avfilter-7.dll file report

MD5 27b077b7390be034bfe380859a21434e
Latest seen 2025-12-08 23:01:49 (5 months ago)
First seen 2023-09-14 23:01:51 (2 years ago)
Size 10 MB
Publisher FFmpeg Project
Product FFmpeg

Why it matters

Evidence available for this file

Detection

No final classification is available yet.

Timeline

First seen 2023-09-14 23:01:51 (2 years ago); latest analysis 2025-12-08 23:01:49 (5 months ago).

Publisher context

Company metadata: FFmpeg Project. Product metadata: FFmpeg.

Digital signature

Signed by Nelogica Sistemas de Software Ltda.. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Use the hash and metadata below to verify the exact file identity.
  2. Review publisher, signature, paths, and PE details for inconsistencies.
  3. Run a local scan if the file appears unexpectedly or starts with Windows.

avfilter-7.dll is a Windows file recorded in the ThreatInfo database. It is associated with FFmpeg. The reported company name is FFmpeg Project. The current detection status is Undefined, based on the latest analysis from 2025-12-08 23:01:49 (5 months ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: FFmpeg
Company Name: FFmpeg Project
MD5: 27b077b7390be034bfe380859a21434e
Size: 10 MB
First Published: 2023-09-14 23:01:51 (2 years ago)
Latest Published: 2025-12-08 23:01:49 (5 months ago)
Status: Undefined (on last analysis)
Analysis Date: 2025-12-08 23:01:49 (5 months ago)
Signed By: Nelogica Sistemas de Software Ltda.
Status: Valid

The signature on avfilter-7.dll is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%appdata%\nelogica\xptrader
%appdata%\nelogica\profit
%appdata%\nelogica\easytrader_glaucio
%appdata%\nelogica\easytrader_01
%appdata%\nelogica\easytrader
%appdata%\nelogica\profit
%appdata%\nelogica\profit
%appdata%\nelogica\torotrader
%appdata%\nelogica\torotrader
%appdata%\nelogica\profit

ThreatInfo has observed avfilter-7.dll in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Brazil with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for avfilter-7.dll is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

avfilter-7.dll is identified as pe for 64 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000180000000
Entry Address: 0x000013d0

PE Sections:

Name Size of data MD5
.text 6456320 de81cbefc6a70bc921ec7d74c2dca1b1
.rodata 512 470f75c686987d4468708385350bce53
.data 73216 6a6cf3aefe84289524f1fa8f100cd61f
.rdata 3556352 85f2a348b6b60ca6b41c4f52eebd72eb
.pdata 156672 7ae3b07845c191b412a8c7148d354c0f
.xdata 196608 f92dc38e8f772af8e2cda4b861e8a181
.bss 0 d41d8cd98f00b204e9800998ecf8427e
.edata 2560 5571eff31066baa76c188d7be38cbb5b
.idata 20992 8875bf9134558501a781e025aee41bad
.CRT 512 af7cb360c5a78695320e36a2fae423c3
.tls 512 bdf221a873cdc3124b2a140b918d4eba
.rsrc 1024 0c878112e3348301ecdf3d5bbce9e196
.reloc 52224 aa1ddf265d611532e2129d4f54623407

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: