Snap.do
Cartão de pontuação de ameaças
EnigmaSoft Threat Scorecard
Os EnigmaSoft Threat Scorecards são relatórios de avaliação para diferentes ameaças de malware que foram coletadas e analisadas por nossa equipe de pesquisa. Os Scorecards de Ameaças da EnigmaSoft avaliam e classificam as ameaças usando várias métricas, incluindo fatores de risco reais e potenciais, tendências, frequência, prevalência e persistência. Os Scorecards de Ameaças da EnigmaSoft são atualizados regularmente com base em nossos dados e métricas de pesquisa e são úteis para uma ampla gama de usuários de computador, desde usuários finais que buscam soluções para remover malware de seus sistemas até especialistas em segurança que analisam ameaças.
Os Scorecards de Ameaças da EnigmaSoft exibem uma variedade de informações úteis, incluindo:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Nível de gravidade: O nível de gravidade determinado de um objeto, representado numericamente, com base em nosso processo de modelagem de risco e pesquisa, conforme explicado em nossos Critérios de Avaliação de Ameaças .
Computadores infectados: O número de casos confirmados e suspeitos de uma determinada ameaça detectada em computadores infectados conforme relatado pelo SpyHunter.
Consulte também Critérios de Avaliação de Ameaças .
| Popularity Rank: | 458 |
| Nível da Ameaça: | 50 % (Médio) |
| Computadores infectados: | 1,985,981 |
| Visto pela Primeira Vez: | October 12, 2012 |
| Visto pela Última Vez: | February 7, 2026 |
| SO (s) Afetados: | Windows |

Snap.do Image
O site Snap.do está associado à barra de ferramentas Smartbar do seu navegador. Esta barra de ferramentas é na verdade um componente de adware. Embora o Snap.do afirme que o Snap.do pode simplificar a maneira como você acessa seus sites favoritos, este site e sua barra de ferramentas associada têm vários comportamentos indesejados que estão mais associados a infecções por malware conhecidas do que a aplicativos legítimos. Na maioria das vezes, a barra de ferramentas Snap.do vem junto com programas freeware, incluídos no processo de instalação.
Lendo a descrição 'oficial' do Snap.do, seria difícil adivinhar que este site está vinculado a malware. As pessoas por trás do Snap.do afirmam que a visão deste site é se tornar um líder da indústria no fornecimento de soluções web simples e inteligentes para seus clientes, bem como programas complementares que melhorem a eficiência do navegador e tornem a navegação simples com interfaces e tecnologias que os usuários de computador já usam. utilizar. No entanto, esta visão não corresponde bem à realidade, uma vez que os produtos associados ao Snap.do possuem vários componentes que são mais comumente associados ao adware. Existem três razões pelas quais os produtos associados ao Snap.do são considerados inseguros para o seu computador:
- Os produtos associados ao Snap.do podem ter recursos de spyware. Ou seja, este site e software associado ao Snap.do coletarão seus dados pessoais e os distribuirão a terceiros sem sua autorização.
- O site Snap.do e o software associado ao Snap.do também podem ser considerados adware. Isso ocorre porque o Snap.do foi projetado para fornecer anúncios intrusivos com base em dados privados coletados sobre seus comportamentos de navegação. Esses anúncios podem aparecer como janelas pop-up ou incorporados em páginas da web.
- Snap.do também está vinculado a sequestradores de navegador. Esses tipos de componentes são projetados para alterar as configurações do navegador da Web, afetando quais sites você pode visitar e alteram a maneira como você navega na Internet.
Embora muitos sites associados a sequestradores de navegador possam, por si só, ser perfeitamente seguros, esse não é o caso do Snap.do e do software associado a este site. Devido aos seus componentes de adware e sequestrador de navegador, qualquer contato com o site Snap.do ou com software associado ao Snap.do deve ser seguido por uma verificação completa de sua máquina com um aplicativo anti-malware capaz.
