nspf1f0.tmp

The file nspf1f0.tmp has been detected as a potentially unwanted program by 22 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “All Programs Connectivity”. The file has been seen being downloaded from d2htwdv930b0cg.cloudfront.net.
MD5:
c194e5344adb4f6c5a5008507dfe8ea5

SHA-1:
d163f250349382b3ad6e45b725295eb347c44e92

SHA-256:
0effad15e721a7904e358e8544130246a65d022d7aae027eb98b2d3c0f134967

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 4:37:28 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2312300
628

Agnitum Outpost
TrojanSpy.Agent
7.1.1

Avira AntiVirus
TR/Crypt.XPACK.Gen
3.6.1.96

avast!
Win32:Dropper-gen [Drp]
2014.9-150517

AVG
Generic_r
2016.0.3106

Baidu Antivirus
PUA.Win32.ConvertAd
4.0.3.15517

Bitdefender
Trojan.GenericKD.2312300
1.0.20.685

Emsisoft Anti-Malware
Trojan.GenericKD.2312300
8.15.05.17.10

ESET NOD32
Win32/Adware.ConvertAd.IE (variant)
9.11526

Fortinet FortiGate
Riskware/ConvertAd
5/17/2015

F-Prot
W32/SuspPack.AA.gen
v6.4.7.1.166

F-Secure
Trojan.GenericKD.2312300
11.2015-17-05_1

G Data
Trojan.GenericKD.2312300
15.5.25

K7 AntiVirus
Adware
13.203.15696

McAfee
Artemis!C194E5344ADB
5600.6762

MicroWorld eScan
Trojan.GenericKD.2312300
16.0.0.411

nProtect
Trojan.GenericKD.2312300
15.04.24.01

Qihoo 360 Security
HEUR/QVM00.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.22.10

Sophos
Generic PUA LD
4.98

Trend Micro House Call
Suspicious_GEN.F47V0422
7.2.137

VIPRE Antivirus
Trojan.Win32.Generic
39634

File size:
120.5 KB (123,392 bytes)

Common path:
C:\users\{user}\appdata\roaming\37464e43-1426598349-4d30-3039-001b2405e7c0\nspf1f0.tmp

File PE Metadata
Compilation timestamp:
4/20/2015 4:09:46 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:+4STHBtyB+zt+xCD6U6Ky07dyePkGJHIy2xutw3iw8Q0nGBm4QdowlJULbupQ:lS1tBzt+IWzE/Iy24Nw8Ym4QdhlKnu

Entry address:
0x43B0

Entry point:
E8, EB, 3E, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 84, DC, 41, 00, FF, 15, 84, 60, 41, 00, 85, C0, 75, 18, 56, E8, 26, 04, 00, 00, 8B, F0, FF, 15, 30, 60, 41, 00, 50, E8, D6, 03, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, E4, F2, 41, 00, 00, 74, 05, E9, 0F, 3F, 00, 00, 57, 8B, F9, 83...
 
[+]

Code size:
83.5 KB (85,504 bytes)

Service
Display name:
All Programs Connectivity

Service name:
wojomesi

Description:
Socket Word Processor

Type:
Win32OwnProcess


The file nspf1f0.tmp has been seen being distributed by the following URL.

Remove nspf1f0.tmp - Powered by Reason Core Security