nsifb69.tmpfs

The file nsifb69.tmpfs has been detected as a potentially unwanted program by 21 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Illustration E-form”. The file has been seen being downloaded from d2htwdv930b0cg.cloudfront.net.
MD5:
ad11871533666d4dcaa42457285a562d

SHA-1:
407d166dce079354fc648a4ecfab87c97c6c7760

SHA-256:
792e21b8d93634fd7c06b0d8cbf50e20b0ecf1d01070b0d31ade31beaf4a1cc7

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/16/2024 3:08:40 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.1254410
634

Agnitum Outpost
PUA.ConvertAd
7.1.1

AVG
Generic6
2016.0.3112

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.15511

Bitdefender
Application.Generic.1254410
1.0.20.655

ESET NOD32
Win32/Adware.ConvertAd.FW (variant)
9.11467

Fortinet FortiGate
Riskware/ConvertAd
5/11/2015

F-Secure
Application.Generic.1254410
11.2015-11-05_2

G Data
Application.Generic.1254410
15.5.25

K7 AntiVirus
Adware
13.203.15813

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2196

McAfee
RDN/Generic PUP.x!cwt
5600.6768

MicroWorld eScan
Application.Generic.1254410
16.0.0.393

Panda Antivirus
Generic Suspicious
15.05.11.07

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Quick Heal
AdWare.ConvertAd.r5 (Not a Virus)
5.15.14.00

Sophos
Generic PUA EA
4.98

Trend Micro House Call
TROJ_GEN.R00GC0EDS15
7.2.131

Trend Micro
TROJ_GEN.R00GC0EDS15
10.465.11

VIPRE Antivirus
Trojan.Win32.Generic
39974

Zillya! Antivirus
Adware.ConvertAd.Win32.312
2.0.0.2167

File size:
137 KB (140,288 bytes)

Common path:
C:\users\{user}\appdata\roaming\4c4c4544-1428941222-5010-8043-b1c04f575331\nsifb69.tmpfs

File PE Metadata
Compilation timestamp:
4/13/2015 11:43:22 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:cFAV1XX9hW91vdFeHXyvKqmni0rMQumWYyq5:cFAV1n9hW97+niSUZ45

Entry address:
0x4CF0

Entry point:
E8, EB, 3E, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 84, 1C, 42, 00, FF, 15, 9C, A0, 41, 00, 85, C0, 75, 18, 56, E8, 26, 04, 00, 00, 8B, F0, FF, 15, 34, A0, 41, 00, 50, E8, D6, 03, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, E4, 32, 42, 00, 00, 74, 05, E9, 0F, 3F, 00, 00, 57, 8B, F9, 83...
 
[+]

Entropy:
6.4052

Code size:
99.5 KB (101,888 bytes)

Service
Display name:
Illustration E-form

Service name:
syxuxevo

Description:
Socket Word Processor

Type:
Win32OwnProcess


The file nsifb69.tmpfs has been seen being distributed by the following URL.

Remove nsifb69.tmpfs - Powered by Reason Core Security