apc_random_id_generator.exe file report

MD5 ceee905a278dc72f407b4af32366089d
Latest seen 2026-03-29 23:01:02 (a month ago)
First seen 2021-06-17 20:20:08 (4 years ago)
Size 276 KB

Why it matters

Evidence available for this file

Detection

Latest status is clean for this hash.

Timeline

First seen 2021-06-17 20:20:08 (4 years ago); latest analysis 2026-03-29 23:01:02 (a month ago).

Publisher context

Company metadata: Avira Operations GmbH & Co. KG. Product metadata: APC random ID generator.

Digital signature

Signed by Avira Operations GmbH & Co. KG. ThreatInfo marks this publisher as trusted for this record.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Confirm the hash and publisher match the expected software.
  2. Review the observed locations and signature information below.
  3. Rescan if the file was downloaded from an unknown source or appears in an unusual path.

apc_random_id_generator.exe is a Windows file recorded in the ThreatInfo database. It is associated with APC random ID generator. The reported company name is Avira Operations GmbH & Co. KG. The current detection status is Clean, based on the latest analysis from 2026-03-29 23:01:02 (a month ago).

This record is currently marked as clean, but file reputation can depend on the exact path, hash, and source. Compare the MD5 and publisher data below with the file on your system.

Product Name: APC random ID generator
Company Name: Avira Operations GmbH & Co. KG
MD5: ceee905a278dc72f407b4af32366089d
Size: 276 KB
First Published: 2021-06-17 20:20:08 (4 years ago)
Latest Published: 2026-03-29 23:01:02 (a month ago)
Status: Clean (on last analysis)
Analysis Date: 2026-03-29 23:01:02 (a month ago)
Signed By: Avira Operations GmbH & Co. KG
Status: Trusted Publisher

ThreatInfo marks this publisher as trusted for this record, but the file hash and source should still match the expected software distribution.

%commonappdata%\restoro
%commonappdata%\restoro\av\avupdate_tmp_fk9ur7\av4\avira1351\savapi4lib\win32
%commonappdata%\restoro
%commonappdata%\restoro
%sysdrive%\rei
%commonappdata%\restoro
%sysdrive%\rei
%commonappdata%\restoro\av\avupdate_tmp_dwujzv\av4\avira1433\savapi4lib\win32
%commonappdata%\restoro\av\avupdate_tmp_dwujzv\av4\avira1396\savapi4lib\win32
%commonappdata%\totalav\updates

ThreatInfo has observed apc_random_id_generator.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

12.3%
8.0%
5.6%
4.9%
4.9%
4.9%
4.9%
3.7%
3.1%
2.5%
2.5%
2.5%
2.5%
2.5%
2.5%
2.5%
1.9%
1.9%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
1.2%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%
0.6%

The strongest geographic signal for this file is United States with 12.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 94.6%
Windows 7 4.8%
Windows 8.1 0.6%

The most common operating system signal for apc_random_id_generator.exe is Windows 10 with 94.6% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

apc_random_id_generator.exe is identified as pe for 32 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x0001de10

PE Sections:

Name Size of data MD5
.text 216064 b44502367be563d621b96c7192e49b23
.rdata 33280 331b14dddf158901272c4794bb0c3ce6
.data 7680 9b16b3d346931bb7959b45a826758b47
.rsrc 2048 15f8ea88363c41b833e53196560deaf5
.reloc 7168 24a052079b26b05e918a2252c06eddff

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: