Edit tour

Windows Analysis Report
ffprobe.exe

Overview

General Information

Sample name:ffprobe.exe
Analysis ID:1476288
MD5:cc47fcc83e6f1ea6d9fac3461b7cc95f
SHA1:40f3b4935e613d3c12df5b9b9194deea127d4f3e
SHA256:db9ad05b53a2f0d37aa2f0e41b4d0c34e6e38e21255ec7bc88a49af5eea93cf0
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Installs a raw input device (often for capturing keystrokes)
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • ffprobe.exe (PID: 6952 cmdline: "C:\Users\user\Desktop\ffprobe.exe" MD5: CC47FCC83E6F1EA6D9FAC3461B7CC95F)
    • conhost.exe (PID: 6620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: ffprobe.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: ffprobe.exeString found in binary or memory: http://dashif.org/guidelines/last-segment-number
Source: ffprobe.exeString found in binary or memory: http://dashif.org/guidelines/trickmode
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604D8A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://lame.sf.net
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604D8A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://lame.sf.net64bits
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://modplug-xmms.sourceforge.net/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://relaxng.org/ns/structure/1.0
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://relaxng.org/ns/structure/1.0datatypeLibrary:/#?includegrammardefinenamestartInternal
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://schismtracker.org/
Source: ffprobe.exeString found in binary or memory: http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-DASH_schema_files/DASH-MPD.xsd
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604A20000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.brynosaurus.com/cachedir/
Source: ffprobe.exeString found in binary or memory: http://www.gnu.org/licenses/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD
Source: ffprobe.exeString found in binary or memory: http://www.smpte-ra.org/schemas/2067-3/2013#standard-markers
Source: ffprobe.exeString found in binary or memory: http://www.smpte-ra.org/schemas/2067-3/2013#standard-markersInvalid
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604ED1000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.videolan.org/x264.html
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604ED1000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://x265.org
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://xaimus.com/)
Source: ffprobe.exeString found in binary or memory: https://aomedia.org/emsg/ID3
Source: ffprobe.exeString found in binary or memory: https://aomedia.org/emsg/ID3Unexpected
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://bel.fi/alankila/modguide/interpolate.txt
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://coda.s3m.us/)
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/iamgreaser/it2everything/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/lclevy/unmo3
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/lieff/minimp3/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/nothings/stb/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/richgel999/miniz
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/ryuhei-mori/tinyfft
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/viiri/st2play
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://joaobapt.com/)
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://kode54.net/)
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://revenant1.net/)
Source: ffprobe.exeString found in binary or memory: https://streams.videolan.org/upload/
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://twitter.com/daniel_collin
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.3eality.com/
Source: ffprobe.exe, 00000000.00000000.1280146174.00007FF606AA0000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: GetRawInputDatamemstr_4ac1f450-f
Source: ffprobe.exeStatic PE information: Number of sections : 13 > 10
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF60449B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: WM/OriginalFilename vs ffprobe.exe
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF60449B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: commentID3WM/AlbumArtistalbum_artistWM/AlbumTitlealbumAuthorartistDescriptionWM/ComposercomposerWM/EncodedByencoded_byWM/EncodingSettingsencoderWM/GenregenreWM/LanguagelanguageWM/OriginalFilenamefilenameWM/PartOfSetdiscWM/PublisherpublisherWM/ToolWM/TrackNumbertrackWM/MediaStationCallSignservice_providerWM/MediaStationNameservice_name> vs ffprobe.exe
Source: ffprobe.exeBinary or memory string: WM/OriginalFilename vs ffprobe.exe
Source: ffprobe.exeBinary or memory string: commentID3WM/AlbumArtistalbum_artistWM/AlbumTitlealbumAuthorartistDescriptionWM/ComposercomposerWM/EncodedByencoded_byWM/EncodingSettingsencoderWM/GenregenreWM/LanguagelanguageWM/OriginalFilenamefilenameWM/PartOfSetdiscWM/PublisherpublisherWM/ToolWM/TrackNumbertrackWM/MediaStationCallSignservice_providerWM/MediaStationNameservice_name> vs ffprobe.exe
Source: classification engineClassification label: clean3.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6620:120:WilError_03
Source: ffprobe.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ffprobe.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ffprobe.exeString found in binary or memory: -help
Source: ffprobe.exeString found in binary or memory: Lshow licensehshow helptopic?help-helpshow versionbuildconfshow build configurationformatsshow available formatsmuxersshow available muxersdemuxersshow available demuxersdevicesshow available devicescodecsshow available codecsdecodersshow available decodersencodersshow available encodersbsfsshow available bit stream filtersprotocolsshow available protocolsfiltersshow available filterspix_fmtsshow available pixel formatslayoutsshow standard channel layoutssample_fmtsshow available audio sample formatsdispositionsshow available stream dispositionscolorsshow available color namesloglevelset logging levelvreportgenerate a reportmax_allocset maximum size of a single allocated blockbytescpuflagsforce specific cpu flagscpucountforce specific cpu countcounthide_bannerdo not show program bannersourceslist sources of the input devicedevicesinkslist sinks of the output devicefforce formatshow unit of the displayed valuesuse SI prefixes for the displayed valuesbyte_binary_prefixuse binary prefixes for byte unitssexagesimaluse sexagesimal format HOURS:MM:SS.MICROSECONDS for time unitsprettyprettify the format of displayed values, make it more human readableoutput_formatset the output printing format (available formats are: default, compact, csv, flat, ini, json, xml)print_formatalias for -output_format (deprecated)ofalias for -output_formatselect_streamsselect the specified streamsstream_specifiersectionsprint sections structure and section information, and exitshow_datashow packets datashow_data_hashshow packets data hashshow_errorshow probing errorshow_formatshow format/container infoshow_framesshow frames infoshow_entriesshow a set of specified entriesentry_listshow_logshow logshow_packetsshow packets infoshow_programsshow programs infoshow_stream_groupsshow stream groups infoshow_streamsshow streams infoshow_chaptersshow chapters infocount_framescount the number of frames per streamcount_packetscount the number of packets per streamshow_program_versionshow ffprobe versionshow_library_versionsshow library versionsshow_versionsshow program and library versionsshow_pixel_formatsshow pixel format descriptionsshow optional fieldsshow_private_datashow private datasame as show_private_databitexactforce bitexact outputread_intervalsset read intervalsiread specified fileinput_fileowrite to specified outputoutput_fileprint_filenameoverride the printed input filenameprint_filefind_stream_inforead and decode the streams to fill missing information with heuristics
Source: ffprobe.exeString found in binary or memory: overlap-add
Source: ffprobe.exeString found in binary or memory: windowset window sizewoverlapset window overlapoarorderset autoregression orderathresholdset thresholdthsizeset histogram sizenmethodset overlap methodmaddoverlap-addsaveoverlap-saves
Source: ffprobe.exeString found in binary or memory: Apply high order Butterworth band-stop filter.
