Snap.do
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 458 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 1,985,979 |
| First Seen: | October 12, 2012 |
| Last Seen: | February 7, 2026 |
| OS(es) Affected: | Windows |

Snap.do Image
The Snap.do website is associated with the Smartbar toolbar for your web browser. This toolbar is actually an adware component. Even though Snap.do claims that Snap.do can simplify the way you access your favorite websites, this website and its associated toolbar have several unwanted behaviors that are more closely associated with known malware infections than with legitimate applications. Most of the time, the Snap.do toolbar will be bundled along with freeware programs, included in the installation process.
Reading the 'official' description of Snap.do, it would be hard to guess that this website is linked to malware. The people behind Snap.do claim that this website's vision is to become an industry leader in providing simple, smart web solutions to their clients as well as complementary programs that improve browser efficiency and make browsing simply with interfaces and technologies that computer users are already used to utilize. However, this vision does not match up well to reality, since products associated with Snap.do have various components that are more commonly associated with adware. There are three reasons why products associated with Snap.do are considered unsafe for your computer:
- Products associated with Snap.do may have spyware capabilities. That is, this website and software associated with Snap.do will collect your personal data and then distribute it to a third party without your authorization.
- The Snap.do website and software associated with Snap.do may also be considered adware. This is because Snap.do is designed to deliver intrusive advertisements based on private data collected about your browsing behaviors. These advertisements may appear as pop-up windows or embedded in web pages.
- Snap.do is also linked to browser hijackers. These kinds of components are designed to change your web browser's settings, affecting which websites you are able to visit and alters the way you browse the Internet.
While many websites associated with browser hijackers may, in themselves, be perfectly safe, this is not the case with Snap.do and software associated with this website. Due to their adware and browser hijacker components, any contact with the Snap.do website or with software associated with Snap.do should be followed with a thorough scan of your machine with a capable anti-malware application.
Table of Contents
Aliases
2 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Symantec | Bloodhound.MalPE |
| AhnLab-V3 | PUP/Win32.Toolbar |
SpyHunter Detects & Remove Snap.do
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | cloudprinter.dat | cecec73094ba3e1b7abe788ae5a5204a | 271,577 |
| 2. | gravefresh.dat | 09eab69315e00b74dfa2ca27a5542829 | 145,225 |
