
ExtTextOutW
DescribePixelFormat
CreateBitmap
BitBlt
GetStockObject
GetDIBits
SetPixelFormat
CreateCompatibleDC
CreateFontW
SwapBuffers
CreateRectRgn
GetTextExtentPoint32W
GetTextExtentPoint32A
CreateSolidBrush
SelectObject
DeleteObject
CreateCompatibleBitmap
ImmSetCompositionStringW
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCandidateListW
ImmGetIMEFileNameA
ImmGetContext
ImmReleaseContext
ImmGetCompositionStringW
ImmAssociateContext
GetStdHandle
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
GetFileAttributesW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
SetFilePointer
RtlUnwindEx
SetErrorMode
lstrcatW
IsDBCSLeadByteEx
GetTempPathA
WideCharToMultiByte
GetNumaNodeProcessorMaskEx
GetSystemTimeAsFileTime
SetDllDirectoryA
GlobalMemoryStatusEx
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
GetThreadPriority
InitializeCriticalSection
OutputDebugStringW
FindClose
TlsGetValue
SetThreadPriority
SetLastError
PeekNamedPipe
GetEnvironmentVariableA
InitOnceComplete
TryEnterCriticalSection
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
RaiseException
WakeConditionVariable
LoadLibraryExA
SetConsoleCtrlHandler
InitializeConditionVariable
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
CreateMutexA
CreateEventW
CreateSemaphoreA
CreateThread
MoveFileExW
GetSystemDirectoryW
CreateSemaphoreW
MulDiv
GetSystemDirectoryA
MoveFileExA
InitOnceBeginInitialize
SetEnvironmentVariableA
TerminateProcess
SetUnhandledExceptionFilter
GetModuleHandleExW
GlobalAlloc
SetThreadGroupAffinity
GetCurrentThreadId
InitializeSRWLock
WriteConsoleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
SetConsoleTextAttribute
TlsAlloc
VirtualProtect
LoadLibraryA
GetStartupInfoA
GetWindowsDirectoryW
AcquireSRWLockExclusive
WakeAllConditionVariable
GetWindowsDirectoryA
CreateDirectoryW
GetProcAddress
GetConsoleScreenBufferInfo
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
RtlLookupFunctionEntry
CompareStringA
SleepConditionVariableCS
CreateFileMappingA
FindFirstFileW
ReleaseSRWLockExclusive
DuplicateHandle
WaitForMultipleObjects
GlobalLock
GetProcessAffinityMask
GetTimeZoneInformation
CreateFileW
CreateEventA
TlsSetValue
LeaveCriticalSection
GetLastError
GetSystemInfo
GetProcessTimes
GlobalUnlock
VirtualQuery
RtlAddFunctionTable
WaitForSingleObjectEx
SwitchToThread
GetCurrentProcessId
WaitNamedPipeW
GetCommandLineW
SleepConditionVariableSRW
lstrlenW
SetThreadAffinityMask
VerSetConditionMask
GetCurrentThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
RtlCaptureContext
CloseHandle
SetDllDirectoryW
GetACP
GetModuleHandleW
GetNumaHighestNodeNumber
GetModuleHandleExA
UnmapViewOfFile
WriteFile
VirtualFree
GetLongPathNameA
Sleep
GetFileAttributesExA
VirtualAlloc
ResetEvent
SysFreeString
OleCreatePropertyFrame
GetProcessMemoryInfo
DragQueryFileW
DragFinish
SHGetFolderPathW
DragAcceptFiles
ExtractIconExW
CommandLineToArgvW
SHCreateStreamOnFileA
SetWindowRgn
SetWindowLongPtrW
ValidateRect
SetWindowPos
DispatchMessageA
EndPaint
WindowFromPoint
GetClipboardSequenceNumber
DispatchMessageW
GetCursorPos
ReleaseDC
GetMenu
SendMessageA
UnregisterClassW
GetClientRect
DrawTextW
TrackMouseEvent
IsClipboardFormatAvailable
ClientToScreen
GetWindowTextW
ChangeDisplaySettingsExW
GetWindowTextLengthW
DestroyWindow
GetClassInfoExW
GetCursorInfo
GetPropW
GetRawInputDeviceList
GetMessageW
ShowWindow
SetPropW
EnumDisplayMonitors
PeekMessageW
PeekMessageA
TranslateMessage
GetAsyncKeyState
RegisterClassW
GetIconInfo
SetClipboardData
RegisterRawInputDevices
IsIconic
EnumDisplayDevicesW
CreateWindowExA
GetKeyboardLayout
CreateWindowExW
GetWindowLongW
GetUpdateRect
GetMonitorInfoW
EnumDisplaySettingsW
BeginPaint
DefWindowProcW
CopyIcon
KillTimer
SetWindowLongPtrA
MapVirtualKeyW
ClipCursor
SetTimer
DefWindowProcA
GetClipboardData
GetParent
GetSystemMetrics
SetWindowLongW
GetWindowRect
DrawIcon
GetMessageExtraInfo
RegisterDeviceNotificationW
GetRawInputData
SetWindowTextW
GetRawInputDeviceInfoA
RemovePropW
ScreenToClient
LoadCursorA
GetKeyboardState
PostThreadMessageW
GetDesktopWindow
CreateIconFromResource
LoadCursorW
LoadIconW
GetDC
SetForegroundWindow
OpenClipboard
EmptyClipboard
SetLayeredWindowAttributes
EndDialog
CreateIconIndirect
FindWindowA
MessageBoxW
SendMessageW
RegisterClassExW
DialogBoxIndirectParamW
DestroyCursor
AdjustWindowRectEx
GetKeyState
SystemParametersInfoA
GetDoubleClickTime
DestroyIcon
GetWindowLongPtrW
SetCursorPos
SystemParametersInfoW
GetWindowLongPtrA
FrameRect
InvalidateRect
CallWindowProcW
UnregisterDeviceNotification
IsRectEmpty
ToUnicode
GetFocus
CloseClipboard
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
waveOutGetErrorTextW
waveOutReset
waveInOpen
waveOutOpen
waveInPrepareHeader
waveOutPrepareHeader
waveOutUnprepareHeader
waveInAddBuffer
waveOutClose
waveInGetNumDevs
timeGetTime
waveOutGetNumDevs
timeEndPeriod
waveInClose
waveInUnprepareHeader
timeBeginPeriod
waveOutWrite
waveOutGetDevCapsW
waveInReset
waveInGetDevCapsW
waveInStart
getaddrinfo
htonl
shutdown
accept
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
getpeername
WSAGetLastError
gethostname
getsockopt
closesocket
ntohl
inet_addr
send
getservbyport
ntohs
select
gethostbyaddr
listen
__WSAFDIsSet
WSACleanup
gethostbyname
getnameinfo
WSASetLastError
setsockopt
recv
socket
bind
recvfrom
inet_ntoa
sendto
getservbyname
BCryptGenRandom
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
__lconv_init
___lc_codepage_func
frexp
_ui64toa
cosh
_time64
_snwprintf
strtoul
fflush
fsetpos
_fmode
_wrename
strtol
__initenv
_findfirst64
_ftime64
strtok
fwrite
_wfindnext64
_wcsdup
fputs
_fstat64
_nextafter
realloc
exit
_setjmp
_close
_exit
_wfopen_s
_aligned_free
_strupr
_isatty
_wunlink
_wfopen
strstr
_write
memcpy
perror
memmove
_wfindfirst64
_ltoa
tanh
_get_osfhandle
_mkdir
div
signal
fgetws
strncmp
_kbhit
_ultoa
rewind
_endthread
_hypot
memset
wcschr
strcat
___mb_cur_max_func
_setmode
_chmod
wcscpy
__pioinfo
strchr
asin
fopen
clock
_beginthread
fgetpos
_getpid
_fullpath
ftell
_strlwr
sprintf
_unlink
_locking
_wsopen
_acmdln
swscanf_s
strcspn
fputc
ferror
gmtime
free
ungetc
_aligned_malloc
sinh
__getmainargs
_gmtime64
_lseeki64
_vsnprintf
putchar
_mbsrchr
_read
fseek
strcmp
strcpy
bsearch
islower
_getch
isupper
strftime
_sopen
rand
toupper
raise
setlocale
_wrmdir
_getcwd
__doserrno
fwprintf
strncat
_access
printf
_rmdir
memchr
strncpy
getchar
_cexit
_itoa
__C_specific_handler
puts
wcscmp
qsort
_open
_onexit
wcslen
fgetc
isalpha
fclose
memcmp
__setusermatherr
log10
srand
_fdopen
getenv
wcscat
wcscspn
atoi
vfprintf
_stricmp
atof
_wstat64
fscanf
localeconv
strerror
isspace
strrchr
_beginthreadex
strspn
_localtime64
_aligned_realloc
_strnicmp
localtime
vsprintf
isxdigit
rename
malloc
sscanf
acos
fread
strtok_s
_waccess
fgets
abort
fprintf
_i64toa
tan
feof
_endthreadex
_amsg_exit
_wremove
_errno
strlen
_lock
_findclose
_strdup
_fileno
wcsrchr
_strrev
longjmp
tolower
atan
_unlock
strpbrk
calloc
_initterm
_mktime64
_wmkdir
__iob_func
_filelengthi64
_findnext64
wcsstr
_stat64
getc
setvbuf
__set_app_type
CoInitializeEx
CoUninitialize
CoInitialize
CoTaskMemAlloc
OleLoadFromStream
OleSaveToStream
CoCreateInstance
CreateBindCtx
CoGetMalloc
PropVariantClear
CoTaskMemFree
PE exports
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

