jnsb9bf0.tmp

The file jnsb9bf0.tmp has been detected as a potentially unwanted program by 31 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Device Greyscale”. The file has been seen being downloaded from d2fpsq9kg43yka.cloudfront.net and multiple other hosts.
MD5:
22b39241e115942e7a88ff7b92a96a22

SHA-1:
04a0af78770f4cb4a71d394b399f0dbebb715940

SHA-256:
be41fb8aaf6df9165998fb294474acb31d42048efc53fbf916896b1c2385800f

Scanner detections:
31 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 7:01:18 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.137830
5696417

Agnitum Outpost
PUA.ConvertAd
7.1.1

Avira AntiVirus
TR/Crypt.XPACK.Gen
3.6.1.96

avast!
Win32:Adware-gen [Adw]
2014.9-150513

AVG
Generic6
2016.0.3111

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.15513

Bitdefender
Gen:Variant.Adware.Mikey.11503
1.0.20.665

Comodo Security
UnclassifiedMalware
21986

Dr.Web
Adware.ClickMeIn.3669
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Mikey.11503
8.15.05.13.12

ESET NOD32
Win32/Adware.ConvertAd.GJ application
7.0.302.0

Fortinet FortiGate
Riskware/ConvertAd
5/13/2015

F-Prot
W32/SuspPack.AA.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Zusy.137830
5.15.21

G Data
Gen:Variant.Adware.Mikey.11503
15.5.25

herdProtect (fuzzy)
2015.7.17.2

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.203.15786

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2050

McAfee
RDN/Generic PUP.x!cwm
5600.6767

MicroWorld eScan
Gen:Variant.Adware.Mikey.11503
16.0.0.399

NANO AntiVirus
Riskware.Win32.ConvertAd.drabzt
0.30.24.1357

Norman
Obfuscated_J.QUW
11.20150513

Panda Antivirus
Trj/Genetic.gen
15.04.15.01

Qihoo 360 Security
HEUR/QVM00.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA AE
4.98

Trend Micro House Call
TROJ_GEN.R047B01DO15
7.2.133

Trend Micro
ADW_CONVAD
10.465.13

VIPRE Antivirus
Trojan.Win32.Generic
39974

ViRobot
Trojan.Win32.S.Agent.117248.EJ[h]
2014.3.20.0

Zillya! Antivirus
Adware.ConvertAd.Win32.372
2.0.0.2165

File size:
114.5 KB (117,248 bytes)

Common path:
C:\users\{user}\appdata\roaming\c1dcb762-1429103457-34a7-3e71-e03f49e682c0\jnsb9bf0.tmp

File PE Metadata
Compilation timestamp:
4/15/2015 1:42:36 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:yjDRDpLdSjv+8NyWUCdNaKXBxoklUZfpeeiN:yRp8jv9NpdNakfbUZxg

Entry address:
0xB1C9

Entry point:
E8, 80, 3A, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 10, 52, 41, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 80, 50, 41, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 55, 08, 56, 57, 85, D2, 74, 07, 8B, 7D, 0C, 85, FF, 75, 13, E8, 61, 1C, 00, 00, 6A, 16, 5E, 89, 30, E8, 05, 1C, 00, 00, 8B, C6, EB, 33, 8B, 45...
 
[+]

Code size:
79 KB (80,896 bytes)

Service
Display name:
Device Greyscale

Service name:
poxuwyvy

Description:
Free Up Operator

Type:
Win32OwnProcess


The file jnsb9bf0.tmp has been seen being distributed by the following 2 URLs.

Remove jnsb9bf0.tmp - Powered by Reason Core Security