nsy5755.tmp

The file nsy5755.tmp has been detected as a potentially unwanted program by 21 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Capacity Touch Screen”.
MD5:
3ceaeb78d11aceb26c1eecfb655f0d03

SHA-1:
539e02706d2d17c0257989343ad7361058a62690

SHA-256:
b249aa0d0d5b5d9c66c88c40fa5bde8e631d7c24d3e9aaf8dfa9f0e8326e5c30

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 10:51:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2323417
625

Agnitum Outpost
PUA.ConvertAd
7.1.1

avast!
Win32:Dropper-gen [Drp]
2014.9-150521

AVG
Generic_r
2016.0.3103

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.15521

Bitdefender
Trojan.GenericKD.2323417
1.0.20.705

Dr.Web
Adware.ClickMeIn.1233
9.0.1.0142

Emsisoft Anti-Malware
Trojan.GenericKD.2323417
8.15.05.21.01

ESET NOD32
Win32/Adware.ConvertAd.JM (variant)
9.11615

F-Secure
Trojan.GenericKD.2323417
11.2015-21-05_5

G Data
Trojan.GenericKD.2323417
15.5.25

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2002

McAfee
RDN/Generic PUP.x!cw3
5600.6757

MicroWorld eScan
Trojan.GenericKD.2323417
16.0.0.423

NANO AntiVirus
Trojan.Win32.Agent.drfenn
0.30.24.1357

nProtect
Trojan.GenericKD.2323417
15.05.11.01

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.22.10

Sophos
Generic PUA BK
4.98

Trend Micro House Call
TROJ_GEN.R0C1H09E215
7.2.141

VIPRE Antivirus
Trojan.Win32.Generic
40176

File size:
280.5 KB (287,232 bytes)

Common path:
C:\users\{user}\appdata\roaming\4c4c4544-1428943365-4610-8034-cac04f4d5431\nsy5755.tmp

File PE Metadata
Compilation timestamp:
4/25/2015 5:05:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:ZecMq5uYUcEmuAIY5p3gknJMGUSqJ9x84kqcG5qmqI2NdDv5ZcnVl/p620CkzvVB:wwlEmuA1pQweVnJ9x84QIiv5ZcDQbzd

Entry address:
0x17C2B

Entry point:
E8, AE, 5D, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 84, 5D, 44, 00, FF, 15, 84, B0, 43, 00, 85, C0, 75, 18, 56, E8, BC, 11, 00, 00, 8B, F0, FF, 15, 30, B0, 43, 00, 50, E8, 6C, 11, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, 64, 74, 44, 00, 00, 74, 05, E9, DD, 5D, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C...
 
[+]

Entropy:
6.5366

Code size:
228.5 KB (233,984 bytes)

Service
Display name:
Capacity Touch Screen

Service name:
tofifihi

Description:
Socket Word Processor

Type:
Win32OwnProcess


Remove nsy5755.tmp - Powered by Reason Core Security