Índice
Outros Nomes
2 fornecedores de segurança sinalizaram este arquivo como malicioso.
| Antivirus Vendor | Detecção |
|---|---|
| Symantec | Bloodhound.MalPE |
| AhnLab-V3 | PUP/Win32.Toolbar |
SpyHunter detecta e remove Snap.do
Detalhes Sobre os Arquivos do Sistema
| # | Nome do arquivo | MD5 |
Detecções
Detecções: O número de casos confirmados e suspeitos de uma determinada ameaça detectada nos computadores infectados conforme relatado pelo SpyHunter.
|
|---|---|---|---|
| 1. | cloudprinter.dat | cecec73094ba3e1b7abe788ae5a5204a | 271,577 |
| 2. | gravefresh.dat | 09eab69315e00b74dfa2ca27a5542829 | 145,225 |
| 3. | uninstall.ico | f0629844b82419eb727a3858f31dc85a | 1,891 |
| 4. | uninstall.dat | 6c5cac85dbc1df3ced89e3ea8645bc32 | 1,154 |
| 5. | Opentip.bin | aea5b44ab1e57f40069461bcf0dbc303 | 601 |
| 6. | Topfax.bin | e7feae9f793d93682572c065c3379626 | 197 |
| 7. | Vivafax.bin | fa780e83ab291186670cfe6b879f7085 | 158 |
| 8. | AppdnifmiN.exe | 24a74f120eccbec5942ce9c627c31db4 | 69 |
| 9. | ocep.exe | 2cf641c23d296a503827f6d409e0435d | 50 |
| 10. | CloudPrinter.exe | f79bbfd2beea6c3494bc65b638af5969 | 49 |
| 11. | Affenpinscher.exe | 8abe1277924bdf91880a0394a4cc18d8 | 43 |
| 12. | gld.exe | c5ea20f32c1ad46670b6a6442ddd04d6 | 38 |
| 13. | emphasising.exe | 25034e95214d42e20e9383a353c125f6 | 37 |
| 14. | uninstall.exe | 75e0ecad5d00e8407e32506361b93f98 | 35 |
| 15. | patience.exe | 069ad9a7445f11563b2919a5f006979c | 32 |
| 16. | Medotity.exe | a761ce1d6bc4eec1c527324584e9ddd8 | 28 |
| 17. | AppgnirtspmaT.exe | a674955ee5b9cf795d74aec1a3bdea46 | 25 |
| 18. | xifs.exe | 5f8cde8ed5585c50102a06981f1c9d7a | 24 |
| 19. | AppxeetouQ.exe | 68e27e78779d9780d2daef4d6c2148e4 | 24 |
| 20. | ApppazmaL.exe | be67210e37a467cf02375d7ab03270c6 | 23 |
| 21. | idna.exe | 543de71ba6de1353cd397c89a0951663 | 18 |
| 22. | AppmatdloH.exe | d0f9b6fec63f8cb1ddeaa0cac2512aa5 | 16 |
| 23. | Utatity.exe | 711203f1378abf0a39822f473287c8d8 | 15 |
| 24. | set.exe | 96a99a6e8b367ffa84b5f5b0bb2a4dc9 | 14 |
| 25. | Nettrans.exe | 56e23c8a026f980555a286c1ed873ec3 | 13 |
| 26. | crambo.exe | 7ce53c9cc3d30ab0df7d0e0849c9a7bf | 1 |
Detalhes sobre o Registro
Diretórios
Snap.do pode criar o seguinte diretório ou diretórios:
| %ALLUSERSPROFILE%\Anwendungsdaten\Logic Cramble |
| %ALLUSERSPROFILE%\Application Data\AppoxinloK |
| %ALLUSERSPROFILE%\Application Data\Graveairs |
| %ALLUSERSPROFILE%\Application Data\Zonsoft |
| %ALLUSERSPROFILE%\Application Data\Zonsofts |
| %ALLUSERSPROFILE%\Application Data\apptreppabm |
| %ALLUSERSPROFILE%\Application Data\apptreppabms |
| %ALLUSERSPROFILE%\Application Data\appxafmads |
| %ALLUSERSPROFILE%\Application Data\kipolam |
| %ALLUSERSPROFILE%\Application Data\mbappert |
| %ALLUSERSPROFILE%\Application Data\mbapperts |
| %ALLUSERSPROFILE%\Application Data\pangoc |
| %ALLUSERSPROFILE%\Application Data\pangocs |
| %ALLUSERSPROFILE%\Application Data\tolnix |
| %ALLUSERSPROFILE%\Application Data\tolnixs |
| %ALLUSERSPROFILE%\AppnegyloP |