| 3. | uninstall.ico | f0629844b82419eb727a3858f31dc85a | 1,891 |
| 4. | uninstall.dat | 6c5cac85dbc1df3ced89e3ea8645bc32 | 1,154 |
| 5. | Opentip.bin | aea5b44ab1e57f40069461bcf0dbc303 | 601 |
| 6. | Topfax.bin | e7feae9f793d93682572c065c3379626 | 197 |
| 7. | Vivafax.bin | fa780e83ab291186670cfe6b879f7085 | 158 |
| 8. | AppdnifmiN.exe | 24a74f120eccbec5942ce9c627c31db4 | 69 |
| 9. | ocep.exe | 2cf641c23d296a503827f6d409e0435d | 50 |
| 10. | CloudPrinter.exe | f79bbfd2beea6c3494bc65b638af5969 | 49 |
| 11. | Affenpinscher.exe | 8abe1277924bdf91880a0394a4cc18d8 | 43 |
| 12. | gld.exe | c5ea20f32c1ad46670b6a6442ddd04d6 | 38 |
| 13. | emphasising.exe | 25034e95214d42e20e9383a353c125f6 | 37 |
| 14. | uninstall.exe | 75e0ecad5d00e8407e32506361b93f98 | 35 |
| 15. | patience.exe | 069ad9a7445f11563b2919a5f006979c | 32 |
| 16. | Medotity.exe | a761ce1d6bc4eec1c527324584e9ddd8 | 28 |
| 17. | AppgnirtspmaT.exe | a674955ee5b9cf795d74aec1a3bdea46 | 25 |
| 18. | xifs.exe | 5f8cde8ed5585c50102a06981f1c9d7a | 24 |
| 19. | AppxeetouQ.exe | 68e27e78779d9780d2daef4d6c2148e4 | 24 |
| 20. | ApppazmaL.exe | be67210e37a467cf02375d7ab03270c6 | 23 |
| 21. | idna.exe | 543de71ba6de1353cd397c89a0951663 | 18 |
| 22. | AppmatdloH.exe | d0f9b6fec63f8cb1ddeaa0cac2512aa5 | 16 |
| 23. | Utatity.exe | 711203f1378abf0a39822f473287c8d8 | 15 |
| 24. | set.exe | 96a99a6e8b367ffa84b5f5b0bb2a4dc9 | 14 |
| 25. | Nettrans.exe | 56e23c8a026f980555a286c1ed873ec3 | 13 |
| 26. | crambo.exe | 7ce53c9cc3d30ab0df7d0e0849c9a7bf | 1 |
Registry Details
Directories
Snap.do may create the following directory or directories:
| %ALLUSERSPROFILE%\Anwendungsdaten\Logic Cramble |
| %ALLUSERSPROFILE%\Application Data\AppoxinloK |
| %ALLUSERSPROFILE%\Application Data\Graveairs |
| %ALLUSERSPROFILE%\Application Data\Zonsoft |
| %ALLUSERSPROFILE%\Application Data\Zonsofts |
| %ALLUSERSPROFILE%\Application Data\apptreppabm |
| %ALLUSERSPROFILE%\Application Data\apptreppabms |
| %ALLUSERSPROFILE%\Application Data\appxafmads |
| %ALLUSERSPROFILE%\Application Data\kipolam |
| %ALLUSERSPROFILE%\Application Data\mbappert |
| %ALLUSERSPROFILE%\Application Data\mbapperts |
| %ALLUSERSPROFILE%\Application Data\pangoc |
| %ALLUSERSPROFILE%\Application Data\pangocs |
| %ALLUSERSPROFILE%\Application Data\tolnix |
| %ALLUSERSPROFILE%\Application Data\tolnixs |
| %ALLUSERSPROFILE%\AppnegyloP |
| %ALLUSERSPROFILE%\AppnorriA |
| %ALLUSERSPROFILE%\AppnorriAs |
| %ALLUSERSPROFILE%\AppoxinloK |
| %ALLUSERSPROFILE%\AppoxinloKs |
| %ALLUSERSPROFILE%\ApppotriA |
| %ALLUSERSPROFILE%\ApppotriAs |
| %ALLUSERSPROFILE%\AppthgildeMs |
| %ALLUSERSPROFILE%\AppxelosknoK |
| %ALLUSERSPROFILE%\BluetoothPoint |
| %ALLUSERSPROFILE%\BluetoothPoints |
| %ALLUSERSPROFILE%\Dados de aplicativos\Logic Cramble |
| %ALLUSERSPROFILE%\Daltit |
| %ALLUSERSPROFILE%\Daltits |
| %ALLUSERSPROFILE%\Dane aplikacji\Logic Cramble |
| %ALLUSERSPROFILE%\Dati applicazioni\Logic Cramble |
