PUP.Goobzo

Threat Scorecard

Popularity Rank: 6,372
Threat Level: 10 % (Normal)
Infected Computers: 42,830
First Seen: February 20, 2014
Last Seen: February 1, 2026
OS(es) Affected: Windows

Aliases

5 security vendors flagged this file as malicious.

Antivirus Vendor Detection
AVG Skodna.A8D
Panda Adware/Goobzo
Sophos Goobzo
AVG MalSign.Skodna.A8D
McAfee Artemis!D5495D2562BC

SpyHunter Detects & Remove PUP.Goobzo

File System Details

PUP.Goobzo may create the following file(s):
# File Name MD5 Detections
1. SysMenu.dll dca076f9531e7940d94a48f0edc3c737 109
2. smp.exe 2b22c2ad8b9ba60b0369293de8330acd 77
3. sma.exe a606c1a82b9c5dfd36162da6d6065246 55
4. smUninstall.exe c901211cea52978e7b274351d976ff27 54
5. smu.exe 9dc24b911c9be29cb6bf7ccd78b790ac 54
6. updatehelper.exe 5c4b34ae6efc873d881e76d95c8adc28 41
7. smw.sys 8a3b320da4865b775707a53d76cedd10 15
8. delay.exe 3526fa76385f858c44db17ef8a425a84 1
9. setup.exe e1b90326f328e4e5fe5b08191c049979 1
More files

Registry Details

PUP.Goobzo may create the following registry entry or registry entries:
SOFTWARE\Goobzo
SOFTWARE\Wow6432Node\Goobzo

Directories

PUP.Goobzo may create the following directory or directories:

%COMMONPROGRAMFILES%\Doobzo
%COMMONPROGRAMFILES%\Goobzo
%COMMONPROGRAMFILES%\Noobzo
%COMMONPROGRAMFILES%\Soobzo
%COMMONPROGRAMFILES(x86)%\Goobzo
%PUBLIC%\Documents\GOOBZO
%USERPROFILE%\AppData\LocalLow\Goobzo

Analysis Report

General information

Family Name: PUP.Goobzo
Signature status: No Signature

Known Samples

MD5: 74a4c97ef962cea0dc4b4837190bb4fd
SHA1: 31a5a6e02776d9bbb1df9e0cc9c768816aeba785
SHA256: 983B7A803C7D96A4786556740C03A432AC472EC2FE54D71956E1FA85E806DB94
File Size: 1.27 MB, 1269696 bytes
MD5: f6830f91583d97636dee8f7c48b9e8b1
SHA1: 302da210cad9626f0430e6483dc1f0eadcd6b908
SHA256: 5A134F5DA0320248ECACEE841191DA3BF1262CB9A889C31D5E7EE6361D93800D
File Size: 4.69 MB, 4693823 bytes
MD5: 1125260c57291a0375971e98fb19e4d1
SHA1: dcdcad6e7ce46e2bbe3b8b7d9828318337e2d595
SHA256: 6B6BA2003C93D309173F2C13272966FC3633F30182921E12C10CBA541C4E43F7
File Size: 4.67 MB, 4667247 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version
  • 3.1.9588.1993
  • 2.2.7764.463
  • 2.0.7791.1471
Product Version
  • 3.1.9588.1993
  • 2.2.7764.463
  • 2.0.7791.1471

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsgb1a9.tmp\accdownload.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsgb1aa.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsha7b6.tmp\d1958.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsha7b6.tmp\nk.lky Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsha7b6.tmp\setup.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsha7b6.tmp\setup1.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsl42be.tmp\accdownload.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsl42bf.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsqb198.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
Show More
c:\users\user\appdata\local\temp\nss3938.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nss3939.tmp\d1958.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nss3939.tmp\nk.lky Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nss3939.tmp\setup.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nss3939.tmp\setup1.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nssa7a6.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsw42ae.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nszfa59.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nszfa69.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\7f8371bf969c55b8 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\7f8371bf969c55b8 Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\d1989.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\d1989.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\dc31a5a6e02776d9bbb1df9e0cc9c768816aeba785_0001269696 Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\dc31a5a6e02776d9bbb1df9e0cc9c768816aeba785_0001269696 Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\nk.lky Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\nk.lky Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nszfa69.tmp\system.dll Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Jpjjkrpe\AppData\Local\Temp\nszFA69.tmp\ RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
  • OutputDebugString
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation
Network Wininet
  • InternetConnect
  • InternetOpen
  • InternetSetOption
Network Winhttp
  • WinHttpOpen
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Jpjjkrpe\AppData\Local\Temp\nszFA69.tmp\DC31a5a6e02776d9bbb1df9e0cc9c768816aeba785_0001269696"
"C:\Users\Ejngewry\AppData\Local\Temp\nss3939.tmp\setup.exe"
"C:\Users\Ccpvdwdq\AppData\Local\Temp\nshA7B6.tmp\setup.exe"

Related Posts

Trending

Most Viewed

Loading...