| %ALLUSERSPROFILE%\AppnorriA |
| %ALLUSERSPROFILE%\AppnorriAs |
| %ALLUSERSPROFILE%\AppoxinloK |
| %ALLUSERSPROFILE%\AppoxinloKs |
| %ALLUSERSPROFILE%\ApppotriA |
| %ALLUSERSPROFILE%\ApppotriAs |
| %ALLUSERSPROFILE%\AppthgildeMs |
| %ALLUSERSPROFILE%\AppxelosknoK |
| %ALLUSERSPROFILE%\BluetoothPoint |
| %ALLUSERSPROFILE%\BluetoothPoints |
| %ALLUSERSPROFILE%\Dados de aplicativos\Logic Cramble |
| %ALLUSERSPROFILE%\Daltit |
| %ALLUSERSPROFILE%\Daltits |
| %ALLUSERSPROFILE%\Dane aplikacji\Logic Cramble |
| %ALLUSERSPROFILE%\Dati applicazioni\Logic Cramble |
| %ALLUSERSPROFILE%\Datos de programa\Logic Cramble |
| %ALLUSERSPROFILE%\Graveairs |
| %ALLUSERSPROFILE%\Hotfreshs |
| %ALLUSERSPROFILE%\Pitachoks |
| %ALLUSERSPROFILE%\Polygen |
| %ALLUSERSPROFILE%\Polygens |
| %ALLUSERSPROFILE%\Silsolis |
| %ALLUSERSPROFILE%\Silsoliss |
| %ALLUSERSPROFILE%\Singdaxs |
| %ALLUSERSPROFILE%\Trioflex |
| %ALLUSERSPROFILE%\Trioflexs |
| %ALLUSERSPROFILE%\Viaair |
| %ALLUSERSPROFILE%\Viaairs |
| %ALLUSERSPROFILE%\Zonsoft |
| %ALLUSERSPROFILE%\Zonsofts |
| %ALLUSERSPROFILE%\appcognap |
| %ALLUSERSPROFILE%\apppitsirt |
| %ALLUSERSPROFILE%\apprelrons |
| %ALLUSERSPROFILE%\apprelronss |
| %ALLUSERSPROFILE%\apptreppabm |
| %ALLUSERSPROFILE%\apptreppabms |
| %ALLUSERSPROFILE%\appxafmads |
| %ALLUSERSPROFILE%\appxinlot |
| %ALLUSERSPROFILE%\ecivreSevaS |
| %ALLUSERSPROFILE%\ecivreSevaSs |
| %ALLUSERSPROFILE%\iretadpUMGRs |
| %ALLUSERSPROFILE%\kipolam |
| %ALLUSERSPROFILE%\loceps |
| %ALLUSERSPROFILE%\mbappert |
| %ALLUSERSPROFILE%\mbapperts |
| %ALLUSERSPROFILE%\ohnuze |
| %ALLUSERSPROFILE%\ohnuzes |
| %ALLUSERSPROFILE%\pangoc |
| %ALLUSERSPROFILE%\pangocs |
| %ALLUSERSPROFILE%\tolnix |
| %ALLUSERSPROFILE%\tolnixs |
| %ALLUSERSPROFILE%\xifss |
| %COMMONPROGRAMFILES%\AlphaString |
| %COMMONPROGRAMFILES%\Alphafan |
| %COMMONPROGRAMFILES%\Alphait |
| %COMMONPROGRAMFILES%\Alphatone |
| %COMMONPROGRAMFILES%\Apsing |
| %COMMONPROGRAMFILES%\Betastrong |
| %COMMONPROGRAMFILES%\Bio-Com |
| %COMMONPROGRAMFILES%\Biolight |
| %COMMONPROGRAMFILES%\Confind |
| %COMMONPROGRAMFILES%\Doublelab |
| %COMMONPROGRAMFILES%\Ecojob |
| %COMMONPROGRAMFILES%\Finphase |
| %COMMONPROGRAMFILES%\Fixfax |
| %COMMONPROGRAMFILES%\Goodlex |
| %COMMONPROGRAMFILES%\GrooveTax |
| %COMMONPROGRAMFILES%\Groovecof |
| %COMMONPROGRAMFILES%\HatTrax |
| %COMMONPROGRAMFILES%\Hometough |
| %COMMONPROGRAMFILES%\Icetech |
| %COMMONPROGRAMFILES%\Inchstrong |
| %COMMONPROGRAMFILES%\IndigoNix |
| %COMMONPROGRAMFILES%\Joy-Com |
| %COMMONPROGRAMFILES%\Kanla |
| %COMMONPROGRAMFILES%\Key-Soft |
| %COMMONPROGRAMFILES%\KinDom |
| %COMMONPROGRAMFILES%\Kinin |
| %COMMONPROGRAMFILES%\Labzap |
| %COMMONPROGRAMFILES%\Lamcof |
| %COMMONPROGRAMFILES%\Lamity |
| %COMMONPROGRAMFILES%\Ontofan |
| %COMMONPROGRAMFILES%\OpenOvedom |
| %COMMONPROGRAMFILES%\OverLab |
| %COMMONPROGRAMFILES%\Ozercom |
| %COMMONPROGRAMFILES%\Physlab |
| %COMMONPROGRAMFILES%\Quojob |
| %COMMONPROGRAMFILES%\Quotelux |
| %COMMONPROGRAMFILES%\Qvoity |