Source: ffprobe.exeString found in binary or memory: @asubcutasupercutasuperpassasuperstopApply high order Butterworth band-stop filter.
Source: ffprobe.exeString found in binary or memory: #EXT-X-START:
Source: ffprobe.exeString found in binary or memory: #EXT-X-START value isinvalid, it will be ignored
Source: ffprobe.exeString found in binary or memory: #EXT-X-PLAYLIST-TYPE:EVENTVOD#EXT-X-MAP:data:#EXT-X-START:TIME-OFFSET=#EXT-X-START value isinvalid, it will be ignored#EXT-X-ENDLIST#EXTINF:#EXT-X-BYTERANGE:#Skip ('%s')
Source: ffprobe.exeString found in binary or memory: prefer to use #EXT-X-START if it's in playlist instead of live_start_index
Source: ffprobe.exeString found in binary or memory: ;live_start_indexsegment index to start live streams at (negative values are from the end)prefer_x_startprefer to use #EXT-X-START if it's in playlist instead of live_start_indexallowed_extensionsList of file extensions that hls is allowed to access3gp,aac,avi,ac3,eac3,flac,mkv,m3u8,m4a,m4s,m4v,mpg,mov,mp2,mp3,mp4,mpeg,mpegts,ogg,ogv,oga,ts,vob,wavmax_reloadMaximum number of times a insufficient list is attempted to be reloadedm3u8_hold_countersThe maximum number of times to load m3u8 when it refreshes without new segmentshttp_persistentUse persistent HTTP connectionshttp_multipleUse multiple HTTP connections for fetching segmentshttp_seekableUse HTTP partial requests, 0 = disable, 1 = enable, -1 = autoseg_format_optionsSet options for segment demuxerseg_max_retryMaximum number of times to reload a segment on error.h
Source: ffprobe.exeString found in binary or memory: start/stop audio
Source: ffprobe.exeString found in binary or memory: start/stop audio
Source: unknownProcess created: C:\Users\user\Desktop\ffprobe.exe "C:\Users\user\Desktop\ffprobe.exe"
Source: C:\Users\user\Desktop\ffprobe.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\ffprobe.exeSection loaded: ntasn1.dllJump to behavior
Source: ffprobe.exeStatic PE information: More than 235 > 100 exports found
Source: ffprobe.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: ffprobe.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: ffprobe.exeStatic file information: File size 86542848 > 1048576
Source: ffprobe.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4317600
Source: ffprobe.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x12da00
Source: ffprobe.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xbb6400
Source: ffprobe.exeStatic PE information: Raw size of .xdata is bigger than: 0x100000 < 0x151200
Source: ffprobe.exeStatic PE information: More than 200 imports for msvcrt.dll
Source: ffprobe.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: ffprobe.exeStatic PE information: section name: .rodata
Source: ffprobe.exeStatic PE information: section name: .xdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: ffprobe.exe, 00000000.00000000.1273368787.00007FF604703000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: vmncVMware Screen Codec / VMware Video
Source: ffprobe.exe, 00000000.00000002.1284789715.00000262AA8DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
Source: ffprobe.exeBinary or memory string: VMware Screen Codec / VMware Video
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
11
Input Capture
1
Security Software Discovery
Remote Services11
Input Capture
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1476288 Sample: ffprobe.exe Startdate: 18/07/2024 Architecture: WINDOWS Score: 3 5 ffprobe.exe 1 2->5         started        process3 7 conhost.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ffprobe.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://joaobapt.com/)0%Avira URL Cloudsafe
http://x265.org0%Avira URL Cloudsafe
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd0%Avira URL Cloudsafe
http://schismtracker.org/0%Avira URL Cloudsafe
http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-DASH_schema_files/DASH-MPD.xsd0%Avira URL Cloudsafe
https://twitter.com/daniel_collin0%Avira URL Cloudsafe
https://kode54.net/)0%Avira URL Cloudsafe
http://lame.sf.net64bits0%Avira URL Cloudsafe
https://github.com/iamgreaser/it2everything/0%Avira URL Cloudsafe
https://github.com/nothings/stb/0%Avira URL Cloudsafe
http://dashif.org/guidelines/last-segment-number0%Avira URL Cloudsafe
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTD0%Avira URL Cloudsafe
https://bel.fi/alankila/modguide/interpolate.txt0%Avira URL Cloudsafe
https://www.3eality.com/0%Avira URL Cloudsafe
http://lame.sf.net0%Avira URL Cloudsafe
http://relaxng.org/ns/structure/1.0datatypeLibrary:/#?includegrammardefinenamestartInternal0%Avira URL Cloudsafe
