PUP.Navegaki

Threat Scorecard

Popularity Rank: 5,844
Threat Level: 10 % (Normal)
Infected Computers: 36,657
First Seen: August 27, 2015
Last Seen: April 18, 2026
OS(es) Affected: Windows

Aliases

9 security vendors flagged this file as malicious.

Antivirus Vendor Detection
AVG Generic6.KSM
Fortinet Riskware/Navegaki
Panda Trj/CI.A
McAfee-GW-Edition Artemis
Comodo ApplicUnwnt
Kaspersky not-a-virus:AdWare.Win32.Amonetize.aafo
K7AntiVirus Adware ( 004b48a71 )
McAfee Artemis!2F44459746DF
CAT-QuickHeal AdWare.Amonetize.r5 (Not a Virus)

SpyHunter Detects & Remove PUP.Navegaki

File System Details

PUP.Navegaki may create the following file(s):
# File Name MD5 Detections
1. service.exe a6ccd2e757c35b16a1a0dc5d9dc3fb84 3,927
2. gameboxsetup.exe 3d4259bfde5e834f4acc5889be8f7097 2,155
3. ntsvc.exe 1a5376165bbada36ef84928404b419e7 91
More files

Registry Details

PUP.Navegaki may create the following registry entry or registry entries:
Regexp file mask
%AppData%\NetService\conf.ini
%AppData%\NetService\sc.exe
SOFTWARE\NtSvcHandler
SOFTWARE\Wow6432Node\NtSvcHandler
SYSTEM\ControlSet001\services\Sed
SYSTEM\ControlSet002\services\Sed
SYSTEM\CurrentControlSet\services\Sed

Directories

PUP.Navegaki may create the following directory or directories:

%APPDATA%\Mactowebise
%APPDATA%\Macwebtoise
%APPDATA%\NetworkService
%PROGRAMFILES%\navegaki

Analysis Report

General information

Family Name: PUP.Navegaki
Signature status: Self Signed

Known Samples

MD5: 73faddc3d835fb5995f7471bcca23111
SHA1: 562fa6ff629d2c807ab39437fb6bf886b433c5ae
SHA256: 04970DDD7CEC7D8F64A33DBF75C084D2535341DFA646DDF4FA052197001BD8CE
File Size: 497.02 KB, 497016 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Navigation
File Description Navigation
File Version 2.0.0.1288
Internal Name Navigation.exe
Legal Copyright Navigation Copyright (C) 2013
Original Filename Navigation.exe
Product Name Navigation
Product Version 2.0.0.1288

Digital Signatures

Signer Root Status
Navigation network co.,limited VeriSign Class 3 Code Signing 2010 CA Self Signed

Block Information

Total Blocks: 1,016
Potentially Malicious Blocks: 24
Whitelisted Blocks: 903
Unknown Blocks: 89

Visual Map

0 0 0 0 0 0 0 0 0 ? 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? 0 ? ? 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? 0 0 ? ? 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? x x ? x x 0 ? x ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? ? ? ? ? ? ? x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 ? 0 0 0 0 0 0 0 0 ? 0 ? ? ? ? ? x 0 0 x 0 x 0 0 0 0 0 0 ? ? ? 0 ? 0 0 x 0 0 x x x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 x 0 ? ? x x 0 ? ? ? ? ? ? ? ? 0 x x x x 0 0 x 0 ? x x 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 2 0 0 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 3 1 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 2 3 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 1 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
\device\harddisk0\dr0 Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Network Winhttp
  • WinHttpConnect
  • WinHttpOpen
  • WinHttpOpenRequest
  • WinHttpQueryHeaders
  • WinHttpReceiveResponse
  • WinHttpSendRequest
  • WinHttpWriteData
Network Winsock2
  • WSAStartup
Network Winsock
  • gethostbyname

Trending

Most Viewed

Loading...