× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 006c4a55d6a345e23246cb124f4fad46278aea7c28de45c7362ce582e1ab0a29
File name: isheriff_68d9f9c6741ccf4ed9f77ee0275acda9.bin
Detection ratio: 49 / 57
Analysis date: 2016-06-05 18:22:35 UTC ( 3 months, 3 weeks ago )
Antivirus Result Update
ALYac Gen:Variant.Kazy.167505 20160605
AVG Generic_r.CEH 20160605
AVware Trojan.Win32.Reveton.a (v) 20160605
Ad-Aware Gen:Variant.Kazy.167505 20160605
AegisLab Troj.Fakeav.W32.Cprotection!c 20160604
AhnLab-V3 Trojan/Win32.CProtection 20160605
Antiy-AVL Trojan[FakeAV]/Win32.CProtection 20160605
Arcabit Trojan.Kazy.D28E51 20160605
Avast Win32:FakeAV-EOA [Trj] 20160605
Avira (no cloud) TR/Spy.ZBot.ajoie 20160605
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160603
Baidu-International Trojan.Win32.FakeAV.qpd 20160605
BitDefender Gen:Variant.Kazy.167505 20160605
Bkav HW32.Packed.5013 20160604
CAT-QuickHeal Trojanpws.Fareit.016895 20160604
CMC Trojan-FakeAV.Win32.CProtection!O 20160602
ClamAV Win.Trojan.Agent-1138665 20160605
Comodo TrojWare.Win32.Kryptik.AZPR 20160605
Cyren W32/Zbot.OW.gen!Eldorado 20160605
DrWeb Trojan.Fakealert.20509 20160605
ESET-NOD32 Win32/Adware.XPAntiSpyware.AE 20160604
Emsisoft Gen:Variant.Kazy.167505 (B) 20160605
F-Prot W32/Zbot.OW.gen!Eldorado 20160605
F-Secure Gen:Variant.Kazy.167505 20160605
Fortinet W32/Kryptik.WEX!tr 20160605
GData Gen:Variant.Kazy.167505 20160605
Ikarus Trojan.Win32.Loktrom 20160605
Jiangmin Trojan/CProtection.on 20160605
K7AntiVirus Trojan ( 0040f5ea1 ) 20160605
K7GW Trojan ( 0040f5ea1 ) 20160605
Kaspersky HEUR:Trojan.Win32.Generic 20160605
Malwarebytes Trojan.Zbot.RS 20160605
McAfee PWS-Zbot-FAWU!68D9F9C6741C 20160605
McAfee-GW-Edition BehavesLike.Win32.Downloader.dc 20160605
eScan Gen:Variant.Kazy.167505 20160605
Microsoft Rogue:Win32/FakeRean 20160605
NANO-Antivirus Trojan.Win32.FakeAV.ccsiok 20160605
Panda Trj/Genetic.gen 20160605
Qihoo-360 HEUR/Malware.QVM20.Gen 20160605
Rising Trojan.Generic-baP0fjN8e4Q (Cloud) 20160605
SUPERAntiSpyware Trojan.Agent/Gen-FakeRean 20160605
Sophos Troj/FakeAV-GNK 20160605
Symantec Packed.Generic.408 20160605
Tencent Win32.Trojan-fakeav.Cprotection.Wrqv 20160605
TrendMicro TROJ_SPNR.2BDQ13 20160605
TrendMicro-HouseCall TROJ_SPNR.2BDQ13 20160605
VBA32 Trojan.CLR.26407 20160603
VIPRE Trojan.Win32.Reveton.a (v) 20160605
Yandex FraudTool.CProtection!TWzpS6HrN6g 20160605
Alibaba 20160603
Kingsoft 20160605
TheHacker 20160604
TotalDefense 20160605
ViRobot 20160605
Zillya 20160603
Zoner 20160605
nProtect 20160603
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-22 19:23:12
Entry Point 0x0000409F
Number of sections 9
PE sections
PE imports
lstrcatA
PathMakePrettyW
PathIsFileSpecA
UrlGetPartA
StrCmpIW
StrChrIA
StrToIntW
UrlIsOpaqueA
GetForegroundWindow
GetClassLongW
IsDlgButtonChecked
IsCharUpperW
GetMessagePos
GetCaretPos
PE exports
Number of PE resources by type
MUI 4
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 6
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:12:22 20:23:12+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
71680

LinkerVersion
25.17

EntryPoint
0x409f

InitializedDataSize
168448

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 68d9f9c6741ccf4ed9f77ee0275acda9
SHA1 ca6360c12c5753b597b170884395c82a25eb185f
SHA256 006c4a55d6a345e23246cb124f4fad46278aea7c28de45c7362ce582e1ab0a29
ssdeep
6144:ExEmGCRmc4Gx9vULSgTPaHCHhGh4Mw1OH29lOTvlsJ9c:ExCXc4SMLnPqCQ4VgXZGc

authentihash 07637bd15cbe3ce3b422be3e22ea6191145585ec86bba1106d668fc2edc6d739
imphash 7a9578c3e2f150125be0f9eba9902df9
File size 235.5 KB ( 241152 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2013-04-24 10:29:20 UTC ( 3 years, 5 months ago )
Last submission 2016-06-05 18:22:35 UTC ( 3 months, 3 weeks ago )
File names security_cleaner.exe
68d9f9c6741ccf4ed9f77ee0275acda9_kaf
isheriff_68d9f9c6741ccf4ed9f77ee0275acda9.bin
qdg.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
DNS requests
UDP communications