nsr1127.tmp

The file nsr1127.tmp has been detected as a potentially unwanted program by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from d16hr9n7t75k58.cloudfront.net.
MD5:
c4e59d8786dbc7cdc6d4b4b74ef20ba8

SHA-1:
834944774cd8922cf9d3b1deea3df808b94a3f44

SHA-256:
5cc2ca392a684cb6cb24bd11d930d8d46605a81d24dcad496dd10d260a657567

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
4/20/2024 4:14:07 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.11.12

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1137

Qihoo 360 Security
QVM42.0.Malware.Gen
1.0.0.1077

Reason Heuristics
Adware.Downloader.KY (M)
16.2.29.18

File size:
54.9 KB (56,175 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsr1127.tmp

File PE Metadata
Compilation timestamp:
12/6/2009 5:50:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1536:+pgpHzb9dZVX9fHMvG0D3XJh3mI0fUf2E+o41ahfl:EgXdZt9P6D3XJL002Jo4s/

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsr1127.tmp has been seen being distributed by the following URL.

Remove nsr1127.tmp - Powered by Reason Core Security