| %COMMONPROGRAMFILES%\Ranfresh |
| %COMMONPROGRAMFILES%\Rantax |
| %COMMONPROGRAMFILES%\Rantip |
| %COMMONPROGRAMFILES%\Runtax |
| %COMMONPROGRAMFILES%\Soling |
| %COMMONPROGRAMFILES%\Stockphase |
| %COMMONPROGRAMFILES%\Strongtech |
| %COMMONPROGRAMFILES%\Strongtip |
| %COMMONPROGRAMFILES%\Subsoft |
| %COMMONPROGRAMFILES%\Tanity |
| %COMMONPROGRAMFILES%\Tipeco |
| %COMMONPROGRAMFILES%\ToughHold |
| %COMMONPROGRAMFILES%\Trusting |
| %COMMONPROGRAMFILES%\Truststring |
| %COMMONPROGRAMFILES%\Ventodex |
| %COMMONPROGRAMFILES%\Ventotone |
| %COMMONPROGRAMFILES%\Vilaflex |
| %COMMONPROGRAMFILES%\Villabam |
| %COMMONPROGRAMFILES%\VolCore |
| %COMMONPROGRAMFILES%\Voya-Strong |
| %COMMONPROGRAMFILES%\Zonlex |
| %COMMONPROGRAMFILES%\Zoomtip |
| %COMMONPROGRAMFILES%\Zoteco |
| %COMMONPROGRAMFILES%\Zuntough |
| %COMMONPROGRAMFILES%\biojob |
| %COMMONPROGRAMFILES%\dentozimeco |
| %COMMONPROGRAMFILES%\kanis |
| %COMMONPROGRAMFILES%\kay-dax |
| %COMMONPROGRAMFILES%\kinzuncom |
| %COMMONPROGRAMFILES%\vialax |
| %COMMONPROGRAMFILES%\zaamtom |
| %COMMONPROGRAMFILES%\zunfax |
| %COMMONPROGRAMFILES(x86)%\AlphaString |
| %COMMONPROGRAMFILES(x86)%\Alphafan |
| %COMMONPROGRAMFILES(x86)%\Alphait |
| %COMMONPROGRAMFILES(x86)%\Alphatone |
| %COMMONPROGRAMFILES(x86)%\Apsing |
| %COMMONPROGRAMFILES(x86)%\BigHotis |
| %COMMONPROGRAMFILES(x86)%\Bio-Com |
| %COMMONPROGRAMFILES(x86)%\Biodonkix |
| %COMMONPROGRAMFILES(x86)%\Biolight |
| %COMMONPROGRAMFILES(x86)%\Cofgohold |
| %COMMONPROGRAMFILES(x86)%\Confind |
| %COMMONPROGRAMFILES(x86)%\Donsillax |
| %COMMONPROGRAMFILES(x86)%\Doublelab |
| %COMMONPROGRAMFILES(x86)%\Ecojob |
| %COMMONPROGRAMFILES(x86)%\FaseQuoit |
| %COMMONPROGRAMFILES(x86)%\Finphase |
| %COMMONPROGRAMFILES(x86)%\Fix-Fan |
| %COMMONPROGRAMFILES(x86)%\Fixfax |
| %COMMONPROGRAMFILES(x86)%\FreshReddax |
| %COMMONPROGRAMFILES(x86)%\Freshlatlex |
| %COMMONPROGRAMFILES(x86)%\Goodlex |
| %COMMONPROGRAMFILES(x86)%\GrooveTax |
| %COMMONPROGRAMFILES(x86)%\Groovecof |
| %COMMONPROGRAMFILES(x86)%\HatTrax |
| %COMMONPROGRAMFILES(x86)%\Hometough |
| %COMMONPROGRAMFILES(x86)%\Icetech |
| %COMMONPROGRAMFILES(x86)%\Inchstrong |
| %COMMONPROGRAMFILES(x86)%\IndigoNix |
| %COMMONPROGRAMFILES(x86)%\Jobwarm |
| %COMMONPROGRAMFILES(x86)%\Joy-Com |
| %COMMONPROGRAMFILES(x86)%\Kanla |
| %COMMONPROGRAMFILES(x86)%\KinDom |
| %COMMONPROGRAMFILES(x86)%\Kinin |
| %COMMONPROGRAMFILES(x86)%\KonkDondax |
| %COMMONPROGRAMFILES(x86)%\Konksailnix |
| %COMMONPROGRAMFILES(x86)%\Labzap |
| %COMMONPROGRAMFILES(x86)%\Lamcof |
| %COMMONPROGRAMFILES(x86)%\Lamity |
| %COMMONPROGRAMFILES(x86)%\Math-Tax |
| %COMMONPROGRAMFILES(x86)%\Ontofan |
| %COMMONPROGRAMFILES(x86)%\OpeHotcom |
| %COMMONPROGRAMFILES(x86)%\OpenOvedom |
| %COMMONPROGRAMFILES(x86)%\OverLab |
| %COMMONPROGRAMFILES(x86)%\Overron |
| %COMMONPROGRAMFILES(x86)%\Ozercom |
| %COMMONPROGRAMFILES(x86)%\Physlab |
| %COMMONPROGRAMFILES(x86)%\Quojob |
| %COMMONPROGRAMFILES(x86)%\Quotelux |
| %COMMONPROGRAMFILES(x86)%\Qvoity |
