File Search: 

ThreatExpert's awareness of the file "inetpub.exe":

Across all ThreatExpert reports, the file "inetpub.exe" was mostly identified as a threat.
File "inetpub.exe" has the following statistics:
Total number of reports analysed611,932
Number of cases that involved the file "inetpub.exe"285
Number of incidents when this file was found to be a threat264
Statistical volume of cases when "inetpub.exe" was a threat93%
Please enable javascript to display the chart.
Notes:
  • Please note that the name of the file should NOT be used to define if it is legitimate or not. Such determination can only be made by observing its dynamic behaviour.
  • In order to check a file, please submit it to ThreatExpert.
  • For a comprehensive pro-active protection against threats, please consider ThreatFire - our behavioral antivirus solution.
The file "inetpub.exe" is known to be created under the following filenames:
%AllUsersProfile%\desktop.exe
%AllUsersProfile%\documents.exe
%AllUsersProfile%\documentsread1st.exe
%AllUsersProfile%\drm.exe
%AllUsersProfile%\drm\drm.exe
%AllUsersProfile%\favorites.exe
%AllUsersProfile%\templates.exe
%AppData%\aibo\aibologon.exe
%AppData%\aibo\aiboreg.exe
%AppData%\aibo\aiboserv.exe
%AppData%\alna.scr
%AppData%\explorer.exe
%AppData%\flexiblesoft.exe
%AppData%\microsoft.exe
%AppData%\microsoft\cd burning\khatra.exe
%AppData%\microsoft\helpctr.exe
%AppData%\microsoft\mmc\mmc.exe
%AppData%\microsoft\windows media\9.0.exe
%AppData%\microsoft\windows.exe
%AppData%\microsoft\winnt.com
%AppData%\powerfile.exe
%AppData%\powerfile.exe.exe
%AppData%\system.exe
%AppData%\system.exe.exe
%AppData%\vmware.exe
%CommonAppData%\brainsys\dirlock.exe
%CommonAppData%\lambda\dirlock.exe
%CommonAppData%\microsoft\crypto\dss\dss.exe
%CommonAppData%\microsoft\kbdriver\classified.exe
%CommonAppData%\microsoft\kbdriver\kbdsys.exe
%CommonAppData%\microsoft\kbdriver\kbsys.exe
%CommonAppData%\microsoft\keyboard\kbdsys.exe
%CommonAppData%\polarisys\dirlock.exe
%CommonAppData%\vmware.exe
%CommonAppData%\zilch.infinisoft\dirlock.exe
%CommonDesktopDir%\classified.exe
%CommonDesktopDir%\classified\classified.exe
%CommonDesktopDir%\desktop.exe
%CommonDesktopDir%\documents.exe
%CommonDocuments%\classified.exe
%CommonDocuments%\classified\classified.exe
%CommonDocuments%\documents.exe
%CommonDocuments%\my music\classified.exe
%CommonDocuments%\my music\sample playlists\00090beb.exe
%CommonDocuments%\read1st.exe
%CommonFavorites%\favorites.exe
%CommonPrograms%\accessories.exe
%CommonPrograms%\accessories\accessibility.exe
%CommonPrograms%\accessories\accessibility\accessibility.exe
%CommonPrograms%\accessories\accessories.exe
%CommonPrograms%\accessories\communications.exe
%CommonPrograms%\accessories\communications\communications.exe
%CommonPrograms%\accessories\entertainment.exe
%CommonPrograms%\accessories\entertainment\entertainment.exe
%CommonPrograms%\programs.exe
%CommonPrograms%\startup.exe
%CommonPrograms%\startup\classified.exe
%CommonPrograms%\startup\startup.exe
%CommonStartMenu%\programs.exe
%CommonTemplates%\templates.exe
%DesktopDir%\desktop.exe
%Favorites%\favorites.exe
%Favorites%\links.exe
%Favorites%\links\links.exe
%Favorites%\svchost.exe
%FontsDir%\fonts.exe
%LocalSettings%\temp.exe
%MyDocuments%\classified.exe
%MyDocuments%\x-files.exe
%Profiles%\default user\cookies.exe
%Profiles%\default user\cookies\cookies.exe
%Profiles%\default user\desktop.exe
%Profiles%\default user\desktop\desktop.exe
%Profiles%\default user\favorites.exe
%Profiles%\default user\favorites\favorites.exe
%Profiles%\default user\local settings\temp.exe
%Profiles%\default user\nethood.exe
%Profiles%\default user\nethood\nethood.exe
%Profiles%\default user\printhood.exe
%Profiles%\default user\printhood\printhood.exe
%Profiles%\default user\recent.exe
%Profiles%\default user\recent\recent.exe
%Profiles%\default user\sendto.exe
%Profiles%\default user\sendto\sendto.exe
%Profiles%\default user\start menu\programs.exe
%Profiles%\default user\start menu\programs\accessories.exe
%Profiles%\default user\start menu\programs\startup.exe
%Profiles%\default user\templates.exe
%Profiles%\default user\templates\templates.exe
%Profiles%\localservice.exe
%Profiles%\localservice\cookies.exe
%Profiles%\localservice\cookies\cookies.exe
%Profiles%\localservice\localservice.exe
%Profiles%\networkservice.exe
%Profiles%\networkservice\cookies.exe
%Profiles%\networkservice\cookies\cookies.exe
%Profiles%\networkservice\networkservice.exe
%ProgramFiles%\adobe.exe
%ProgramFiles%\adobe\adobe.exe
%ProgramFiles%\classified.exe
Notes:
  • %AllUsersProfile% is a variable that specifies the all users' profile folder. By default, this is C:\Documents and Settings\All Users (Windows NT/2000/XP).
  • %AppData% is a variable that refers to the file system directory that serves as a common repository for application-specific data. A typical path is C:\Documents and Settings\[UserName]\Application Data.
  • %CommonAppData% is a variable that refers to the file system directory containing application data for all users. A typical path is C:\Documents and Settings\All Users\Application Data.
  • %CommonDesktopDir% is a variable that refers to the file system directory that contains files and folders that appear on the desktop for all users. A typical path is C:\Documents and Settings\All Users\Desktop (Windows NT/2000/XP).
  • %CommonDocuments% is a variable that refers to the file system directory that contains documents that are common to all users. A typical paths is C:\Documents and Settings\All Users\Documents.
  • %CommonFavorites% is a variable that refers to the file system directory that serves as a common repository for all users' favorite items. A typical path is C:\Documents and Settings\All Users\Favorites (Windows NT/2000/XP).
  • %CommonPrograms% is a variable that refers to the file system directory that contains the directories for the common program groups that appear on the Start menu for all users. A typical path is C:\Documents and Settings\All Users\Start Menu\Programs (Windows NT/2000/XP).
  • %CommonStartMenu% is a variable that refers to the file system directory that contains the programs and folders that appear on the Start menu for all users. A typical path is C:\Documents and Settings\All Users\Start Menu (Windows NT/2000/XP).
  • %CommonTemplates% is a variable that refers to the file system directory that contains the templates that are available to all users. A typical path is C:\Documents and Settings\All Users\Templates (Windows NT/2000/XP).
  • %DesktopDir% is a variable that refers to the file system directory used to physically store file objects on the desktop. A typical path is C:\Documents and Settings\[UserName]\Desktop.
  • %Favorites% is a variable that refers to the file system directory that serves as a common repository for the user's favorite items. A typical path is C:\Documents and Settings\[UserName]\Favorites.
  • %FontsDir% is a variable that refers to a virtual folder containing fonts. A typical path is C:\Windows\Fonts.
  • %LocalSettings% is a variable that specifies the current user's local settings folder. By default, this is C:\Documents and Settings\[UserName]\Local Settings (Windows NT/2000/XP).
  • %MyDocuments% is a variable that refers to the file system directory used to physically store a user's common repository of documents. A typical path is C:\Documents and Settings\[UserName]\My Documents.
  • %Profiles% is a variable that refers to the file system directory containing user profile folders. A typical path is C:\Documents and Settings.
  • %ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.

