awheb3d.tmp

Navegaki

Ren Jing

The file awheb3d.tmp by Ren Jing has been detected as a potentially unwanted program by 2 anti-malware scanners. The file has been seen being downloaded from eggupload.brotlab.net.
Publisher:
${COMPANY_NAME}  (signed by Ren Jing)

Product:
Navegaki

Description:
Navegaki Setup

Version:
2.0.2.1

MD5:
35f3375a7d480e4d8f0b07498a370233

SHA-1:
a93a5831e443b1581292e6c6674b8dca8a3b8f95

SHA-256:
3210bf8334b2efeb5f95c2380ef18f8548f4b1e142815d824e8c3f3634b0476e

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
5/12/2024 5:50:39 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Adware.Agent.NPT application
8.0.319.0

Reason Heuristics
PUP.Bundler (M)
16.4.1.15

File size:
1.1 MB (1,125,440 bytes)

Product version:
2.0.2.1

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\awheb3d.tmp

Digital Signature
Signed by:

Authority:
WoSign CA Limited

Valid from:
8/26/2015 11:14:33 PM

Valid to:
8/26/2016 11:14:33 PM

Subject:
CN=Ren Jing, L=Beijing, S=Beijing, C=CN

Issuer:
CN=WoSign Class 2 Code Signing CA, O=WoSign CA Limited, C=CN

Serial number:
4AABE7C4E55AE3765929658935834CFD

File PE Metadata
Compilation timestamp:
12/27/2015 4:25:55 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:dd962u7PgzOQ4Q9IZTlg9nEV8Q4Q9IZz62u7PgK:du2ujaI/gBaIQ2u1

Entry address:
0x326A

Entry point:
81, EC, D4, 02, 00, 00, 55, 56, 6A, 20, 33, ED, 5E, 89, 6C, 24, 0C, 68, 01, 80, 00, 00, C7, 44, 24, 0C, 00, 93, 40, 00, 89, 6C, 24, 18, FF, 15, B0, 70, 40, 00, FF, 15, AC, 70, 40, 00, 66, 3D, 06, 00, 74, 11, 55, E8, 51, 31, 00, 00, 3B, C5, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 53, 57, 68, F4, 92, 40, 00, E8, CE, 30, 00, 00, 68, EC, 92, 40, 00, E8, C4, 30, 00, 00, 68, E0, 92, 40, 00, E8, BA, 30, 00, 00, 6A, 09, E8, 1F, 31, 00, 00, 6A, 07, E8, 18, 31, 00, 00, A3, 24, 92, 42, 00, FF, 15, 44, 70, 40, 00, 55, FF...
 
[+]

Code size:
24 KB (24,576 bytes)

The file awheb3d.tmp has been seen being distributed by the following URL.

Remove awheb3d.tmp - Powered by Reason Core Security