× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 162d252f011f7de553f985f1d84b3cda353d5883cc8db5c813f24b731b02f0aa
File name: f0c69010re99rs3srdh03e0792dsh85b.exe
Detection ratio: 25 / 67
Analysis date: 2018-11-19 03:11:51 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.DIYX 20181118
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181118
ALYac Trojan.Agent.DIYX 20181119
Arcabit Trojan.Agent.DIYX 20181118
Avast Win32:MalwareX-gen [Trj] 20181119
AVG Win32:MalwareX-gen [Trj] 20181119
Avira (no cloud) TR/Kryptik.ieokv 20181118
BitDefender Trojan.Agent.DIYX 20181119
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20181022
Cylance Unsafe 20181119
DrWeb Trojan.Gozi.363 20181119
eGambit PE.Heur.InvalidSig 20181119
Emsisoft Trojan.Agent.DIYX (B) 20181119
Endgame malicious (moderate confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CQXB 20181118
F-Secure Trojan.Agent.DIYX 20181119
Fortinet W32/GenKryptik.CQXB!tr 20181119
GData Trojan.Agent.DIYX 20181119
K7GW Trojan ( 005413c41 ) 20181118
MAX malware (ai score=86) 20181119
eScan Trojan.Agent.DIYX 20181119
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181119
Rising Backdoor.Vawtrak!8.11D (RDM+:cmRtazqscriDewXTgSS7hqFvzM3s) 20181119
Sophos AV Mal/EncPk-ANX 20181118
VBA32 BScope.TrojanSpy.Ursnif 20181116
AegisLab 20181119
Alibaba 20180921
Avast-Mobile 20181118
AVware 20180925
Babable 20180918
Baidu 20181116
Bkav 20181116
CAT-QuickHeal 20181118
ClamAV 20181119
CMC 20181118
Cybereason 20180225
Cyren 20181119
F-Prot 20181119
Ikarus 20181118
Sophos ML 20181108
Jiangmin 20181119
K7AntiVirus 20181118
Kaspersky 20181119
Kingsoft 20181119
Malwarebytes 20181119
McAfee 20181119
McAfee-GW-Edition 20181118
Microsoft 20181119
Palo Alto Networks (Known Signatures) 20181119
Panda 20181118
Qihoo-360 20181119
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181114
Symantec 20181118
Symantec Mobile Insight 20181108
TACHYON 20181119
Tencent 20181119
TheHacker 20181118
TotalDefense 20181118
TrendMicro 20181119
TrendMicro-HouseCall 20181119
Trustlook 20181119
ViRobot 20181118
Webroot 20181119
Yandex 20181116
Zillya 20181116
ZoneAlarm by Check Point 20181118
Zoner 20181119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 6:06 AM 2/7/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-10 22:20:11
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2009:12:10 23:20:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 42d4fb42ced605e6fc1f96c78a4ae48b
SHA1 66ca36500a21d32149855f823f22fd328e9bf77e
SHA256 162d252f011f7de553f985f1d84b3cda353d5883cc8db5c813f24b731b02f0aa
ssdeep
1536:7lhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:7lh2MGRQB4qIWokRHkCG

authentihash acc23752840ea45053a54803368bbf436edc931d68d2ddc9daad284ad4d333af
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-19 03:11:51 UTC ( 3 months ago )
Last submission 2018-11-19 03:11:51 UTC ( 3 months ago )
File names f0c69010re99rs3srdh03e0792dsh85b.exe
httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.