× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 006c4a55d6a345e23246cb124f4fad46278aea7c28de45c7362ce582e1ab0a29
File name: qdg.exe
Detection ratio: 45 / 56
Analysis date: 2015-04-08 01:29:14 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
ALYac Gen:Variant.Kazy.167505 20150408
AVG Generic_r.CEH 20150408
AVware Trojan.Win32.Reveton.a (v) 20150408
Ad-Aware Gen:Variant.Kazy.167505 20150408
Agnitum FraudTool.CProtection!TWzpS6HrN6g 20150407
AhnLab-V3 Trojan/Win32.CProtection 20150407
Antiy-AVL Trojan[FakeAV]/Win32.CProtection 20150407
Avast Win32:Ransom-AHO [Trj] 20150408
Avira TR/Spy.ZBot.ajoie 20150408
Baidu-International Trojan.Win32.FakeAV.qpd 20150407
BitDefender Gen:Variant.Kazy.167505 20150408
Bkav HW32.Packed.5013 20150407
CMC Trojan-FakeAV.Win32.CProtection!O 20150407
ClamAV Win.Trojan.Agent-751167 20150408
Comodo TrojWare.Win32.Kryptik.AZPR 20150408
Cyren W32/Zbot.OW.gen!Eldorado 20150408
DrWeb Trojan.Fakealert.20509 20150408
ESET-NOD32 Win32/Adware.XPAntiSpyware.AE 20150408
Emsisoft Gen:Variant.Kazy.167505 (B) 20150407
F-Prot W32/Zbot.OW.gen!Eldorado 20150408
F-Secure Gen:Variant.Kazy.167505 20150408
Fortinet W32/Kryptik.WEX!tr 20150408
GData Gen:Variant.Kazy.167505 20150408
Ikarus Trojan.Win32.Loktrom 20150408
K7AntiVirus Trojan ( 0040f5ea1 ) 20150407
K7GW Trojan ( 0040f5ea1 ) 20150407
Kaspersky Trojan-FakeAV.Win32.CProtection.qpd 20150408
Kingsoft Win32.Troj.Agent.k.(kcloud) 20150408
Malwarebytes Trojan.Zbot.RS 20150408
McAfee PWS-Zbot-FANF!68D9F9C6741C 20150408
McAfee-GW-Edition PWS-Zbot-FANF!68D9F9C6741C 20150408
Microsoft Rogue:Win32/FakeRean 20150408
NANO-Antivirus Trojan.Win32.FakeAV.ccsiok 20150408
Norman Dorkbot.FDK 20150407
Panda Trj/Genetic.gen 20150407
Qihoo-360 HEUR/Malware.QVM20.Gen 20150408
SUPERAntiSpyware Trojan.Agent/Gen-FakeRean 20150408
Sophos Troj/FakeAV-GNK 20150408
Symantec Packed.Generic.408 20150408
Tencent Trojan.Win32.YY.Gen.0 20150408
TrendMicro TROJ_SPNR.2BDQ13 20150408
TrendMicro-HouseCall TROJ_SPNR.2BDQ13 20150408
VBA32 Trojan.CLR.26407 20150407
VIPRE Trojan.Win32.Reveton.a (v) 20150408
Zillya Trojan.FakeAV.Win32.299163 20150407
AegisLab 20150408
Alibaba 20150407
ByteHero 20150408
CAT-QuickHeal 20150407
Jiangmin 20150406
Rising 20150406
TheHacker 20150408
TotalDefense 20150407
ViRobot 20150408
Zoner 20150407
nProtect 20150407
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-22 19:23:12
Link date 8:23 PM 12/22/2012
Entry Point 0x0000409F
Number of sections 9
PE sections
PE imports
lstrcatA
PathMakePrettyW
PathIsFileSpecA
UrlGetPartA
StrCmpIW
StrChrIA
StrToIntW
UrlIsOpaqueA
GetForegroundWindow
GetClassLongW
IsDlgButtonChecked
IsCharUpperW
GetMessagePos
GetCaretPos
PE exports
Number of PE resources by type
MUI 4
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 6
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:12:22 20:23:12+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
71680

LinkerVersion
25.17

EntryPoint
0x409f

InitializedDataSize
168448

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 68d9f9c6741ccf4ed9f77ee0275acda9
SHA1 ca6360c12c5753b597b170884395c82a25eb185f
SHA256 006c4a55d6a345e23246cb124f4fad46278aea7c28de45c7362ce582e1ab0a29
ssdeep
6144:ExEmGCRmc4Gx9vULSgTPaHCHhGh4Mw1OH29lOTvlsJ9c:ExCXc4SMLnPqCQ4VgXZGc

authentihash 07637bd15cbe3ce3b422be3e22ea6191145585ec86bba1106d668fc2edc6d739
imphash 7a9578c3e2f150125be0f9eba9902df9
File size 235.5 KB ( 241152 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2013-04-24 10:29:20 UTC ( 2 years, 2 months ago )
Last submission 2013-04-27 00:06:30 UTC ( 2 years, 2 months ago )
File names security_cleaner.exe
68d9f9c6741ccf4ed9f77ee0275acda9_kaf
qdg.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
DNS requests
UDP communications