http://www.smpte-ra.org/schemas/2067-3/2013#standard-markers0%Avira URL Cloudsafe
http://www.smpte-ra.org/schemas/2067-3/2013#standard-markersInvalid0%Avira URL Cloudsafe
https://revenant1.net/)0%Avira URL Cloudsafe
https://github.com/viiri/st2play0%Avira URL Cloudsafe
https://streams.videolan.org/upload/0%Avira URL Cloudsafe
https://github.com/ryuhei-mori/tinyfft0%Avira URL Cloudsafe
https://coda.s3m.us/)0%Avira URL Cloudsafe
http://xaimus.com/)0%Avira URL Cloudsafe
http://www.videolan.org/x264.html0%Avira URL Cloudsafe
http://dashif.org/guidelines/trickmode0%Avira URL Cloudsafe
http://www.brynosaurus.com/cachedir/0%Avira URL Cloudsafe
https://github.com/lieff/minimp3/0%Avira URL Cloudsafe
http://modplug-xmms.sourceforge.net/0%Avira URL Cloudsafe
http://relaxng.org/ns/structure/1.00%Avira URL Cloudsafe
https://github.com/lclevy/unmo30%Avira URL Cloudsafe
http://www.gnu.org/licenses/0%Avira URL Cloudsafe
https://aomedia.org/emsg/ID30%Avira URL Cloudsafe
https://github.com/richgel999/miniz0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://x265.orgffprobe.exe, 00000000.00000000.1273368787.00007FF604ED1000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://kode54.net/)ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://twitter.com/daniel_collinffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/nothings/stb/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/iamgreaser/it2everything/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://joaobapt.com/)ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schismtracker.org/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://standards.iso.org/ittf/PubliclyAvailableStandards/MPEG-DASH_schema_files/DASH-MPD.xsdffprobe.exefalse
  • Avira URL Cloud: safe
unknown
http://lame.sf.net64bitsffprobe.exe, 00000000.00000000.1273368787.00007FF604D8A000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtdffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bel.fi/alankila/modguide/interpolate.txtffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd-//OASIS//DTDffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.3eality.com/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://dashif.org/guidelines/last-segment-numberffprobe.exefalse
  • Avira URL Cloud: safe
unknown
http://www.smpte-ra.org/schemas/2067-3/2013#standard-markersInvalidffprobe.exefalse
  • Avira URL Cloud: safe
unknown
http://www.smpte-ra.org/schemas/2067-3/2013#standard-markersffprobe.exefalse
  • Avira URL Cloud: safe
unknown
https://revenant1.net/)ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://lame.sf.netffprobe.exe, 00000000.00000000.1273368787.00007FF604D8A000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://relaxng.org/ns/structure/1.0datatypeLibrary:/#?includegrammardefinenamestartInternalffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/viiri/st2playffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://streams.videolan.org/upload/ffprobe.exefalse
  • Avira URL Cloud: safe
unknown
https://coda.s3m.us/)ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/ryuhei-mori/tinyfftffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.videolan.org/x264.htmlffprobe.exe, 00000000.00000000.1273368787.00007FF604ED1000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://xaimus.com/)ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://dashif.org/guidelines/trickmodeffprobe.exefalse
  • Avira URL Cloud: safe
unknown
http://www.brynosaurus.com/cachedir/ffprobe.exe, 00000000.00000000.1273368787.00007FF604A20000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/lieff/minimp3/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://modplug-xmms.sourceforge.net/ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://relaxng.org/ns/structure/1.0ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://aomedia.org/emsg/ID3ffprobe.exefalse
  • Avira URL Cloud: safe
unknown
https://github.com/lclevy/unmo3ffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/richgel999/minizffprobe.exe, 00000000.00000000.1273368787.00007FF604B41000.00000002.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.gnu.org/licenses/ffprobe.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1476288
Start date and time:2024-07-18 22:58:25 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 39s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ffprobe.exe
Detection:CLEAN
Classification:clean3.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: ffprobe.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):6.761660032526983
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:ffprobe.exe
File size:86'542'848 bytes
MD5:cc47fcc83e6f1ea6d9fac3461b7cc95f
SHA1:40f3b4935e613d3c12df5b9b9194deea127d4f3e
SHA256:db9ad05b53a2f0d37aa2f0e41b4d0c34e6e38e21255ec7bc88a49af5eea93cf0
SHA512:d6ef85785dcd1f88a4ee4eaeb292c6f999be982cd31c476da0334ad33ba6d5836d960c31c0f2fa032bbfe3506e25eafca9dfd2904af8c7ddc633b05f4ee8de96
SSDEEP:1572864:VNRzA6QEwposwdcYS/aEHBt6w5Hnflkg+rkVRJsZRw+cJfagAoCFhJ:VNRUw
TLSH:65189E9EE2D3509CD12BD4F043AAF773BA34787C11206B7A26D99A306E22F80575EF54
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...V..f...............*.v1...(................@......................................)...`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x1400013f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x6698E656 [Thu Jul 18 09:54:30 2024 UTC]
TLS Callbacks:0x41abcf60, 0x1, 0x411393c0, 0x1, 0x41139390, 0x1, 0x414b9c30, 0x1
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:bf0224a39bf8d7e40169130a36e44140
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [04F1E005h]
mov dword ptr [eax], 00000000h
call 00007EFC9450706Fh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax]
dec eax
sub esp, 28h
call 00007EFC985715D4h
dec eax
cmp eax, 01h
sbb eax, eax
dec eax
add esp, 28h
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
dec eax
lea ecx, dword ptr [00000009h]
jmp 00007EFC945072C9h
nop dword ptr [eax+00h]
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push edi
push esi
push ebx
dec eax
sub esp, 30h
dec eax
mov esi, dword ptr [04F1E022h]
dec eax
mov dword ptr [esp+58h], edx
dec eax
lea edi, dword ptr [esp+58h]
dec eax
mov ebx, ecx
mov ecx, 00000001h
dec esp
mov dword ptr [esp+60h], eax
dec esp
mov dword ptr [esp+68h], ecx
dec eax
mov dword ptr [esp+20h], edi
dec eax
mov eax, dword ptr [esi]
dec eax
mov dword ptr [esp+28h], eax
xor eax, eax
call dword ptr [04442211h]
dec eax
mov edx, ebx
dec ecx
mov eax, edi
dec eax
mov ecx, eax
call 00007EFC95FC56D8h
dec eax
mov edx, dword ptr [esp+28h]
dec eax
sub edx, dword ptr [esi]
jne 00007EFC945072FAh
dec eax
add esp, 30h
pop ebx
pop esi
pop edi
ret
call 00007EFC95FC4F91h
nop
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x6a4e0000x1a20.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x6a500000x6fb8.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a590000x730.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50020000xeaef4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6a5a0000x43c68.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x493a7800x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6a519d80x1848.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x43175c00x4317600f28457f3f6c795a45dd3dd4436ae5b4bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x43190000x12d9600x12da006987294c19b6433a396b9b6bc9ea45d0False0.14991064028180687firmware 4018 v4544 (revision 16777216) 0 (region 402653184), 16777216 bytes or less, UNKNOWN1 0x18000000, UNKNOWN2 0x1000000, UNKNOWN3 0xa0970040, at 0 0 bytes , at 0xd09e0040 16777216 bytes , at 0x20000004.838685485203868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rodata0x44470000x39cc0x3a00a64f76b5697ad7b396a3eb484e6a487aFalse0.26589439655172414data5.855705171693117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x444b0000xbb63800xbb64007e819f699847138f85f0c00ec522442dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.pdata0x50020000xeaef40xeb0007c6b27f898a235aa4ee253ed310c46c3False0.5447109790558511data7.07359279614864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.xdata0x50ed0000x1511940x15120046bd93d31553068ab180b7b81e5406cfFalse0.18203023614200964data5.220048784749478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.bss0x523f0000x180eef00x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x6a4e0000x1a200x1c00c28923cc7bcc9d92d471d83adb7499a6False0.43275669642857145data5.693351465756173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0x6a500000x6fb80x700035ed8af0a312d3faa03c28cbdc6cd658False0.27769252232142855data4.940238210753338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x6a570000x700x2007f2b3f56c1ea527dd754b3a036d0c349False0.091796875data0.5034383167085339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x6a580000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x6a590000x7300x8002d4152e07612cb54f811739fd87d2a95False0.14794921875data2.114214149621193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6a5a0000x43c680x43e002809ac23327cc1b700c35e35328f0b8fFalse0.20889445211786373data5.488703015821316IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x6a590580x1efXML 1.0 document, ASCII textEnglishUnited States0.498989898989899
DLLImport
ADVAPI32.dllCryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptReleaseContext, CryptSetHashParam, CryptSetProvParam, CryptSignHashA, DeregisterEventSource, GetUserNameA, InitializeSecurityDescriptor, RegCloseKey, RegEnumKeyExW, RegEnumValueW, RegOpenKeyExW, RegQueryInfoKeyW, RegQueryValueExW, RegisterEventSourceW, ReportEventW, SetSecurityDescriptorDacl, SystemFunction036
bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenRandom, BCryptOpenAlgorithmProvider
CRYPT32.dllCertCloseStore, CertDeleteCertificateFromStore, CertEnumCRLsInStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertOpenStore, CertOpenSystemStoreW, PFXImportCertStore
GDI32.dllBitBlt, ChoosePixelFormat, CombineRgn, CreateBitmap, CreateCompatibleBitmap, CreateCompatibleDC, CreateDCW, CreateDIBSection, CreateFontIndirectW, CreateFontW, CreatePen, CreateRectRgn, CreateSolidBrush, DeleteDC, DeleteObject, DescribePixelFormat, EnumFontFamiliesW, ExtTextOutW, GetDIBColorTable, GetDIBits, GetDeviceCaps, GetDeviceGammaRamp, GetICMProfileW, GetObjectA, GetPixelFormat, GetStockObject, GetTextExtentPoint32A, GetTextExtentPoint32W, GetTextFaceW, GetTextMetricsW, Rectangle, SelectObject, SetBkMode, SetDeviceGammaRamp, SetPixelFormat, SetTextColor, SwapBuffers
IMM32.dllImmAssociateContext, ImmGetCandidateListW, ImmGetCompositionStringW, ImmGetContext, ImmGetIMEFileNameA, ImmNotifyIME, ImmReleaseContext, ImmSetCandidateWindow, ImmSetCompositionStringW, ImmSetCompositionWindow
IPHLPAPI.DLLGetAdaptersAddresses, if_indextoname, if_nametoindex
KERNEL32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, AreFileApisANSI, CancelIo, CancelIoEx, CloseHandle, CompareStringA, ConvertFiberToThread, ConvertThreadToFiberEx, CreateDirectoryW, CreateEventA, CreateEventW, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateFileW, CreateMutexA, CreateSemaphoreA, CreateSemaphoreW, CreateThread, DeleteCriticalSection, DeleteFiber, DeviceIoControl, DuplicateHandle, EnterCriticalSection, EnumResourceNamesW, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileA, FindFirstFileExW, FindFirstFileW, FindNextFileW, FormatMessageA, FormatMessageW, FreeLibrary, GetACP, GetCommandLineW, GetComputerNameA, GetConsoleMode, GetConsoleScreenBufferInfo, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentVariableA, GetEnvironmentVariableW, GetExitCodeThread, GetFileAttributesA, GetFileAttributesExA, GetFileAttributesW, GetFileInformationByHandle, GetFileSize, GetFileSizeEx, GetFileTime, GetFileType, GetFinalPathNameByHandleA, GetFullPathNameA, GetFullPathNameW, GetHandleInformation, GetLastError, GetLocaleInfoA, GetLongPathNameA, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExA, GetModuleHandleExW, GetModuleHandleW, GetNumaHighestNodeNumber, GetNumaNodeProcessorMaskEx, GetOverlappedResult, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetProcessTimes, GetStdHandle, GetSystemDirectoryA, GetSystemDirectoryW, GetSystemInfo, GetSystemPowerStatus, GetSystemTime, GetSystemTimeAdjustment, GetSystemTimeAsFileTime, GetTempPathA, GetThreadContext, GetThreadPriority, GetThreadTimes, GetTickCount, GetTimeZoneInformation, GetVersion, GetWindowsDirectoryA, GlobalAlloc, GlobalLock, GlobalMemoryStatusEx, GlobalUnlock, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, InitializeConditionVariable, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSRWLock, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, LoadLibraryW, LocalFree, MapViewOfFile, MoveFileExA, MoveFileExW, MulDiv, MultiByteToWideChar, OpenFileMappingA, OpenProcess, OutputDebugStringA, OutputDebugStringW, PeekNamedPipe, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseMutex, ReleaseSRWLockExclusive, ReleaseSRWLockShared, ReleaseSemaphore, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetConsoleMode, SetConsoleTextAttribute, SetDllDirectoryA, SetEnvironmentVariableA, SetErrorMode, SetEvent, SetFilePointer, SetFilePointerEx, SetHandleInformation, SetLastError, SetProcessAffinityMask, SetSystemTime, SetThreadContext, SetThreadErrorMode, SetThreadExecutionState, SetThreadGroupAffinity, SetThreadPriority, SetUnhandledExceptionFilter, SignalObjectAndWait, Sleep, SleepConditionVariableCS, SuspendThread, SwitchToFiber, SwitchToThread, SystemTimeToFileTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, VirtualUnlock, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler, lstrcmpiW
msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __argv, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _access, _access, _aligned_free, _aligned_malloc, _aligned_realloc, _amsg_exit, _assert, _beginthreadex, _cexit, _chmod, _close, _close, _commode, _dup2, _dup, _endthreadex, _environ, _errno, _exit, _filelengthi64, _fileno, _fileno, _fdopen, _findclose, _findfirst64, _findnext64, _fmode, _fstat64, _ftime64, _fullpath, _get_osfhandle, _getcwd, _getmaxstdio, _getpid, _gmtime64, _hypot, _i64toa, _initterm, _isctype, _isatty, _itoa, _localtime64, _lock, _locking, _lseeki64, _ltoa, _mbsrchr, _mkdir, _mkdir, _mktime64, _onexit, _open, _open_osfhandle, _nextafter, _open, _read, _rmdir, _rmdir, _setjmp, _setmaxstdio, _setmode, _setmode, _sopen, _stat64, _strdup, _stricmp, _strlwr, _strnicmp, _strrev, _strtoi64, _strtoui64, _strtoui64, _strdup, _strupr, _time64, _timezone, _ui64toa, _ultoa, _unlink, _unlink, _unlock, _vscprintf, _vsnprintf, _vsnwprintf, _waccess, _wassert, _wcsdup, _wcsicmp, _wcsnicmp, _wfindfirst64, _wfindnext64, _wfopen, _wfullpath, _wgetenv, _wmkdir, _wopen, _wrename, _wrmdir, _write, _wsopen, _wstat64, _wunlink, abort, acos, asin, atan, atof, atoi, bsearch, calloc, clock, cosh, div, exit, fclose, feof, ferror, fflush, fgetc, fgetpos, fgets, fopen, fopen_s, fprintf, fputc, fputs, fread, free, fseek, fsetpos, ftell, fwrite, getc, getchar, getenv, getwc, isalnum, isalpha, iscntrl, isgraph, islower, isprint, ispunct, isspace, isupper, iswctype, isxdigit, localeconv, log10, longjmp, malloc, mbstowcs, memchr, memcmp, memcpy, memmove, memset, perror, printf, putc, putwc, qsort, raise, rand, realloc, rename, rewind, setlocale, setvbuf, signal, sinh, sprintf, srand, strcat, strchr, strcmp, strcoll, strcpy, strcpy_s, strcspn, strerror, strftime, strlen, strncat, strncmp, strncpy, strncpy_s, strpbrk, strrchr, strspn, strstr, strtok, strtok_s, strtol, strtoul, strxfrm, tan, tanh, tolower, toupper, towlower, towupper, ungetc, ungetwc, vfprintf, wcscat, wcscmp, wcscoll, wcscpy, wcscpy_s, wcsftime, wcslen, wcsncmp, wcsncpy, wcsrchr, wcsstr, wcstombs, wcstombs_s, wcstoul, wcsxfrm
ncrypt.dllNCryptDecrypt, NCryptDeleteKey, NCryptFreeObject, NCryptGetProperty, NCryptOpenKey, NCryptOpenStorageProvider, NCryptSignHash
ole32.dllCLSIDFromString, CoCreateInstance, CoGetMalloc, CoInitialize, CoInitializeEx, CoTaskMemAlloc, CoTaskMemFree, CoUninitialize, CreateBindCtx, OleLoadFromStream, OleSaveToStream, PropVariantClear, StringFromGUID2
OLEAUT32.dllOleCreatePropertyFrame, SysFreeString
SETUPAPI.dllCM_Get_Device_IDA, CM_Get_Parent, CM_Locate_DevNodeA, SetupDiDestroyDeviceInfoList, SetupDiEnumDeviceInfo, SetupDiEnumDeviceInterfaces, SetupDiGetClassDevsA, SetupDiGetDeviceInterfaceDetailA, SetupDiGetDeviceRegistryPropertyA
SHELL32.dllCommandLineToArgvW, DragAcceptFiles, DragFinish, DragQueryFileW, SHGetFolderPathW, SHGetSpecialFolderPathA, ShellExecuteW
SHLWAPI.dllSHCreateStreamOnFileA
USER32.dllAdjustWindowRectEx, AttachThreadInput, BeginPaint, CallNextHookEx, CallWindowProcW, ChangeDisplaySettingsExW, ClientToScreen, ClipCursor, CloseClipboard, CopyIcon, CopyImage, CreateIconFromResource, CreateIconIndirect, CreateWindowExA, CreateWindowExW, DefWindowProcA, DefWindowProcW, DestroyCursor, DestroyIcon, DestroyWindow, DialogBoxIndirectParamW, DispatchMessageA, DispatchMessageW, DrawIcon, DrawTextW, EmptyClipboard, EndDialog, EndPaint, EnumDisplayDevicesW, EnumDisplayMonitors, EnumDisplaySettingsW, FillRect, FindWindowW, FlashWindowEx, FrameRect, GetAsyncKeyState, GetClassInfoExW, GetClientRect, GetClipCursor, GetClipboardData, GetClipboardSequenceNumber, GetCursorInfo, GetCursorPos, GetDC, GetDesktopWindow, GetDlgItem, GetDoubleClickTime, GetFocus, GetForegroundWindow, GetIconInfo, GetKeyState, GetKeyboardLayout, GetKeyboardState, GetMenu, GetMessageExtraInfo, GetMessageTime, GetMessageW, GetMonitorInfoW, GetParent, GetProcessWindowStation, GetPropW, GetRawInputData, GetRawInputDeviceInfoA, GetRawInputDeviceList, GetSystemMetrics, GetUpdateRect, GetUserObjectInformationW, GetWindowLongPtrA, GetWindowLongPtrW, GetWindowLongW, GetWindowRect, GetWindowTextLengthW, GetWindowTextW, GetWindowThreadProcessId, IntersectRect, InvalidateRect, IsClipboardFormatAvailable, IsIconic, KillTimer, LoadCursorA, LoadCursorW, LoadIconW, MapVirtualKeyW, MessageBoxA, MessageBoxW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow, MsgWaitForMultipleObjects, OpenClipboard, PeekMessageA, PeekMessageW, PostMessageW, PostThreadMessageW, PtInRect, RegisterClassExA, RegisterClassExW, RegisterClassW, RegisterDeviceNotificationW, RegisterRawInputDevices, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, RemovePropW, ScreenToClient, SendMessageA, SendMessageW, SetActiveWindow, SetCapture, SetClipboardData, SetCursor, SetCursorPos, SetFocus, SetForegroundWindow, SetLayeredWindowAttributes, SetPropW, SetTimer, SetWindowLongPtrA, SetWindowLongPtrW, SetWindowLongW, SetWindowPos, SetWindowRgn, SetWindowTextW, SetWindowsHookExW, ShowWindow, SystemParametersInfoA, SystemParametersInfoW, ToUnicode, TrackMouseEvent, TranslateMessage, UnhookWindowsHookEx, UnregisterClassA, UnregisterClassW, UnregisterDeviceNotification, ValidateRect
VERSION.dllGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
AVICAP32.dllcapCreateCaptureWindowA, capGetDriverDescriptionA
WINMM.dlltimeBeginPeriod, timeEndPeriod, waveInAddBuffer, waveInClose, waveInGetDevCapsW, waveInGetNumDevs, waveInOpen, waveInPrepareHeader, waveInReset, waveInStart, waveInUnprepareHeader, waveOutClose, waveOutGetDevCapsW, waveOutGetErrorTextW, waveOutGetNumDevs, waveOutOpen, waveOutPrepareHeader, waveOutReset, waveOutUnprepareHeader, waveOutWrite
WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEventSelect, WSAGetLastError, WSAGetOverlappedResult, WSAIoctl, WSARecvFrom, WSAResetEvent, WSASendTo, WSASetLastError, WSASocketA, WSAStartup, WSAStringToAddressA, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, gethostbyaddr, gethostbyname, gethostname, getnameinfo, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, inet_ntop, inet_pton, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
NameOrdinalAddress
FT_Activate_Size10x1412f5440
FT_Add_Default_Modules20x1412fdfa0
FT_Add_Module30x1412fa070
FT_Angle_Diff40x1412f97d0
FT_Atan250x1412f92c0
FT_Attach_File60x1412f9b40
FT_Attach_Stream70x1412f9a50
FT_Bitmap_Blend80x14135bf20
FT_Bitmap_Convert90x14135b2c0
FT_Bitmap_Copy100x14135b0d0
FT_Bitmap_Done110x14135c770
FT_Bitmap_Embolden120x14135b830
FT_Bitmap_Init130x14135b090
FT_Bitmap_New140x14135b0b0
FT_CeilFix150x1412f2290
FT_Cos160x1412f9140
FT_DivFix170x1412f23d0
FT_Done_Face180x1412f3bb0
FT_Done_FreeType190x1412fe230
FT_Done_Glyph200x14135d570
FT_Done_Library210x1412f5b20
FT_Done_MM_Var220x14135d8e0
FT_Done_Size230x1412f3c70
FT_Error_String240x1412f2ed0
FT_Face_GetCharVariantIndex250x1412f53d0
FT_Face_GetCharVariantIsDefault260x1412f5380
FT_Face_GetCharsOfVariant270x1412f5290
FT_Face_GetVariantSelectors280x1412f5330
FT_Face_GetVariantsOfChar290x1412f52e0
FT_Face_Properties300x1412f4bf0
FT_FloorFix310x1412f22a0
FT_Get_Advance320x1412fb2a0
FT_Get_Advances330x1412fb040
FT_Get_BDF_Charset_ID340x141434d10
FT_Get_BDF_Property350x141434dd0
FT_Get_CMap_Format360x1412f5120
FT_Get_CMap_Language_ID370x1412f50a0
FT_Get_Char_Index380x1412f4a90
FT_Get_Charmap_Index390x1412f4a50
FT_Get_Color_Glyph_ClipBox400x1412f5e10
FT_Get_Color_Glyph_Layer410x1412f5d80
FT_Get_Color_Glyph_Paint420x1412f5dd0
FT_Get_Colorline_Stops430x1412f5ee0
FT_Get_Default_Named_Instance440x14135e230
FT_Get_First_Char450x1412f4b60
FT_Get_Font_Format460x1412f2ee0
FT_Get_Glyph470x14135d050
FT_Get_Glyph_Name480x1412f4d70
FT_Get_Kerning490x1412f4770
FT_Get_MM_Blend_Coordinates500x14135df20
FT_Get_MM_Var510x14135d800
FT_Get_MM_WeightVector520x14135da90
FT_Get_Module530x1412f5650
FT_Get_Multi_Master540x14135d720
FT_Get_Name_Index550x1412f4cc0
FT_Get_Next_Char560x1412f4ac0
FT_Get_PS_Font_Info570x141434e50
FT_Get_PS_Font_Private580x141434f10
FT_Get_PS_Font_Value590x141434f80
FT_Get_Paint600x1412f5e90
FT_Get_Paint_Layers610x1412f5e50
FT_Get_Postscript_Name620x1412f4e80
FT_Get_Renderer630x1412f54e0
FT_Get_Sfnt_LangTag640x1412f7c70
FT_Get_Sfnt_Name650x1412f7b50
FT_Get_Sfnt_Name_Count660x1412f7940
FT_Get_Sfnt_Table670x1412f4f20
FT_Get_SubGlyph_Info680x1412f5cf0
FT_Get_Track_Kerning690x1412f4930
FT_Get_Transform700x1412f3b60
FT_Get_TrueType_Engine_Type710x1412f5ca0
FT_Get_Var_Axis_Flags720x14135e0e0
FT_Get_Var_Blend_Coordinates730x14135e000
FT_Get_Var_Design_Coordinates740x14135dcd0
FT_Get_X11_Font_Format750x1412f2f10
FT_GlyphSlot_Own_Bitmap760x14135c6c0
FT_Glyph_Copy770x14135ce50
FT_Glyph_Get_CBox780x14135d1c0
FT_Glyph_Stroke790x141360bf0
FT_Glyph_StrokeBorder800x141360d40
FT_Glyph_To_Bitmap810x14135d270
FT_Glyph_Transform820x14135d160
FT_Has_PS_Glyph_Names830x141434ec0
FT_Init_FreeType840x1412fe1a0
FT_Library_SetLcdFilter850x1412f35c0
FT_Library_SetLcdFilterWeights860x1412f35b0
FT_Library_SetLcdGeometry870x1412f35d0
FT_Library_Version880x1412f5ae0
FT_List_Add890x1412fdde0
FT_List_Finalize900x1412fdf30
FT_List_Find910x1412fddb0
FT_List_Insert920x1412fde20
FT_List_Iterate930x1412fdee0
FT_List_Remove940x1412fde50
FT_List_Up950x1412fde90
FT_Load_Char960x1412fb400
FT_Load_Glyph970x1412fa840
FT_Load_Sfnt_Table980x1412f4f80
FT_Matrix_Invert990x1412f2580
FT_Matrix_Multiply1000x1412f2440
FT_MulDiv1010x1412f22b0
FT_MulFix1020x1412f23b0
FT_New_Face1030x1412fbf80
FT_New_Glyph1040x14135cf60
FT_New_Library1050x1412f5a40
FT_New_Memory_Face1060x1412fce30
FT_New_Size1070x1412f9eb0
FT_Open_Face1080x1412fceb0
FT_Outline_Check1090x1412f63b0
FT_Outline_Copy1100x1412f6430
FT_Outline_Decompose1110x1412f5f20
FT_Outline_Done1120x1412f64e0
FT_Outline_Embolden1130x1412f7500
FT_Outline_EmboldenXY1140x1412f6ff0
FT_Outline_GetInsideBorder1150x14135ff20
FT_Outline_GetOutsideBorder1160x14135ff40
FT_Outline_Get_Bitmap1170x1412f6c30
FT_Outline_Get_CBox1180x1412f65a0
FT_Outline_Get_Orientation1190x1412f6e10
FT_Outline_New1200x1412fd950
FT_Outline_Render1210x1412f6ab0
FT_Outline_Reverse1220x1412f6a00
FT_Outline_Transform1230x1412f6d40
FT_Outline_Translate1240x1412f69b0
FT_Palette_Data_Get1250x1412f2db0
FT_Palette_Select1260x1412f2e30
FT_Palette_Set_Foreground_Color1270x1412f2ea0
FT_Property_Get1280x1412f59e0
FT_Property_Set1290x1412f59c0
FT_Reference_Face1300x1412f3b90
FT_Reference_Library1310x1412f5a20
FT_Remove_Module1320x1412f5780
FT_Render_Glyph1330x1412fa800
FT_Request_Size1340x1412f44f0
FT_RoundFix1350x1412f2270
FT_Select_Charmap1360x1412f49c0
FT_Select_Size1370x1412f4480
FT_Set_Char_Size1380x1412f4620
FT_Set_Charmap1390x1412f51a0
FT_Set_Debug_Hook1400x1412f5c70
FT_Set_Default_Log_Handler1410x141361320
FT_Set_Default_Properties1420x1412fdfe0
FT_Set_Log_Handler1430x141361310
FT_Set_MM_Blend_Coordinates1440x14135ddb0
FT_Set_MM_Design_Coordinates1450x14135d910
FT_Set_MM_WeightVector1460x14135d9d0
FT_Set_Named_Instance1470x14135e100
FT_Set_Pixel_Sizes1480x1412f46d0
FT_Set_Renderer1490x1412f5520
FT_Set_Transform1500x1412f3ad0
FT_Set_Var_Blend_Coordinates1510x14135df10
FT_Set_Var_Design_Coordinates1520x14135db70
FT_Sfnt_Table_Info1530x1412f5010
FT_Sin1540x1412f9190
FT_Stream_OpenLZW1550x14134de20
FT_Stroker_BeginSubPath1560x141360370
FT_Stroker_ConicTo1570x141360310
FT_Stroker_CubicTo1580x141360340
FT_Stroker_Done1590x1413600c0
FT_Stroker_EndSubPath1600x1413603d0
FT_Stroker_Export1610x141360790
FT_Stroker_ExportBorder1620x141360760
FT_Stroker_GetBorderCounts1630x141360620
FT_Stroker_GetCounts1640x1413606b0
FT_Stroker_LineTo1650x1413601a0
FT_Stroker_New1660x14135ff60
FT_Stroker_ParseOutline1670x1413607e0
FT_Stroker_Rewind1680x141360090
FT_Stroker_Set1690x141360040
FT_Tan1700x1412f91e0
FT_Trace_Set_Default_Level1710x141361300
FT_Trace_Set_Level1720x1413612f0
FT_Vector_From_Polar1730x1412f97a0
FT_Vector_Length1740x1412f9510
FT_Vector_Polarize1750x1412f9690
FT_Vector_Rotate1760x1412f9380
FT_Vector_Transform1770x1412f6ca0
FT_Vector_Unit1780x1412f9340
TT_New_Context1790x14130c950
TT_RunIns1800x141309890
gme_ay_type1810x144b49e40
gme_clear_playlist1820x1416c5860
gme_delete1830x1416c5500
gme_enable_accuracy1840x1416c5830
gme_equalizer1850x1416c5900
gme_free_info1860x1416c56f0
gme_gbs_type1870x144b49fd8
gme_gym_type1880x144b4a150
gme_hes_type1890x144b4a380
gme_identify_extension1900x1416c4f90
gme_identify_file1910x1416c5940
gme_identify_header1920x1416c4e90
gme_ignore_silence1930x1416c57f0
gme_kss_type1940x144b4a4f8
gme_load_custom1950x1416c54d0
gme_load_data1960x1416c5b70
gme_load_file1970x1416c54c0
gme_multi_channel1980x1416c5880
gme_mute_voice1990x1416c5810
gme_mute_voices2000x1416c5820
gme_new_emu2010x1416c5210
gme_new_emu_multi_channel2020x1416c5360
gme_nsf_type2030x144b4a988
gme_nsfe_type2040x144b4aaa0
gme_open_data2050x1416c5bc0
gme_open_file2060x1416c5a10
gme_play2070x1416c5770
gme_sap_type2080x144b4ac30
gme_seek2090x1416c57c0
gme_seek_samples2100x1416c57d0
gme_set_autoload_playback_limit2110x1416c5080
gme_set_equalizer2120x1416c58a0
gme_set_fade2130x1416c5780
gme_set_stereo_depth2140x1416c5710
gme_set_tempo2150x1416c5800
gme_set_user_cleanup2160x1416c5750
gme_set_user_data2170x1416c5740
gme_spc_type2180x144b4ae00
gme_start_track2190x1416c5760
gme_tell2200x1416c57a0
gme_tell_samples2210x1416c57b0
gme_track_count2220x1416c5540
gme_track_ended2230x1416c5790
gme_track_info2240x1416c5550
gme_type2250x1416c5520
gme_type_extension2260x1416c5060
gme_type_list2270x1416c4d80
gme_type_multitrack2280x1416c5870
gme_type_system2290x1416c5930
gme_user_data2300x1416c5730
gme_vgm_type2310x144b4b0d0
gme_vgz_type2320x144b4b080
gme_voice_count2330x1416c57e0
gme_voice_name2340x1416c5920
gme_warning2350x1416c5530
gme_wrong_file_type2360x144b49c90
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
050100s020406080100

Click to jump to process

050100s0.0050100MB

Click to jump to process

Click to jump to process

Target ID:0
Start time:16:59:26
Start date:18/07/2024
Path:C:\Users\user\Desktop\ffprobe.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\ffprobe.exe"
Imagebase:0x7ff600050000
File size:86'542'848 bytes
MD5 hash:CC47FCC83E6F1EA6D9FAC3461B7CC95F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:10
Start time:16:59:28
Start date:18/07/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff75da10000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly