× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7d3610d7528d3fdd6a19e0ae3b377527d13d5df2ee1bf7934a57fe964709ecb
File name: .
Detection ratio: 28 / 67
Analysis date: 2018-11-20 17:38:20 UTC ( 2 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Agent.DIYX 20181120
AhnLab-V3 Trojan/Win32.Skeeyah.R244952 20181120
ALYac Trojan.Agent.DIYX 20181120
Arcabit Trojan.Agent.DIYX 20181120
Avast Win32:MalwareX-gen [Trj] 20181120
AVG Win32:MalwareX-gen [Trj] 20181120
Avira (no cloud) TR/Kryptik.ieokv 20181120
BitDefender Trojan.Agent.DIYX 20181120
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20181022
Cylance Unsafe 20181120
DrWeb Trojan.Gozi.363 20181120
eGambit PE.Heur.InvalidSig 20181120
Emsisoft Trojan.Agent.DIYX (B) 20181120
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMXV 20181120
F-Secure Trojan.Agent.DIYX 20181120
Fortinet W32/GenKryptik.CQXB!tr 20181120
GData Trojan.Agent.DIYX 20181120
K7AntiVirus Trojan ( 005413c41 ) 20181120
K7GW Trojan ( 005413c41 ) 20181120
MAX malware (ai score=81) 20181120
eScan Trojan.Agent.DIYX 20181120
NANO-Antivirus Trojan.Win32.Ursnif.fkesyg 20181120
Panda Trj/Genetic.gen 20181120
Qihoo-360 HEUR/QVM20.1.560F.Malware.Gen 20181120
Rising Backdoor.Vawtrak!8.11D (RDM+:cmRtazqscriDewXTgSS7hqFvzM3s) 20181120
Sophos AV Mal/EncPk-ANX 20181120
VBA32 BScope.TrojanSpy.Ursnif 20181120
AegisLab 20181120
Alibaba 20180921
Antiy-AVL 20181120
Avast-Mobile 20181120
Babable 20180918
Baidu 20181120
Bkav 20181120
CAT-QuickHeal 20181120
ClamAV 20181120
CMC 20181120
Cybereason 20180225
Cyren 20181120
F-Prot 20181120
Ikarus 20181120
Sophos ML 20181108
Jiangmin 20181120
Kaspersky 20181120
Kingsoft 20181120
Malwarebytes 20181120
McAfee 20181120
McAfee-GW-Edition 20181120
Microsoft 20181120
Palo Alto Networks (Known Signatures) 20181120
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181114
Symantec 20181120
Symantec Mobile Insight 20181108
TACHYON 20181120
Tencent 20181120
TheHacker 20181118
TotalDefense 20181118
TrendMicro 20181120
TrendMicro-HouseCall 20181120
Trustlook 20181120
ViRobot 20181120
Webroot 20181120
Yandex 20181119
Zillya 20181119
ZoneAlarm by Check Point 20181120
Zoner 20181120
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2016 The Apache Software Foundation.

Product Apache HTTP Server
Original name httpd.exe
Internal name httpd.exe
File version 2.4.25
Description Apache HTTP Server
Comments Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Signature verification The digital signature of the object did not verify.
Signing date 9:33 PM 2/8/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-13 19:10:51
Entry Point 0x00002430
Number of sections 6
PE sections
Overlays
MD5 9daee6e60c3c105e932de69d4d0ae1c4
File type data
Offset 311296
Size 7552
Entropy 7.24
PE imports
SetSecurityDescriptorOwner
CryptEnumProviderTypesW
RegQueryInfoKeyW
JetTerm2
GetCharWidthFloatA
GetModuleHandleW
DsBindWithCredW
PathRemoveExtensionA
CreateWindowStationA
ToAscii
SetClipboardViewer
midiInStart
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
4294905856

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.4.25.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Apache HTTP Server

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
290816

EntryPoint
0x2430

OriginalFileName
httpd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016 The Apache Software Foundation.

FileVersion
2.4.25

TimeStamp
2012:08:13 21:10:51+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
httpd.exe

ProductVersion
2.4.25

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Apache Software Foundation

CodeSize
20480

ProductName
Apache HTTP Server

ProductVersionNumber
2.4.25.0

DistributedBy
The Apache Haus

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 02d85be40a8cfb8c83ffdcbe160d6aab
SHA1 9a61cf7c51c6961631497d8ca35d5c602d608219
SHA256 a7d3610d7528d3fdd6a19e0ae3b377527d13d5df2ee1bf7934a57fe964709ecb
ssdeep
1536:Zlhc9MLyRR5AB4yxIAGWVV9+PmW49KBEPgjC+EhqIHkC5oi7E:Zlh2MGRQB4qIWokRHkCG

authentihash c0c26f5fe69f4d6a7fad31d6088712a42e4476c6b70ed17b54ec20456fdf8f44
imphash 99c3bb22296edaa6606a5feb0290d47b
File size 311.4 KB ( 318848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-20 17:38:20 UTC ( 2 months, 4 weeks ago )
Last submission 2018-11-20 17:38:20 UTC ( 2 months, 4 weeks ago )
File names .
httpd.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.