140c.tmp.exe

The application 140c.tmp.exe has been detected as a potentially unwanted program by 27 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source.
MD5:
8bed6c3ac19d84599083afb506a66608

SHA-1:
d4208c93d7593ea769352cb2e36df3aa24015817

SHA-256:
0e82fbbfbce7475cd74d8533830866965d0079d36dd37b73474143654ba091bc

Scanner detections:
27 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 3:50:03 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.631110
5882039

Agnitum Outpost
PUA.ConvertAd
7.1.1

Arcabit
Trojan.Adware.Kazy.D9A146
1.0.0.425

avast!
Dropper-gen [Drp]
150717-0

AVG
Generic6
2016.0.3027

Baidu Antivirus
Adware.Win32.Downloader
4.0.3.1584

Bitdefender
Gen:Variant.Adware.Kazy.631110
1.0.20.1080

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.631110
10.0.0.5366

ESET NOD32
Win32/Adware.ConvertAd.IE application
7.0.302.0

Fortinet FortiGate
Riskware/ConvertAd
8/4/2015

F-Secure
Gen:Variant.Adware.Kazy
11.2015-04-08_3

G Data
Gen:Variant.Adware.Kazy.631110
15.8.25

K7 AntiVirus
Adware
13.207.16778

Kaspersky
Trojan-Downloader.Win32.Genome
15.0.0.543

McAfee
Trojan.Artemis!92ED2CE76148
18.0.204.0

MicroWorld eScan
Gen:Variant.Adware.Kazy.631110
16.0.0.648

NANO AntiVirus
Trojan.Win32.Xpack.duloez
0.30.24.2668

Norman
Gen:Variant.Adware.Kazy.631110
04.08.2015 10:30:46

Panda Antivirus
Trj/Chgt.O
15.08.04.12

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Rising Antivirus
PE:Trojan.Win32.Generic.18E9F829!417986601
23.00.65.15802

Sophos
Generic PUA NE (PUA)
4.98

SUPERAntiSpyware
Adware.ConvertAd/Variant
9712

Trend Micro House Call
TROJ_GE.109C1EEA
7.2.216

Trend Micro
TROJ_GE.109C1EEA
10.465.04

Vba32 AntiVirus
TrojanDownloader.Genome
3.12.26.4

VIPRE Antivirus
Threat.4150696
41424

File size:
967.1 KB (990,280 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\windows\temp\140c.tmp.exe

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:q70SbPQlvANcc5j81gpOorZ2F7LHvpkpBRJeW1DMDk:u0qNJ5j81KOxNHvpkr/1gDk

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove 140c.tmp.exe - Powered by Reason Core Security