nsod69b.tmp

The file nsod69b.tmp has been detected as a potentially unwanted program by 23 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Dial-up Network”. The file has been seen being downloaded from d2htwdv930b0cg.cloudfront.net.
MD5:
abf2b5eae0e4913d42d1bb465e31cdf0

SHA-1:
95b0dd77e09961c0a687b6842639920721bf3fd1

SHA-256:
7fc84caae7be90d0e02b8ea48b5bde4ca15833b5e4c4b835d7b22e87f419acb7

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
4/20/2024 2:51:30 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2324353
625

Agnitum Outpost
PUA.ConvertAd
7.1.1

avast!
Win32:Adware-gen [Adw]
2014.9-150521

AVG
Generic_r
2016.0.3103

Baidu Antivirus
PUA.Win32.Agent
4.0.3.15521

Bitdefender
Trojan.GenericKD.2324353
1.0.20.705

Dr.Web
Adware.ClickMeIn.1209
9.0.1.0141

Emsisoft Anti-Malware
Trojan.GenericKD.2324353
8.15.05.21.06

ESET NOD32
Win32/Adware.ConvertAd.JM (variant)
9.11615

Fortinet FortiGate
Riskware/ConvertAd
5/21/2015

F-Secure
Trojan.GenericKD.2324353
11.2015-21-05_5

G Data
Trojan.GenericKD.2324353
15.5.25

K7 AntiVirus
Adware
13.203.15889

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2002

McAfee
Artemis!ABF2B5EAE0E4
5600.6759

MicroWorld eScan
Trojan.GenericKD.2324353
16.0.0.423

NANO AntiVirus
Trojan.Win32.Agent.drfenn
0.30.24.1357

nProtect
Trojan.GenericKD.2324353
15.05.11.01

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.22.10

Sophos
Generic PUA BK
4.98

Trend Micro House Call
TROJ_GEN.R00GC0OE215
7.2.141

Trend Micro
TROJ_GEN.R00GC0OE215
10.465.21

VIPRE Antivirus
Trojan.Win32.Generic
40176

File size:
280.5 KB (287,232 bytes)

Common path:
C:\users\{user}\appdata\roaming\a239ac80-1429011020-81df-36d6-20cf30335fe3\nsod69b.tmp

File PE Metadata
Compilation timestamp:
4/25/2015 10:08:29 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:OecvYAeUIIo+5pIlVM2IRMeeJgWdZceOdCM5:hcXeUL5pIlVMhzeJgWPceOdCM

Entry address:
0x17B8B

Entry point:
E8, AE, 5D, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 84, 5D, 44, 00, FF, 15, 84, B0, 43, 00, 85, C0, 75, 18, 56, E8, BC, 11, 00, 00, 8B, F0, FF, 15, 30, B0, 43, 00, 50, E8, 6C, 11, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, 64, 74, 44, 00, 00, 74, 05, E9, DD, 5D, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C...
 
[+]

Code size:
228.5 KB (233,984 bytes)

Service
Display name:
Dial-up Network

Service name:
zowutygy

Description:
Socket Word Processor

Type:
Win32OwnProcess


The file nsod69b.tmp has been seen being distributed by the following URL.

Remove nsod69b.tmp - Powered by Reason Core Security