tmps.exe

Jmna9lHm

The application tmps.exe by Jmna9lHm has been detected as adware by 20 anti-malware scanners. It is also typically executed from the user's temporary directory.
Publisher:
TODO: aKnniU0l  (signed by Jmna9lHm)

Product:
TODO: aKnniU0l

Version:
12.14.10.16

MD5:
11b9d4bda78fc87de53c89166d14290a

SHA-1:
5b351cbf3be35b1fa0ca368c67a67a6d5fecfdff

SHA-256:
c165d82106f446cbf848bedc73197dd7e6b776765c6927766b25d97290a54a53

Scanner detections:
20 / 68

Status:
Adware

Analysis date:
5/14/2024 6:51:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.523026
6254010

AhnLab V3 Security
Adware/Win32.MultiPlug
2014.12.25

Avira AntiVirus
TR/Adload.tsgee
7.11.197.174

avast!
Win32:Malware-gen
141214-1

AVG
Adware Generic6.EDX
2014.0.4235

Baidu Antivirus
Adware.Win32.MultiPlug
4.0.3.141224

Bitdefender
Gen:Variant.Kazy.523026
1.0.20.1790

Emsisoft Anti-Malware
Gen:Variant.Kazy.523026
9.0.0.4668

ESET NOD32
Win32/Adware.MultiPlug.EE application
7.0.302.0

Fortinet FortiGate
Riskware/MultiPlug
12/24/2014

F-Secure
Gen:Variant.Kazy.523026
5.13.68

G Data
Gen:Variant.Kazy.523026
14.12.24

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.2746

McAfee
Trojan.Artemis!11B9D4BDA78F
16.8.708.2

MicroWorld eScan
Gen:Variant.Kazy.523026
15.0.0.1074

Norman
Gen:Variant.Kazy.523026
04.12.2014 14:30:06

Qihoo 360 Security
HEUR/QVM20.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Jmna9lHm.E
15.1.4.13

Rising Antivirus
PE:Malware.Obscure/Heur!1.9E03
23.00.65.141222

Trend Micro House Call
TROJ_GEN.R0C1H09LM14
7.2.358

File size:
225.9 KB (231,344 bytes)

Product version:
12.14.10.16

Copyright:
kHnm88Ml0

Original file name:
kHnm88Ml0.exe

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\tmps.exe

Digital Signature
Signed by:

Authority:
Jmna9lHm

Valid from:
12/19/2014 6:02:40 PM

Valid to:
1/1/2040 7:59:59 AM

Subject:
CN=Jmna9lHm

Issuer:
CN=Jmna9lHm

Serial number:
FEC4DCF0057003A34A9E752C2DD81288

File PE Metadata
Compilation timestamp:
12/19/2014 6:39:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:7y1bOejtru3rwsZRoWOW7nugTKb2CW3CDXKCOJvwdd/AHEVb+dCuDf+lM3SQS+SO:7vur0hv5nBs8

Entry address:
0x159D

Entry point:
55, 8B, EC, 81, EC, CC, 02, 00, 00, 56, 57, C7, 85, 64, FD, FF, FF, CC, 57, 80, 25, C7, 85, 68, FD, FF, FF, E8, 62, AF, 80, C7, 85, 6C, FD, FF, FF, A4, 8A, 86, D0, C7, 85, 70, FD, FF, FF, E5, 85, B4, 8D, C7, 85, 74, FD, FF, FF, 65, 7E, F8, 8D, C7, 85, 78, FD, FF, FF, FD, 55, CA, 8C, C7, 85, 7C, FD, FF, FF, 8C, 8C, 60, 50, C7, 85, 80, FD, FF, FF, B7, 56, E5, D2, C7, 85, 84, FD, FF, FF, A0, F7, BF, 08, C7, 85, 88, FD, FF, FF, FF, 8F, 7C, C5, 83, A5, 8C, FD, FF, FF, 00, C7, 85, 08, FF, FF, FF, F4, 15, 93, B0...
 
[+]

Entropy:
6.7051

Developed / compiled with:
Microsoft Visual C++

Code size:
155.5 KB (159,232 bytes)

Remove tmps.exe - Powered by Reason Core Security