| %COMMONPROGRAMFILES(x86)%\Ranfresh |
| %COMMONPROGRAMFILES(x86)%\Rantax |
| %COMMONPROGRAMFILES(x86)%\Rantip |
| %COMMONPROGRAMFILES(x86)%\Runtax |
| %COMMONPROGRAMFILES(x86)%\S-tax |
| %COMMONPROGRAMFILES(x86)%\Sailsaobam |
| %COMMONPROGRAMFILES(x86)%\Soling |
| %COMMONPROGRAMFILES(x86)%\Statphase |
| %COMMONPROGRAMFILES(x86)%\Stockphase |
| %COMMONPROGRAMFILES(x86)%\Strongtech |
| %COMMONPROGRAMFILES(x86)%\Strongtip |
| %COMMONPROGRAMFILES(x86)%\Subsoft |
| %COMMONPROGRAMFILES(x86)%\SumLax |
| %COMMONPROGRAMFILES(x86)%\Sunlam |
| %COMMONPROGRAMFILES(x86)%\Tanity |
| %COMMONPROGRAMFILES(x86)%\Tinfresh |
| %COMMONPROGRAMFILES(x86)%\Tipeco |
| %COMMONPROGRAMFILES(x86)%\Top-Sing |
| %COMMONPROGRAMFILES(x86)%\ToughHold |
| %COMMONPROGRAMFILES(x86)%\Tresstring |
| %COMMONPROGRAMFILES(x86)%\Trippletantip |
| %COMMONPROGRAMFILES(x86)%\Trisla |
| %COMMONPROGRAMFILES(x86)%\Trusting |
| %COMMONPROGRAMFILES(x86)%\Truststring |
| %COMMONPROGRAMFILES(x86)%\Vento-Zap |
| %COMMONPROGRAMFILES(x86)%\Ventodex |
| %COMMONPROGRAMFILES(x86)%\Ventotone |
| %COMMONPROGRAMFILES(x86)%\Ventotop |
| %COMMONPROGRAMFILES(x86)%\Vilaflex |
| %COMMONPROGRAMFILES(x86)%\Villabam |
| %COMMONPROGRAMFILES(x86)%\VolCore |
| %COMMONPROGRAMFILES(x86)%\Voya-Strong |
| %COMMONPROGRAMFILES(x86)%\Xxx-Ransoft |
| %COMMONPROGRAMFILES(x86)%\Y--Tex |
| %COMMONPROGRAMFILES(x86)%\Zerex |
| %COMMONPROGRAMFILES(x86)%\Zonlex |
| %COMMONPROGRAMFILES(x86)%\ZooSiltam |
| %COMMONPROGRAMFILES(x86)%\Zoomstock |
| %COMMONPROGRAMFILES(x86)%\Zoomtip |
| %COMMONPROGRAMFILES(x86)%\Zoteco |
| %COMMONPROGRAMFILES(x86)%\Zuntough |
| %COMMONPROGRAMFILES(x86)%\biojob |
| %COMMONPROGRAMFILES(x86)%\dentozimeco |
| %COMMONPROGRAMFILES(x86)%\fixcom |
| %COMMONPROGRAMFILES(x86)%\freshhome |
| %COMMONPROGRAMFILES(x86)%\kanis |
| %COMMONPROGRAMFILES(x86)%\math-plus |
| %COMMONPROGRAMFILES(x86)%\vialax |
| %COMMONPROGRAMFILES(x86)%\zaamtom |
| %COMMONPROGRAMFILES(x86)%\zunfax |
| %PROGRAMFILES%\drÅÀÌ |
| %PROGRAMFILES%\eakzaihjajkuc |
| %PROGRAMFILES%\eauknrbnwrpu2 |
| %PROGRAMFILES%\owdbzuqlndefnbhfezr |
| %PROGRAMFILES%\patience |
| %PROGRAMFILES%\rfwjmjnpstqu2 |
| %PROGRAMFILES(x86)%\eakzaihjajkuc |
| %PROGRAMFILES(x86)%\eauknrbnwrpu2 |
| %PROGRAMFILES(x86)%\owdbzuqlndefnbhfezr |
| %PROGRAMFILES(x86)%\patience |
| %PROGRAMFILES(x86)%\rfwjmjnpstqu2 |
| %TEMP%\eakzaihjajkuc |
| %TEMP%\eauknrbnwrpu2 |
| %TEMP%\owdbzuqlndefnbhfezr |
| %TEMP%\rfwjmjnpstqu2 |
URLs
Snap.do pode chamar os seguintes URLs:
| anysearchmanager.com |
| feed.24-stream.com |
| feed.amazingtab.com |
| feed.any-templates.com |
| feed.cryptoverto.com |
| feed.ebooks-club.com |
| feed.free-converterz.com |
| feed.funkystreams.com |
| feed.game-jungle.com |
| feed.getlive.news |
| feed.giph-it.com |
| feed.live-streaming.online |
| feed.runspeedcheck.com |
| feed.salahweb.com |
| feed.sound-hd.com |
| feed.streamingworldcup.com |
| moviebox-online.com |
| pixel.pxcollect.com |
| protected-search.com |
| searchfrit.com |
| videoconverterz.com |
Relatório de análise
Informação geral
| Family Name: | Snap.do |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
17d9801dce7b2dc7c46fdd26acc0ba2c
SHA1:
8545820d072de65afcc10387b4c332f1e97a9f94
Tamanho do Arquivo:
1.90 MB, 1895383 bytes
|
|
MD5:
5255c259aea306dc85d02632088eb2f6
SHA1:
968991d2fae12d9590273f73a34ac27a9ce897d3
SHA256:
388CC75558DCD9EA17F7E5375D1B8210C459AB80FBA52858298C15E4CD983A90
Tamanho do Arquivo:
1.09 MB, 1085448 bytes
|
|
MD5:
50537fe7850cc6bc1543831aaaefcd8b
SHA1:
555f9c5f06cfda575a47c4823d34ff7d64e41c69
SHA256:
5CE4D65B4516C87D3570409A9A5653AC5082332A9BEC0E57656B34DDCDE01598
Tamanho do Arquivo:
1.78 MB, 1784582 bytes
|
|
MD5:
08564401d98ca3aef076f5bcff6fd92b
SHA1:
87491142ca85ee8c43697811d714a45b4feaf8f3
SHA256:
94344C9883EC50E7EFB8F4A659E7DF27EB45D29ECD77E966965904C2C1E9BA78
Tamanho do Arquivo:
46.08 KB, 46080 bytes
|
|
MD5:
5b9a59e587e521a340a0f67fc8cf9c42
SHA1:
178941db8e34e3796d6f614c4734e8d50eac0f81
SHA256:
FC4D59C280A1600138EA6751200C41409FAA9743F56DDB2DA426DC03741094F4
Tamanho do Arquivo:
28.67 KB, 28672 bytes
|
Show More
|
MD5:
0a310c5fe82ee582182b13670904f3db
SHA1:
6cfdcfde9260096f676d0f291855f0ef4a4b69cd
SHA256:
9DC6F63F89D57DFB55CBDB0961141A16C79AD81191B6FE5F16DD8FC06D812752
Tamanho do Arquivo:
143.36 KB, 143360 bytes
|
|
MD5:
be818539582ce5a7e1cb02131337c86c
SHA1:
0866adf752e61a32111a3b5873a353b455faaa91
SHA256:
807B1D5B01F4A00A6042B7FCC65166878A664D4217B6F20334403BF6E6FA7A32
Tamanho do Arquivo:
1.90 MB, 1895380 bytes
|
|
MD5:
3bf1f473ad29a813a7ee57758227399b
SHA1:
5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8
SHA256:
908BF77A1649EF5B6D392A085BD390109DE634BBDDBC32735B376EF312EAC23F
Tamanho do Arquivo:
278.51 KB, 278509 bytes
|
|
MD5:
930ac080f1d1a9c28206693393ac14c8
SHA1:
58bf542fda7b4ceb31a4380c5af4f4581fe7c40e
SHA256:
8A01C22729651C8A690242ADBEB20BF4FEB88F94F16B072EA9971867404CB0EE
Tamanho do Arquivo:
278.51 KB, 278511 bytes
|
|
MD5:
3823bd64dc7bab0fbbbdee49126ac939
SHA1:
786ada42d0f88ac5be1ce5667be4cc13283289ec
SHA256:
1F70AAD5E8FF7B0C70E97370A11F214AE1291A1503EEA8FD16485D587F938844
Tamanho do Arquivo:
278.52 KB, 278518 bytes
|
|
MD5:
eb3102f5aa56414121b5b606c6b96bbf
SHA1:
d9226e505ea4dd21a3fbcf843280489c1f04cf64
SHA256:
81C963787897B391D38520C9C70CDCCE6E6888E20071EB918354D8A81055026D
Tamanho do Arquivo:
1.90 MB, 1895383 bytes
|
|
MD5:
5179732733e1692e6dd203798a9209ff
SHA1:
fbf87847dc4e35b728b05038fe9454e6e0de4053
SHA256:
3652266AE06A904C64131AC62246DE3BC1418D248C180BAFFF9BA384F5E4E894
Tamanho do Arquivo:
352.86 KB, 352855 bytes
|
|
MD5:
a4406a102105a87d3fa1a7cf0afe8521
SHA1:
c5a253b7c27b1f02910cc4977659a25fc6d73330
SHA256:
C024E8A4FBA1F6890D1C4B56EAC302644377949FD18D232BEA603312AA862011
Tamanho do Arquivo:
350.54 KB, 350544 bytes
|
|
MD5:
67473d7d1837c6f36b4c234dd418ea1c
SHA1:
6a84ee99b5ebc4d9d13c1b92ff453b4af97964c4
SHA256:
0C5F77732629EB72073D852906AB55809FF3C5BC405AD8E3A9B9629E1DCCFA14
Tamanho do Arquivo:
1.90 MB, 1895382 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Nome | Valor |
|---|---|
| Assembly Version |
|
| Comments | Shopping Helper Smartbar |
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| MY POP SHOP LTD | UTN-USERFirst-Object | Root Not Trusted |
| ReSoft LTD. | UTN-USERFirst-Object | Hash Mismatch |
File Traits
- .NET
- Acronis Installer
- dll
- HighEntropy
- Installer Manifest
- No Version Info
- RAR (In Overlay)
- RARinO
- WinRAR SFX
- WinZip SFX
Show More
- WRARSFX
- x64
- x86
- ZIP (In Overlay)
- ZIPinO
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\programdata\logic cramble\set.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\programdata\logic cramble\set.exe.config | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\programdata\logic cramble\system.data.sqlite.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\system.data.sqlite.linq.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\system.data.sqlite.xml | Generic Write,Read Attributes |
| c:\programdata\logic cramble\x64\sqlite.interop.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\x86\sqlite.interop.dll | Generic Write,Read Attributes |
| c:\programdata\networkpacketmanitor | Synchronize,Write Attributes |
| c:\programdata\networkpacketmanitor\__tmp_rar_sfx_access_check_13199750 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\networkpacketmanitor\nettrans.exe | Generic Write,Read Attributes |
Show More
| c:\programdata\networkpacketmanitor\nettrans.exe | Synchronize,Write Attributes |
| c:\programdata\networkpacketmanitor\nettrans.exe.config | Generic Write,Read Attributes |
| c:\programdata\networkpacketmanitor\nettrans.exe.config | Synchronize,Write Attributes |
| c:\programdata\prefssecure | Synchronize,Write Attributes |
| c:\programdata\prefssecure\__tmp_rar_sfx_access_check_153473046 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\prefssecure\__tmp_rar_sfx_access_check_928656 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\prefssecure\nettrans.exe | Generic Write,Read Attributes |
| c:\programdata\prefssecure\nettrans.exe | Synchronize,Write Attributes |
| c:\programdata\prefssecure\nettrans.exe.config | Generic Write,Read Attributes |
| c:\programdata\prefssecure\nettrans.exe.config | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2145625 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2146234 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_22828 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2926062 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_3318750 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_443312 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe.config | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe.config | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.linq.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.linq.dll | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Dados | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 얈딡Ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꋨ娪䴞ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 됫菒屑ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 驘叶橘ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 튵㿈茝ǜ | RegNtPreCreateKey |
| HKCU\local settings\muicache\1b\52c64b7e::@c:\windows\system32\ndfapi.dll,-40001 | Windows Network Diagnostics | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Keyboard Access |
|
| Process Shell Execute |
|
| Service Control |
|
| Syscall Use |
Show More
68 additional items are not displayed above. |
| Process Terminate |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Dexqkvmh\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\8545820d072de65afcc10387b4c332f1e97a9f94_0001895383.exe"
|
"C:\Users\Dexqkvmh\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
"cmd.exe" /c sc create "backlh" binPath= "C:\ProgramData\Logic Cramble\set.exe" DisplayName= "Background Logic Handler" start= "auto"
|
C:\WINDOWS\system32\sc.exe sc create "backlh" binPath= "C:\ProgramData\Logic Cramble\set.exe" DisplayName= "Background Logic Handler" start= "auto"
|
WriteConsole: [SC] CreateServi
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\178941db8e34e3796d6f614c4734e8d50eac0f81_0000028672.,LiQMAxHB
|
(NULL) C:\Users\Suuzwzuw\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\0866adf752e61a32111a3b5873a353b455faaa91_0001895380"
|
"C:\Users\Suuzwzuw\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
WriteConsole: [SC] ChangeServi
|
(NULL) C:\ProgramData\PrefsSecure\Nettrans.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe "c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509"" DisplayName= "Prefs Secure" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509" DisplayName= "Prefs Secure" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509" DisplayName= "Prefs Secure" start= auto
|
(NULL) C:\ProgramData\PrefsSecure\Nettrans.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe "c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511"" DisplayName= "Prefs Secure" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511" DisplayName= "Prefs Secure" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511" DisplayName= "Prefs Secure" start= auto
|
(NULL) C:\ProgramData\NetworkPacketManitor\Nettrans.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe "c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518"" DisplayName= "Network Packet Manitor" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518" DisplayName= "Network Packet Manitor" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518" DisplayName= "Network Packet Manitor" start= auto
|
(NULL) C:\Users\Bfviuslq\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\d9226e505ea4dd21a3fbcf843280489c1f04cf64_0001895383"
|
"C:\Users\Bfviuslq\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
(NULL) C:\Users\Mdlgqdel\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\6a84ee99b5ebc4d9d13c1b92ff453b4af97964c4_0001895382"
|
"C:\Users\Mdlgqdel\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|