× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 73908010153beb844eea5332a05b7d088ed669eb620d6cdc7e79ccc2dd2e610f
File name: output.114502919.txt
Detection ratio: 25 / 68
Analysis date: 2018-11-18 19:15:26 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.DIYX 20181118
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181118
Arcabit Trojan.Agent.DIYX 20181118
Avast Win32:MalwareX-gen [Trj] 20181118
AVG Win32:MalwareX-gen [Trj] 20181118
Avira (no cloud) TR/Kryptik.ieokv 20181118
BitDefender Trojan.Agent.DIYX 20181118
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20181022
Cylance Unsafe 20181118
DrWeb Trojan.Gozi.363 20181118
eGambit PE.Heur.InvalidSig 20181118
Emsisoft Trojan.Agent.DIYX (B) 20181118
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CQXB 20181118
F-Secure Trojan.Agent.DIYX 20181118
Fortinet W32/GenKryptik.CQXB!tr 20181118
GData Trojan.Agent.DIYX 20181118
K7GW Trojan ( 005413c41 ) 20181118
MAX malware (ai score=88) 20181118
eScan Trojan.Agent.DIYX 20181118
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181118
Qihoo-360 HEUR/QVM20.1.4B01.Malware.Gen 20181118
Rising Backdoor.Vawtrak!8.11D (RDM+:cmRtazrMMvN0tWWwoh+gpvJPlblS) 20181118
Sophos AV Mal/EncPk-ANX 20181118
VBA32 BScope.TrojanSpy.Ursnif 20181116
AegisLab 20181118
Alibaba 20180921
Antiy-AVL 20181118
Avast-Mobile 20181118
Babable 20180918
Baidu 20181116
Bkav 20181116
CAT-QuickHeal 20181118
ClamAV 20181118
CMC 20181118
Comodo 20181118
Cybereason 20180225
Cyren 20181118
F-Prot 20181118
Ikarus 20181118
Sophos ML 20181108
Jiangmin 20181118
K7AntiVirus 20181118
Kaspersky 20181118
Kingsoft 20181118
Malwarebytes 20181118
McAfee 20181118
McAfee-GW-Edition 20181118
Microsoft 20181118
Palo Alto Networks (Known Signatures) 20181118
Panda 20181118
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181114
Symantec 20181118
Symantec Mobile Insight 20181108
TACHYON 20181118
Tencent 20181118
TheHacker 20181118
TotalDefense 20181118
TrendMicro 20181118
TrendMicro-HouseCall 20181118
Trustlook 20181118
VIPRE 20181118
ViRobot 20181118
Webroot 20181118
Yandex 20181116
Zillya 20181116
ZoneAlarm by Check Point 20181118
Zoner 20181118
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 1:57 AM 2/8/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-10-15 09:30:37
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2006:10:15 10:30:37+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 d24c46cb6a2d3c586acb4d37b225ffd0
SHA1 ab05af0cf98c83e62b9c15c06d81ac283ab7a53a
SHA256 73908010153beb844eea5332a05b7d088ed669eb620d6cdc7e79ccc2dd2e610f
ssdeep
1536:2lhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:2lh2MGRQB4qIWokRHkCG

authentihash 521ede581fb4a94de7e3b2fdfabd09ed85849019c75fc4a6d667e36924bc262d
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-18 19:15:26 UTC ( 3 months ago )
Last submission 2018-11-18 19:15:26 UTC ( 3 months ago )
File names output.114502919.txt
httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.