PUP.AAuto.A

Threat Scorecard

Popularity Rank: 6,593
Threat Level: 10 % (Normal)
Infected Computers: 4,789
First Seen: June 11, 2012
Last Seen: November 11, 2025
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda W32/VB.ACD.worm
AVG Worm/Brontok.GP
Fortinet W32/AutoRun.DHZ!worm
Ikarus Worm.Win32.AutoRun
AhnLab-V3 Win-Trojan/Malagent.110592
Microsoft Worm:Win32/Autorun.CS
eTrust-Vet Win32/Meuvat.A
Sophos W32/Thili-A
AntiVir TR/Agent.WBB
Comodo Worm.Win32.AutoRun.~LW
BitDefender Worm.Generic.366579
Kaspersky Worm.Win32.AutoRun.dhz
ClamAV Worm.VB-964
Avast Win32:AutoRun-AHK [Wrm]
Symantec Trojan Horse

File System Details

PUP.AAuto.A may create the following file(s):
# File Name MD5 Detections
1. JavaMachine.exe 4ed2dcf97eded84ba5f12b5f72a02b92 6

Analysis Report

General information

Family Name: PUP.AAuto.A
Signature status: No Signature

Known Samples

MD5: c8855bcc23c7b292cc4352d97a3ae9b5
SHA1: 55376106d79425f381c9b38d34d6d34794783a31
SHA256: 33C8D2CEBF650BFF113B61A96D32ABB9C29A513EBA545D90BD0E8985AD90F0FA
File Size: 1.33 MB, 1325056 bytes
MD5: 976c638d0cb5b63b1fcb9a392be96fe1
SHA1: d6dcbbd95469dd6b639866366a74e1d4d5300edd
SHA256: 02181509994A515F817CD440EC0583923001E798A332E1614333B2AA5BF62E04
File Size: 8.77 MB, 8768000 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • Python成长路
  • UNASISTEMA C.A.
File Description
  • POS Upgrade 2022
  • 视频号下载器
File Version
  • 2.5.1.25
  • 2.0.0.62
Internal Name WechatVideoSniffer2.0
Legal Copyright
  • Copyright (C) UNASISTEMA C.A. 2020
  • kanadeblisst
Original Filename
  • POS Upgrade.exe
  • WechatVideoSniffer2.5.exe
Product Name
  • POS Upgrade
  • 视频号下载器
Product Version
  • 2.5.1.25
  • 2.0.0.62

File Traits

  • GetConsoleWindow
  • HighEntropy
  • packed
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 38,951
Potentially Malicious Blocks: 1,380
Whitelisted Blocks: 37,416
Unknown Blocks: 155

Visual Map

x x 0 x 0 0 0 x 0 x x x x 0 x x x x x x x x 0 x x 0 x 0 x x x 0 x x x 0 0 0 x 0 x x 0 x x x 0 x x 0 x 0 x x x x x 0 x x x x x x x 0 x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x ? x x ? x x 0 x 0 x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x 0 0 0 x x x x 0 x x x ? x x x 0 x x x x x ? x x x x x x x x 0 0 x x x x ? ? x ? x ? ? x x x x 0 x x x x x x 0 x 0 0 x 0 x x 0 x 0 0 x x x x x x 0 x x x 0 0 0 x x x x x x x 0 0 x x x x x x x x x x x 0 x x x x x x x x 0 x x x x x x x x 0 x ? x x 0 ? x x x x x 0 0 x x x 0 x x x x 0 0 0 x x x x x 0 x x x x x x x 0 x ? x x x x x x x x ? x x 0 x x x x x x ? x x 0 x x x ? x 0 x x x x 0 x x x 0 0 x x x x x 0 0 0 0 0 x x 0 x 0 x x x ? ? 0 x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x 0 x x x x x x x x x 0 x x x 0 0 x 0 x x x x 0 x x 0 0 x x x x 0 x 0 x 0 0 x 0 0 x 0 0 x x x x x x x x 0 x x x x x 0 x x 0 0 x x x x x x x x x 0 0 x 0 x x x x x x x x x 0 x x x 0 0 0 0 0 0 0 0 x 0 x 0 x 0 0 x x x x x x x x 0 0 x x x 0 x x x x x 0 x 0 x x x 0 x 0 x x x 0 0 x 0 0 x 0 0 x x x x x 0 x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x 0 x x x x x x x x x x x x 0 x 0 0 0 0 0 0 0 0 0 x x 0 x x x 0 x x 0 x x x x x 0 x x x x x x x x x x 0 x x x x x x x 0 x x x x x x 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x 0 x x 0 x 0 x 0 0 0 0 0 0 x x x x x x x x 0 x x 0 x x x x x 0 x x x x x x x x x x x x x x x x 0 x x x x x 0 0 x 0 0 x x x x x x x x x x x x x x x ? x x x 0 x x x x x x 0 x x x x x 0 x 0 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x ? x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 x 0 x x 0 x 0 0 0 0 0 0 x x x 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x x x x x 0 x x x x x x x x 0 0 0 0 x x x x x 0 x x x x x x x x 0 x x 0 x 0 x 0 x x x x x x x x x x x x x x 0 x x x 0 x x 0 x x x x x x x x x x x 0 0 x x x x x 0 0 0 0 x 0 0 0 0 x x x x x x x x x x x x x 0 0 0 x x 0 x 0 x x 0 x x x 0 x x x 0 x x x x x x 0 0 x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x 0 0 0 0 0 0 x 0 x x x 0 x x x 0 x x 0 x x x x x x 0 x x 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 x 0 0 x x x x x 0 x x x x 0 0 x x x 0 0 x 0 0 0 0 0 0 x 0 x x 0 x x x 0 x x x x x x x x 0 x 0 x x x 0 0 0 x x x 0 x x 0 x x x x 0 0 x 0 x x x x x x x x x x x x x x 0 0 0 x x 0 0 x 0 0 0 x 0 x x x x x ? x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x 0 x x x 0 0 x x x x 0 x x x x x x x x 0 x x 0 x x 0 0 x x x x x 0 x x x x x x x x x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x 0 x 0 x x x x x 0 x 0 x x x x x x x 0 x x x x 0 x x 0 x x x x x 0 x x x ? ? x 0 x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x 0 0 x 0 0 0 0 x x 0 0 x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x 0 x x x x ? x x x x 0 0 x x x x x x x x 0 x x x x x x x x x x x x x x x 0 x 0 0 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x 0 0 0 x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x 0 x x x 0 x x x 0 x 0 0 x x x x x x x x x x x 0 x x 0 x x x 0 x x 0 x x x 0 0 x x x x x x 0 0 x x 0 x 0 x x 0 x x x x x 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1 2 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 2 3 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 1 0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\d6dcbbd95469dd6b639866366a74e1d4d5300edd_0008768000.config Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~dfd1bc385d3560a95d.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Other Suspicious
  • AdjustTokenPrivileges
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Network Wininet
  • InternetConnect
  • InternetOpen
  • InternetSetOption
Network Winhttp
  • WinHttpOpen
Network Winsock2
  • WSAStartup
  • WSAttemptAutodialName
Network Winsock
  • closesocket
  • connect
  • getaddrinfo
  • socket

Trending

Most Viewed

Loading...