7636.tmp

technologiemontroyal.com

The file 7636.tmp by technologiemontroyal.com has been detected as a potentially unwanted program by 17 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from wajam-download.com.
Publisher:
technologiemontroyal.com  (signed and verified)

MD5:
123760e2fb4f9b5a8227c89f224d251d

SHA-1:
ef1493e4732ce0e05c2c6964e68caf0c894baed5

SHA-256:
7b7c220cfe38defa42274359680bf13cdb9d245a2693ceb2135a568225e10545

Scanner detections:
17 / 68

Status:
Potentially unwanted

Analysis date:
4/16/2024 5:58:03 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2154648
725

Avira AntiVirus
Adware/Wajam.2404792
7.11.209.44

avast!
Win32:Dropper-gen [Drp]
2014.9-150210

Bitdefender
Trojan.GenericKD.2154648
1.0.20.205

Emsisoft Anti-Malware
Trojan.GenericKD.2154648
8.15.02.10.09

ESET NOD32
Win32/Wajam.K potentially unwanted
9.11152

F-Secure
Trojan.GenericKD.2154648
11.2015-10-02_3

G Data
Trojan.GenericKD.2154648
15.2.25

Malwarebytes
PUP.Optional.Wajam.A
v2015.02.10.09

McAfee
Artemis!123760E2FB4F
5600.6859

MicroWorld eScan
Trojan.GenericKD.2154648
16.0.0.123

NANO AntiVirus
Trojan.Win32.SuspPack.dmtmtd
0.30.0.65070

nProtect
Trojan.GenericKD.2154648
15.02.10.01

Panda Antivirus
Trj/Chgt.O
15.02.10.09

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1015

Trend Micro House Call
Suspicious_GEN.F47V0209
7.2.41

Zillya! Antivirus
Trojan.Win32.1DB12147
2.0.0.2060

File size:
2.3 MB (2,404,792 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\7636.tmp

Digital Signature
Authority:
thawte, Inc.

Valid from:
2/2/2015 12:00:00 AM

Valid to:
2/2/2016 11:59:59 PM

Subject:
CN=technologiemontroyal.com, O=technologiemontroyal.com, L=Montreal, S=Quebec, C=CA

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
135452D7F4345006E40AC3DF2380D9B1

File PE Metadata
Compilation timestamp:
12/5/2009 10:53:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:TLF1+JujCHVqRjyzpMSseuZIIEDjH/hlMmPpuFjqsZcp0/zWFZ7eQBgjj4+:j+JujGVsezWTZmDjH/hymPpuFN/6qa7+

Entry address:
0x36A0

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 88, A7, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 80, 40, 00, 53, FF, 15, 88, 82, 40, 00, 6A, 08, A3, B8, 63, 42, 00, E8, EE, 2E, 00, 00, A3, 04, 63, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, B0, 0C, 42, 00, FF, 15, 58, 81, 40, 00, 68, 10, A8, 40, 00, 68, 00, 5B, 42, 00, E8, F4, 29, 00, 00, FF, 15, B0, 80, 40, 00, BF, 00, C0, 42, 00, 50, 57, E8, E2, 29, 00, 00...
 
[+]

Entropy:
7.9927

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file 7636.tmp has been seen being distributed by the following URL.

Remove 7636.tmp - Powered by Reason Core Security