nsw4c3d.tmp

The file nsw4c3d.tmp has been detected as a potentially unwanted program by 23 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Domain Stop”. The file has been seen being downloaded from d2htwdv930b0cg.cloudfront.net.
MD5:
e4bd35bfe325daddf00a357e0d48e7d3

SHA-1:
ca1314d16b0b8345c85c3da2a2a1f494e11a787c

SHA-256:
0b9f9a645f450308b21f4623d430fc4113c46c8c9f50d2070b28be5ce78f217f

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
5/4/2024 11:18:41 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2324495
625

Agnitum Outpost
PUA.ConvertAd
7.1.1

avast!
Win32:Adware-gen [Adw]
2014.9-150521

AVG
Generic_r
2016.0.3103

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.15521

Bitdefender
Trojan.GenericKD.2324495
1.0.20.705

Dr.Web
Adware.ClickMeIn.1232
9.0.1.0141

Emsisoft Anti-Malware
Trojan.GenericKD.2324495
8.15.05.21.07

ESET NOD32
Win32/Adware.ConvertAd.JM
9.11615

Fortinet FortiGate
Riskware/ConvertAd
5/21/2015

F-Secure
Trojan.GenericKD.2324495
11.2015-21-05_5

G Data
Trojan.GenericKD.2324495
15.5.25

K7 AntiVirus
Adware
13.203.15889

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2002

McAfee
Artemis!E4BD35BFE325
5600.6759

MicroWorld eScan
Trojan.GenericKD.2324495
16.0.0.423

NANO AntiVirus
Riskware.Win32.ClickMeIn.drkolc
0.30.24.1357

nProtect
Trojan.GenericKD.2324495
15.05.11.01

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.22.10

Sophos
Generic PUA BK
4.98

Trend Micro House Call
TROJ_GEN.R00UC0OEB15
7.2.141

Trend Micro
TROJ_GEN.R00UC0OEB15
10.465.21

VIPRE Antivirus
Trojan.Win32.Generic
40176

File size:
280 KB (286,720 bytes)

Common path:
C:\users\{user}\appdata\roaming\64b8b312-1429395655-11e4-b290-f80f41d1dd3a\nsw4c3d.tmp

File PE Metadata
Compilation timestamp:
4/26/2015 4:46:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:iLwqGN4wmdHpdcav2+IJAQ2guSEsK5MRBwvZ7u:0wP4wmtcav2Hu7guzskMR2Za

Entry address:
0x17AE7

Entry point:
E8, A3, 5D, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 84, 4D, 44, 00, FF, 15, 84, A0, 43, 00, 85, C0, 75, 18, 56, E8, C0, 11, 00, 00, 8B, F0, FF, 15, 30, A0, 43, 00, 50, E8, 70, 11, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, 64, 64, 44, 00, 00, 74, 05, E9, CE, 5D, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83...
 
[+]

Entropy:
6.5386

Code size:
228 KB (233,472 bytes)

Service
Display name:
Domain Stop

Service name:
nuqumimi

Description:
Socket Word Processor

Type:
Win32OwnProcess


The file nsw4c3d.tmp has been seen being distributed by the following URL.

Remove nsw4c3d.tmp - Powered by Reason Core Security