The file "inetpub.exe" has the following possible countries of origin:
OriginNumber of Incidents
China59
Indonesia22
United Kingdom22
Russian Federation8
Spain3
Brazil2
Iran1
Republic of Korea1
Taiwan1

The following threats are known to be associated with the file "inetpub.exe":
Threat AliasNumber of Incidents
W32.SillyFDC [Symantec]97
Trojan.VB.EPP [PC Tools]34
Generic VB.b [McAfee]32
Worm.Win32.VB.act [Kaspersky Lab]28
Trojan.Win32.VB.atg [Kaspersky Lab]25
Mal/Generic-A [Sophos]23
W32.SillyDC [Symantec]23
W32/Sality-AM [Sophos]23
W32/Virut.gen [McAfee]23
Virus:Win32/Sality.AM [Microsoft]22
W32.Sality.AE [Symantec]22
Worm.Win32.VB [Ikarus]20
Worm.Win32.AutoRun [Ikarus]19
Mal/VB-F [Sophos]18
W32/Sality.gen [McAfee]18
W32/Generic.Delphi.b [McAfee]17
Generic.dx [McAfee]16
W32/Autorun.worm.i.gen [McAfee]16
Trojan Horse [Symantec]15
Generic VB [McAfee]14
Trojan-Dropper.Win32.Autoit.k [Kaspersky Lab]14
Virus.Win32.IndoVirus.a [Kaspersky Lab]14
W32/Generic.b [McAfee]14
Virus.Win32.Sality [Ikarus]13
Win-Trojan/Xema.variant [AhnLab]13
W32.Daprosy [Symantec]12
W32/Autorun.worm.h [McAfee]12
Worm:Win32/VB.UK [Microsoft]12
Virus.Win32.VB.eu [Kaspersky Lab]11
Worm.VB.AARY [PC Tools]11
Virus:Win32/Virut.gen!B [Microsoft]10
W32/Autorun.worm.f [McAfee]10
Win32/Xema.worm.32768.AS [AhnLab]10
Trojan-Dropper.Win32.Autoit [Ikarus]9
Worm:Win32/Autorun.UD [Microsoft]9
PE_SALITY.JER [Trend Micro]8
PE_VIRUT.XP [Trend Micro]8
Worm.Win32.AutoRun.dfs [Kaspersky Lab]8
PE_VIRUT.GEN-2 [Trend Micro]7
PE_VIRUT.XL [Trend Micro]7
WORM_SILLY.SCC [Trend Micro]7
Mal/Behav-043 [Sophos]6
Malware.Daprosy [PC Tools]6
Net-Worm.SillyFDC [PC Tools]6
PE_SALITY.EK [Trend Micro]6
Trojan.Win32.VB [Ikarus]6
Virus.Win32.Sality.aa [Kaspersky Lab]6
W32.Setclo [Symantec]6
W32/Autorun-AMS [Sophos]6
Win32.Sality.AM.Gen [PC Tools]6
Worm:Win32/Indopit.A [Microsoft]6
Bloodhound.Unknown [Symantec]5
Mal/SillyFDC-A [Sophos]5
PE_VIRUT.XI [Trend Micro]5
Virus.Win32.Folcom.b [Kaspersky Lab]5
Virus.Win32.VB.ke [Ikarus]5
Virus.Win32.VB.ke [Kaspersky Lab]5
W32.Pitin [Symantec]5
Win32/Kashu.B [AhnLab]5
Worm.Win32.VB.arz [Kaspersky Lab]5
Worm.Win32.VB.bz [Kaspersky Lab]5
WORM_VB.ESM [Trend Micro]5
Email-Worm.Win32.Agent.kd [Kaspersky Lab]4
PE_SALITY.EN-1 [Trend Micro]4
Trojan-Dropper.Win32.VB.jen [Kaspersky Lab]4
TrojanDropper:Win32/VB.BV [Microsoft]4
Virus.Win32.IndoVirus.a [Ikarus]4
Virus.Win32.Virut.o [Kaspersky Lab]4
Virus.Win32.Virut.q [Kaspersky Lab]4
W32.Blune [Symantec]4
W32/Autorun-QY [Sophos]4
W32/Autorun-UN [Sophos]4
W32/AutoRun-XU [Sophos]4
W32/Vetor-A [Sophos]4
W32/Virut.gen.a [McAfee]4
Win32.Virut.Gen.4 [PC Tools]4
Worm.VB!sd6 [PC Tools]4
Worm.Win32.AutoRun.dnf [Kaspersky Lab]4
Worm:Win32/Autorun [Microsoft]4
Worm:Win32/VB [Microsoft]4
PE_SALITY.BI [Trend Micro]3
PE_SALITY.M [Trend Micro]3
PE_VIRUT.JN [Trend Micro]3
Virus.Win32.VB.bb [Ikarus]3
W32.Virut.W [Symantec]3
W32/Autoit-BP [Sophos]3
W32/Autorun.worm.gen.cl [McAfee]3
W32/Foldrap-A [Sophos]3
W32/Generic.m [McAfee]3
W32/Rubble-B [Sophos]3
W32/Sality.ae [McAfee]3
W32/YahLover.worm.gen [McAfee]3
Win32.Sality.AK [PC Tools]3
Win32/Autorun.worm.872448 [AhnLab]3
Worm.AutoRun!sd5 [PC Tools]3
Worm.Win32.AutoRun.fqc [Kaspersky Lab]3
Worm.Win32.RussoTuristo [Ikarus]3
Worm:Win32/Autorun.DA [Microsoft]3
WORM_VB.IYO [Trend Micro]3
Email-Worm.Agent!sd6 [PC Tools]2