aln2723.tmp

VOLARO Ltd.

The file aln2723.tmp by VOLARO has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory.
Publisher:
VOLARO Ltd.  (signed and verified)

MD5:
34242198a6948dc3838493f75f6266ee

SHA-1:
bb6d554d41fa84478bb8d8242b6768d06871700d

SHA-256:
4ff684a7ee96e6c832cb78967fe5fe5536b000be31669eadd023fb16c5242fac

Scanner detections:
33 / 68

Status:
Adware

Analysis date:
4/25/2024 10:10:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Generic.598302
790

Agnitum Outpost
Adware.Vonteera
7.1.1

AhnLab V3 Security
Adware/Win32.Vonteera
2013.11.20

Avira AntiVirus
Adware/Vonteera.A.22
7.11.114.140

avast!
Win32:Adware-BGC [Adw]
2014.9-140925

AVG
Generic5.ADEP.dropper
2015.0.3340

Baidu Antivirus
[19:18:18]
4.0.3.14127

Bkav FE
W32.Cloda8d.Trojan
1.3.0.4562

Comodo Security
ApplicUnwnt
17298

Dr.Web
Trojan.StartPage.55388
9.0.1.0268

ESET NOD32
Win32/Toolbar.GadgetBox (variant)
8.9067

Fortinet FortiGate
Adware/Vonteera
9/25/2014

F-Secure
Dropped:Adware.Generic.598302
11.2014-07-12_1

G Data
Script.Adware.NoVooIT
14.9.24

herdProtect (fuzzy)
2014.12.7.16

IKARUS anti.virus
AdWare.Vonteera
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.173.10249

Kaspersky
not-a-virus:AdWare.Win32.Vonteera
14.0.0.3196

Malwarebytes
PUP.Optional.Vonteera.A
v2014.09.25.06

McAfee
Artemis!93B82D73C79C
5600.6996

Microsoft Security Essentials
Adware:Win32/Vonteera
1.163.1557.0

MicroWorld eScan
Dropped:Adware.Generic.598302
15.0.0.1023

NANO AntiVirus
Riskware.Win32.Vonteera.dakook
0.28.2.62151

Norman
Suspicious_Gen5.AMATW
11.20140925

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Quick Heal
Adware.Vonteera (Not a Virus)
9.14.12.00

Reason Heuristics
PUP.VOLARO.K
14.9.25.18

Rising Antivirus
PE:Trojan.Win32.Generic.15B9763D!364475965
23.00.65.14923

Sophos
Vonteera
4.96

Trend Micro House Call
TROJ_GEN.R0C1H01JN13
7.2.268

Trend Micro
TROJ_GEN.R0CBC0DJD13
10.465.25

Vba32 AntiVirus
AdWare.Vonteera
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic!SB.0
23520

File size:
997.9 KB (1,021,800 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\aln2723.tmp

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/15/2013 3:00:00 AM

Valid to:
2/28/2014 2:59:59 AM

Subject:
CN=VOLARO Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=VOLARO Ltd., L=Sofia, S=Bulgaria, C=BG

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45902E82A000D2497C38FE709EF124BC

File PE Metadata
Compilation timestamp:
12/6/2009 1:50:46 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:APohPwaYkbDbufPZD/3liYE3emcToW3+FUOU09OuwVz/R2gggCnvb:qePwxkqfPR9zmA3+K/0AuwVzcgggCvb

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9927

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

Remove aln2723.tmp - Powered by Reason Core Security