| %ALLUSERSPROFILE%\Datos de programa\Logic Cramble |
| %ALLUSERSPROFILE%\Graveairs |
| %ALLUSERSPROFILE%\Hotfreshs |
| %ALLUSERSPROFILE%\Pitachoks |
| %ALLUSERSPROFILE%\Polygen |
| %ALLUSERSPROFILE%\Polygens |
| %ALLUSERSPROFILE%\Silsolis |
| %ALLUSERSPROFILE%\Silsoliss |
| %ALLUSERSPROFILE%\Singdaxs |
| %ALLUSERSPROFILE%\Trioflex |
| %ALLUSERSPROFILE%\Trioflexs |
| %ALLUSERSPROFILE%\Viaair |
| %ALLUSERSPROFILE%\Viaairs |
| %ALLUSERSPROFILE%\Zonsoft |
| %ALLUSERSPROFILE%\Zonsofts |
| %ALLUSERSPROFILE%\appcognap |
| %ALLUSERSPROFILE%\apppitsirt |
| %ALLUSERSPROFILE%\apprelrons |
| %ALLUSERSPROFILE%\apprelronss |
| %ALLUSERSPROFILE%\apptreppabm |
| %ALLUSERSPROFILE%\apptreppabms |
| %ALLUSERSPROFILE%\appxafmads |
| %ALLUSERSPROFILE%\appxinlot |
| %ALLUSERSPROFILE%\ecivreSevaS |
| %ALLUSERSPROFILE%\ecivreSevaSs |
| %ALLUSERSPROFILE%\iretadpUMGRs |
| %ALLUSERSPROFILE%\kipolam |
| %ALLUSERSPROFILE%\loceps |
| %ALLUSERSPROFILE%\mbappert |
| %ALLUSERSPROFILE%\mbapperts |
| %ALLUSERSPROFILE%\ohnuze |
| %ALLUSERSPROFILE%\ohnuzes |
| %ALLUSERSPROFILE%\pangoc |
| %ALLUSERSPROFILE%\pangocs |
| %ALLUSERSPROFILE%\tolnix |
| %ALLUSERSPROFILE%\tolnixs |
| %ALLUSERSPROFILE%\xifss |
| %COMMONPROGRAMFILES%\AlphaString |
| %COMMONPROGRAMFILES%\Alphafan |
| %COMMONPROGRAMFILES%\Alphait |
| %COMMONPROGRAMFILES%\Alphatone |
| %COMMONPROGRAMFILES%\Apsing |
| %COMMONPROGRAMFILES%\Betastrong |
| %COMMONPROGRAMFILES%\Bio-Com |
| %COMMONPROGRAMFILES%\Biolight |
| %COMMONPROGRAMFILES%\Confind |
| %COMMONPROGRAMFILES%\Doublelab |
| %COMMONPROGRAMFILES%\Ecojob |
| %COMMONPROGRAMFILES%\Finphase |
| %COMMONPROGRAMFILES%\Fixfax |
| %COMMONPROGRAMFILES%\Goodlex |
| %COMMONPROGRAMFILES%\GrooveTax |
| %COMMONPROGRAMFILES%\Groovecof |
| %COMMONPROGRAMFILES%\HatTrax |
| %COMMONPROGRAMFILES%\Hometough |
| %COMMONPROGRAMFILES%\Icetech |
| %COMMONPROGRAMFILES%\Inchstrong |
| %COMMONPROGRAMFILES%\IndigoNix |
| %COMMONPROGRAMFILES%\Joy-Com |
| %COMMONPROGRAMFILES%\Kanla |
| %COMMONPROGRAMFILES%\Key-Soft |
| %COMMONPROGRAMFILES%\KinDom |
| %COMMONPROGRAMFILES%\Kinin |
| %COMMONPROGRAMFILES%\Labzap |
| %COMMONPROGRAMFILES%\Lamcof |
| %COMMONPROGRAMFILES%\Lamity |
| %COMMONPROGRAMFILES%\Ontofan |
| %COMMONPROGRAMFILES%\OpenOvedom |
| %COMMONPROGRAMFILES%\OverLab |
| %COMMONPROGRAMFILES%\Ozercom |
| %COMMONPROGRAMFILES%\Physlab |
| %COMMONPROGRAMFILES%\Quojob |
| %COMMONPROGRAMFILES%\Quotelux |
| %COMMONPROGRAMFILES%\Qvoity |
| %COMMONPROGRAMFILES%\Ranfresh |
| %COMMONPROGRAMFILES%\Rantax |
| %COMMONPROGRAMFILES%\Rantip |
| %COMMONPROGRAMFILES%\Runtax |
| %COMMONPROGRAMFILES%\Soling |
| %COMMONPROGRAMFILES%\Stockphase |
| %COMMONPROGRAMFILES%\Strongtech |
| %COMMONPROGRAMFILES%\Strongtip |
| %COMMONPROGRAMFILES%\Subsoft |
| %COMMONPROGRAMFILES%\Tanity |
| %COMMONPROGRAMFILES%\Tipeco |
| %COMMONPROGRAMFILES%\ToughHold |
| %COMMONPROGRAMFILES%\Trusting |
| %COMMONPROGRAMFILES%\Truststring |
| %COMMONPROGRAMFILES%\Ventodex |
| %COMMONPROGRAMFILES%\Ventotone |
