Files signed by Logitech ZC-9016 USA State of Washington

Logitech ZC-9016 USA State of Washington

Logitech ZC-9016 USA State of Washington is a digital signature publisher name observed in ThreatInfo records. This page groups 16 signed files and shows whether those files are currently classified as clean, undefined, or detected.

A digital signature can help identify a publisher, but it does not always prove that a file is safe. Certificates may be abused, stolen, expired, or attached to modified installers, so the file hash and detection status should be checked together.

Detection signal

Detected files use this signature name

At least one file signed as Logitech ZC-9016 USA State of Washington is detected by GridinSoft. Review the hashes below and scan the device if one of these files is present.

Download GridinSoft scanner
fodhelper.exe ad26711f1f01bda91cb795c20677717b Ransom.Sabsik
C7B2.exe ac875713694f42bfd0a4031b1508ca48 Trojan.Downloader
fix.exe b0db165a6f72f4286fc4e93e36f5326e Trojan.Heur!
fix.exe b807be7c395ebbdfe30750a39d94baec Trojan.Heur!
7rvBO95wXOHKrbrRwlJlQ9yM.exe 5eb1a1dcc242abf86112b2bc42d7a404 Ransom.Sabsik
jjwruua 778f174d7483a70a1a8e327ae3d4fcb8 General Threat
839E.exe c6c28128200eb59c1d37229a6bf8a713 Ransom.Wacatac
IEUpdater1.exe c5f2133374de0048e3535a1f67bd6f19 General Threat
FANBooster1.exe 6fb531631a9ad8fcdf18a9401ccb40e0 General Threat
7347.exe eeed8d1b835c7eddaf05e58e1b615240 Ransom.Wacatac
XRJNZC.exe da6f79a45fb07ab47ef198653d13327c Trojan.Downloader
Utsysc.exe 1f912c12896eb6942bd3f067d47b9250 Trojan.Sabsik
qdslthcxjdtt.exe 400c97d395e0c010fc3b89c67d63a62f Trojan.Amadey
koahlnhxfo.exe 50902f0d1a1db8b2b317fbabc83ea064 Ransom.Sabsik
utsysc.exe d20c169833df7d5a176530bf19e65813 Trojan.Amadey
F65F.exe 33c6731fb7512630217f405efc5c71b4 Ransom.Wacatac

Certificate review summary

Do not trust this signature name by itself

ThreatInfo found detected files associated with Logitech ZC-9016 USA State of Washington. A matching signature name should be checked together with the file hash, detection verdict, and source path.

Recommended checks

  • Open any matching file report and compare the MD5 hash.
  • Confirm the file path and download source before trusting the binary.
  • Run a GridinSoft scan if a detected file from this list is present.