SubsystemVersion
5.2

MachineType
AMD AMD64

TimeStamp
0000:00:00 00:00:00

FileType
Win64 EXE

PEType
PE32+

CodeSize
50539008

LinkerVersion
2.29

FileTypeExtension
exe

InitializedDataSize
62369792

ImageFileCharacteristics
Executable, No line numbers, No symbols, Large address aware, No debug

EntryPoint
0x14e0

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
10596864

File identification
MD5 f0c42b2253de1ba514ec37689f40472d
SHA1 541af943c39516bf6fec3faa5329c8f56f12c967
SHA256 f9876007e012196cf08bc937bf7f96c3c10db5f4a0db2e05431c2926762a74c0
ssdeep
393216:tdGWYHXyfvlbR16WexpWnJs7vSl85vAAsdZkNqUkrHKY76po+GFdlIr:tdGWkpWJISvUkrmFudlI

authentihash 7b9e4cdfb15585fe8fc39e5ef7a84138cf7bab83f0e26851dd7434d8df08ad82
imphash 0ff54f4799ec223d39266bbf10c6cb0d
File size 59.6 MB ( 62491136 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (console) Mono/.Net assembly

TrID Win64 Executable (generic) (82.0%)
OS/2 Executable (generic) (6.0%)
Generic Win/DOS Executable (5.9%)
DOS Executable Generic (5.9%)
Tags
64bits peexe assembly

VirusTotal metadata
First submission 2018-04-28 02:09:14 UTC ( 1 year ago )
Last submission 2019-05-20 21:29:30 UTC ( 5 days, 9 hours ago )
File names ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
ffmpeg.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!