| %COMMONPROGRAMFILES%\Vilaflex |
| %COMMONPROGRAMFILES%\Villabam |
| %COMMONPROGRAMFILES%\VolCore |
| %COMMONPROGRAMFILES%\Voya-Strong |
| %COMMONPROGRAMFILES%\Zonlex |
| %COMMONPROGRAMFILES%\Zoomtip |
| %COMMONPROGRAMFILES%\Zoteco |
| %COMMONPROGRAMFILES%\Zuntough |
| %COMMONPROGRAMFILES%\biojob |
| %COMMONPROGRAMFILES%\dentozimeco |
| %COMMONPROGRAMFILES%\kanis |
| %COMMONPROGRAMFILES%\kay-dax |
| %COMMONPROGRAMFILES%\kinzuncom |
| %COMMONPROGRAMFILES%\vialax |
| %COMMONPROGRAMFILES%\zaamtom |
| %COMMONPROGRAMFILES%\zunfax |
| %COMMONPROGRAMFILES(x86)%\AlphaString |
| %COMMONPROGRAMFILES(x86)%\Alphafan |
| %COMMONPROGRAMFILES(x86)%\Alphait |
| %COMMONPROGRAMFILES(x86)%\Alphatone |
| %COMMONPROGRAMFILES(x86)%\Apsing |
| %COMMONPROGRAMFILES(x86)%\BigHotis |
| %COMMONPROGRAMFILES(x86)%\Bio-Com |
| %COMMONPROGRAMFILES(x86)%\Biodonkix |
| %COMMONPROGRAMFILES(x86)%\Biolight |
| %COMMONPROGRAMFILES(x86)%\Cofgohold |
| %COMMONPROGRAMFILES(x86)%\Confind |
| %COMMONPROGRAMFILES(x86)%\Donsillax |
| %COMMONPROGRAMFILES(x86)%\Doublelab |
| %COMMONPROGRAMFILES(x86)%\Ecojob |
| %COMMONPROGRAMFILES(x86)%\FaseQuoit |
| %COMMONPROGRAMFILES(x86)%\Finphase |
| %COMMONPROGRAMFILES(x86)%\Fix-Fan |
| %COMMONPROGRAMFILES(x86)%\Fixfax |
| %COMMONPROGRAMFILES(x86)%\FreshReddax |
| %COMMONPROGRAMFILES(x86)%\Freshlatlex |
| %COMMONPROGRAMFILES(x86)%\Goodlex |
| %COMMONPROGRAMFILES(x86)%\GrooveTax |
| %COMMONPROGRAMFILES(x86)%\Groovecof |
| %COMMONPROGRAMFILES(x86)%\HatTrax |
| %COMMONPROGRAMFILES(x86)%\Hometough |
| %COMMONPROGRAMFILES(x86)%\Icetech |
| %COMMONPROGRAMFILES(x86)%\Inchstrong |
| %COMMONPROGRAMFILES(x86)%\IndigoNix |
| %COMMONPROGRAMFILES(x86)%\Jobwarm |
| %COMMONPROGRAMFILES(x86)%\Joy-Com |
| %COMMONPROGRAMFILES(x86)%\Kanla |
| %COMMONPROGRAMFILES(x86)%\KinDom |
| %COMMONPROGRAMFILES(x86)%\Kinin |
| %COMMONPROGRAMFILES(x86)%\KonkDondax |
| %COMMONPROGRAMFILES(x86)%\Konksailnix |
| %COMMONPROGRAMFILES(x86)%\Labzap |
| %COMMONPROGRAMFILES(x86)%\Lamcof |
| %COMMONPROGRAMFILES(x86)%\Lamity |
| %COMMONPROGRAMFILES(x86)%\Math-Tax |
| %COMMONPROGRAMFILES(x86)%\Ontofan |
| %COMMONPROGRAMFILES(x86)%\OpeHotcom |
| %COMMONPROGRAMFILES(x86)%\OpenOvedom |
| %COMMONPROGRAMFILES(x86)%\OverLab |
| %COMMONPROGRAMFILES(x86)%\Overron |
| %COMMONPROGRAMFILES(x86)%\Ozercom |
| %COMMONPROGRAMFILES(x86)%\Physlab |
| %COMMONPROGRAMFILES(x86)%\Quojob |
| %COMMONPROGRAMFILES(x86)%\Quotelux |
| %COMMONPROGRAMFILES(x86)%\Qvoity |
| %COMMONPROGRAMFILES(x86)%\Ranfresh |
| %COMMONPROGRAMFILES(x86)%\Rantax |
| %COMMONPROGRAMFILES(x86)%\Rantip |
| %COMMONPROGRAMFILES(x86)%\Runtax |
| %COMMONPROGRAMFILES(x86)%\S-tax |
| %COMMONPROGRAMFILES(x86)%\Sailsaobam |
| %COMMONPROGRAMFILES(x86)%\Soling |
| %COMMONPROGRAMFILES(x86)%\Statphase |
| %COMMONPROGRAMFILES(x86)%\Stockphase |
| %COMMONPROGRAMFILES(x86)%\Strongtech |
| %COMMONPROGRAMFILES(x86)%\Strongtip |
| %COMMONPROGRAMFILES(x86)%\Subsoft |
| %COMMONPROGRAMFILES(x86)%\SumLax |
| %COMMONPROGRAMFILES(x86)%\Sunlam |
| %COMMONPROGRAMFILES(x86)%\Tanity |
| %COMMONPROGRAMFILES(x86)%\Tinfresh |
| %COMMONPROGRAMFILES(x86)%\Tipeco |
| %COMMONPROGRAMFILES(x86)%\Top-Sing |
| %COMMONPROGRAMFILES(x86)%\ToughHold |
| %COMMONPROGRAMFILES(x86)%\Tresstring |
| %COMMONPROGRAMFILES(x86)%\Trippletantip |
| %COMMONPROGRAMFILES(x86)%\Trisla |
| %COMMONPROGRAMFILES(x86)%\Trusting |
| %COMMONPROGRAMFILES(x86)%\Truststring |
| %COMMONPROGRAMFILES(x86)%\Vento-Zap |
| %COMMONPROGRAMFILES(x86)%\Ventodex |
| %COMMONPROGRAMFILES(x86)%\Ventotone |
| %COMMONPROGRAMFILES(x86)%\Ventotop |
| %COMMONPROGRAMFILES(x86)%\Vilaflex |
| %COMMONPROGRAMFILES(x86)%\Villabam |
| %COMMONPROGRAMFILES(x86)%\VolCore |
| %COMMONPROGRAMFILES(x86)%\Voya-Strong |
| %COMMONPROGRAMFILES(x86)%\Xxx-Ransoft |
| %COMMONPROGRAMFILES(x86)%\Y--Tex |
| %COMMONPROGRAMFILES(x86)%\Zerex |
| %COMMONPROGRAMFILES(x86)%\Zonlex |
| %COMMONPROGRAMFILES(x86)%\ZooSiltam |
| %COMMONPROGRAMFILES(x86)%\Zoomstock |
| %COMMONPROGRAMFILES(x86)%\Zoomtip |
| %COMMONPROGRAMFILES(x86)%\Zoteco |
| %COMMONPROGRAMFILES(x86)%\Zuntough |
| %COMMONPROGRAMFILES(x86)%\biojob |
| %COMMONPROGRAMFILES(x86)%\dentozimeco |
| %COMMONPROGRAMFILES(x86)%\fixcom |
| %COMMONPROGRAMFILES(x86)%\freshhome |
| %COMMONPROGRAMFILES(x86)%\kanis |
| %COMMONPROGRAMFILES(x86)%\math-plus |
| %COMMONPROGRAMFILES(x86)%\vialax |
| %COMMONPROGRAMFILES(x86)%\zaamtom |
| %COMMONPROGRAMFILES(x86)%\zunfax |
| %PROGRAMFILES%\drÅÀÌ |
| %PROGRAMFILES%\eakzaihjajkuc |
| %PROGRAMFILES%\eauknrbnwrpu2 |
| %PROGRAMFILES%\owdbzuqlndefnbhfezr |
| %PROGRAMFILES%\patience |
| %PROGRAMFILES%\rfwjmjnpstqu2 |
| %PROGRAMFILES(x86)%\eakzaihjajkuc |
| %PROGRAMFILES(x86)%\eauknrbnwrpu2 |
| %PROGRAMFILES(x86)%\owdbzuqlndefnbhfezr |
| %PROGRAMFILES(x86)%\patience |
| %PROGRAMFILES(x86)%\rfwjmjnpstqu2 |
| %TEMP%\eakzaihjajkuc |
| %TEMP%\eauknrbnwrpu2 |
| %TEMP%\owdbzuqlndefnbhfezr |
| %TEMP%\rfwjmjnpstqu2 |
URLs
Snap.do may call the following URLs:
| anysearchmanager.com |
| feed.24-stream.com |
| feed.amazingtab.com |
| feed.any-templates.com |
| feed.cryptoverto.com |
| feed.ebooks-club.com |
| feed.free-converterz.com |
| feed.funkystreams.com |
| feed.game-jungle.com |
| feed.getlive.news |
| feed.giph-it.com |
| feed.live-streaming.online |
| feed.runspeedcheck.com |
| feed.salahweb.com |
| feed.sound-hd.com |
| feed.streamingworldcup.com |
| moviebox-online.com |
| pixel.pxcollect.com |
| protected-search.com |
| searchfrit.com |
| videoconverterz.com |
Analysis Report
General information
| Family Name: | Snap.do |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
17d9801dce7b2dc7c46fdd26acc0ba2c
SHA1:
8545820d072de65afcc10387b4c332f1e97a9f94
File Size:
1.90 MB, 1895383 bytes
|
|
MD5:
5255c259aea306dc85d02632088eb2f6
SHA1:
968991d2fae12d9590273f73a34ac27a9ce897d3
SHA256:
388CC75558DCD9EA17F7E5375D1B8210C459AB80FBA52858298C15E4CD983A90
File Size:
1.09 MB, 1085448 bytes
|
|
MD5:
50537fe7850cc6bc1543831aaaefcd8b
SHA1:
555f9c5f06cfda575a47c4823d34ff7d64e41c69
SHA256:
5CE4D65B4516C87D3570409A9A5653AC5082332A9BEC0E57656B34DDCDE01598
File Size:
1.78 MB, 1784582 bytes
|
|
MD5:
08564401d98ca3aef076f5bcff6fd92b
SHA1:
87491142ca85ee8c43697811d714a45b4feaf8f3
SHA256:
94344C9883EC50E7EFB8F4A659E7DF27EB45D29ECD77E966965904C2C1E9BA78
File Size:
46.08 KB, 46080 bytes
|
|
MD5:
5b9a59e587e521a340a0f67fc8cf9c42
SHA1:
178941db8e34e3796d6f614c4734e8d50eac0f81
SHA256:
FC4D59C280A1600138EA6751200C41409FAA9743F56DDB2DA426DC03741094F4
File Size:
28.67 KB, 28672 bytes
|
Show More
|
MD5:
0a310c5fe82ee582182b13670904f3db
SHA1:
6cfdcfde9260096f676d0f291855f0ef4a4b69cd
SHA256:
9DC6F63F89D57DFB55CBDB0961141A16C79AD81191B6FE5F16DD8FC06D812752
File Size:
143.36 KB, 143360 bytes
|
|
MD5:
be818539582ce5a7e1cb02131337c86c
SHA1:
0866adf752e61a32111a3b5873a353b455faaa91
SHA256:
807B1D5B01F4A00A6042B7FCC65166878A664D4217B6F20334403BF6E6FA7A32
File Size:
1.90 MB, 1895380 bytes
|
|
MD5:
3bf1f473ad29a813a7ee57758227399b
SHA1:
5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8
SHA256:
908BF77A1649EF5B6D392A085BD390109DE634BBDDBC32735B376EF312EAC23F
File Size:
278.51 KB, 278509 bytes
|
|
MD5:
930ac080f1d1a9c28206693393ac14c8
SHA1:
58bf542fda7b4ceb31a4380c5af4f4581fe7c40e
SHA256:
8A01C22729651C8A690242ADBEB20BF4FEB88F94F16B072EA9971867404CB0EE
File Size:
278.51 KB, 278511 bytes
|
|
MD5:
3823bd64dc7bab0fbbbdee49126ac939
SHA1:
786ada42d0f88ac5be1ce5667be4cc13283289ec
SHA256:
1F70AAD5E8FF7B0C70E97370A11F214AE1291A1503EEA8FD16485D587F938844
File Size:
278.52 KB, 278518 bytes
|
|
MD5:
eb3102f5aa56414121b5b606c6b96bbf
SHA1:
d9226e505ea4dd21a3fbcf843280489c1f04cf64
SHA256:
81C963787897B391D38520C9C70CDCCE6E6888E20071EB918354D8A81055026D
File Size:
1.90 MB, 1895383 bytes
|
|
MD5:
5179732733e1692e6dd203798a9209ff
SHA1:
fbf87847dc4e35b728b05038fe9454e6e0de4053
SHA256:
3652266AE06A904C64131AC62246DE3BC1418D248C180BAFFF9BA384F5E4E894
File Size:
352.86 KB, 352855 bytes
|
|
MD5:
a4406a102105a87d3fa1a7cf0afe8521
SHA1:
c5a253b7c27b1f02910cc4977659a25fc6d73330
SHA256:
C024E8A4FBA1F6890D1C4B56EAC302644377949FD18D232BEA603312AA862011
File Size:
350.54 KB, 350544 bytes
|
|
MD5:
67473d7d1837c6f36b4c234dd418ea1c
SHA1:
6a84ee99b5ebc4d9d13c1b92ff453b4af97964c4
SHA256:
0C5F77732629EB72073D852906AB55809FF3C5BC405AD8E3A9B9629E1DCCFA14
File Size:
1.90 MB, 1895382 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
Show More
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments | Shopping Helper Smartbar |
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| MY POP SHOP LTD | UTN-USERFirst-Object | Root Not Trusted |
| ReSoft LTD. | UTN-USERFirst-Object | Hash Mismatch |
File Traits
- .NET
- Acronis Installer
- dll
- HighEntropy
- Installer Manifest
- No Version Info
- RAR (In Overlay)
- RARinO
- WinRAR SFX
- WinZip SFX
Show More
- WRARSFX
- x64
- x86
- ZIP (In Overlay)
- ZIPinO
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\programdata\logic cramble\set.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\programdata\logic cramble\set.exe.config | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\programdata\logic cramble\system.data.sqlite.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\system.data.sqlite.linq.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\system.data.sqlite.xml | Generic Write,Read Attributes |
| c:\programdata\logic cramble\x64\sqlite.interop.dll | Generic Write,Read Attributes |
| c:\programdata\logic cramble\x86\sqlite.interop.dll | Generic Write,Read Attributes |
| c:\programdata\networkpacketmanitor | Synchronize,Write Attributes |
| c:\programdata\networkpacketmanitor\__tmp_rar_sfx_access_check_13199750 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\networkpacketmanitor\nettrans.exe | Generic Write,Read Attributes |
Show More
| c:\programdata\networkpacketmanitor\nettrans.exe | Synchronize,Write Attributes |
| c:\programdata\networkpacketmanitor\nettrans.exe.config | Generic Write,Read Attributes |
| c:\programdata\networkpacketmanitor\nettrans.exe.config | Synchronize,Write Attributes |
| c:\programdata\prefssecure | Synchronize,Write Attributes |
| c:\programdata\prefssecure\__tmp_rar_sfx_access_check_153473046 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\prefssecure\__tmp_rar_sfx_access_check_928656 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\programdata\prefssecure\nettrans.exe | Generic Write,Read Attributes |
| c:\programdata\prefssecure\nettrans.exe | Synchronize,Write Attributes |
| c:\programdata\prefssecure\nettrans.exe.config | Generic Write,Read Attributes |
| c:\programdata\prefssecure\nettrans.exe.config | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0 | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2145625 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2146234 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_22828 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_2926062 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_3318750 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\__tmp_rar_sfx_access_check_443312 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe.config | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\logichandler.exe.config | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.linq.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\rarsfx0\system.data.sqlite.linq.dll | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 얈딡Ǜ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꋨ娪䴞ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 됫菒屑ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 驘叶橘ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 튵㿈茝ǜ | RegNtPreCreateKey |
| HKCU\local settings\muicache\1b\52c64b7e::@c:\windows\system32\ndfapi.dll,-40001 | Windows Network Diagnostics | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Keyboard Access |
|
| Process Shell Execute |
|
| Service Control |
|
| Syscall Use |
Show More
68 additional items are not displayed above. |
| Process Terminate |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
(NULL) C:\Users\Dexqkvmh\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\8545820d072de65afcc10387b4c332f1e97a9f94_0001895383.exe"
|
"C:\Users\Dexqkvmh\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
"cmd.exe" /c sc create "backlh" binPath= "C:\ProgramData\Logic Cramble\set.exe" DisplayName= "Background Logic Handler" start= "auto"
|
C:\WINDOWS\system32\sc.exe sc create "backlh" binPath= "C:\ProgramData\Logic Cramble\set.exe" DisplayName= "Background Logic Handler" start= "auto"
|
WriteConsole: [SC] CreateServi
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\178941db8e34e3796d6f614c4734e8d50eac0f81_0000028672.,LiQMAxHB
|
(NULL) C:\Users\Suuzwzuw\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\0866adf752e61a32111a3b5873a353b455faaa91_0001895380"
|
"C:\Users\Suuzwzuw\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
WriteConsole: [SC] ChangeServi
|
(NULL) C:\ProgramData\PrefsSecure\Nettrans.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe "c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509"" DisplayName= "Prefs Secure" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509" DisplayName= "Prefs Secure" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\5027a9f4856a37a2be048ca2e993dd0e9cf3a3e8_0000278509" DisplayName= "Prefs Secure" start= auto
|
(NULL) C:\ProgramData\PrefsSecure\Nettrans.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe "c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511"" DisplayName= "Prefs Secure" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511" DisplayName= "Prefs Secure" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\PrefsSecure\Nettrans.exe c:\users\user\downloads\58bf542fda7b4ceb31a4380c5af4f4581fe7c40e_0000278511" DisplayName= "Prefs Secure" start= auto
|
(NULL) C:\ProgramData\NetworkPacketManitor\Nettrans.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe "c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518"" DisplayName= "Network Packet Manitor" start= auto
|
"cmd.exe" /c C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518" DisplayName= "Network Packet Manitor" start= auto
|
C:\WINDOWS\system32\sc.exe C:\WINDOWS\system32\sc.exe create Nettrans binPath= "C:\ProgramData\NetworkPacketManitor\Nettrans.exe c:\users\user\downloads\786ada42d0f88ac5be1ce5667be4cc13283289ec_0000278518" DisplayName= "Network Packet Manitor" start= auto
|
(NULL) C:\Users\Bfviuslq\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\d9226e505ea4dd21a3fbcf843280489c1f04cf64_0001895383"
|
"C:\Users\Bfviuslq\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|
(NULL) C:\Users\Mdlgqdel\AppData\Local\Temp\RarSFX0\LogicHandler.exe "c:\users\user\downloads\6a84ee99b5ebc4d9d13c1b92ff453b4af97964c4_0001895382"
|
"C:\Users\Mdlgqdel\AppData\Local\Temp\RarSFX0\LogicHandler.exe"
|