1p1i9lkpusw==0.exe

The application 1p1i9lkpusw==0.exe has been detected as a potentially unwanted program by 26 anti-malware scanners. The file has been seen being downloaded from deu04z3f41ov0.cloudfront.net.
MD5:
fb11167055381e5c5e1a4f537e835a72

SHA-1:
448492deb67e5c490673a41853ef76bb22c32163

SHA-256:
063676b86928632d0cc5ffc77157b76f10cd704eadf5c9cb8cf96a4ab6cdd5d5

Scanner detections:
26 / 68

Status:
Potentially unwanted

Analysis date:
12/24/2024 4:23:45 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2655394
501

Agnitum Outpost
PUA.Imali
7.1.1

Avira AntiVirus
ADWARE/Imali.190976
8.3.2.2

Arcabit
Trojan.Generic.D2884A2
1.0.0.525

avast!
Win32:Malware-gen
2014.9-150921

AVG
Generic6
2016.0.2979

Baidu Antivirus
Adware.Win32.Imali
4.0.3.15921

Bitdefender
Trojan.GenericKD.2655394
1.0.20.1320

Comodo Security
ApplicUnwnt
23207

Dr.Web
Trojan.DownLoader15.48678
9.0.1.0264

Emsisoft Anti-Malware
Trojan.GenericKD.2655394
8.15.09.21.03

ESET NOD32
Win32/Adware.Imali.F application
7.0.302.0

Fortinet FortiGate
Riskware/Imali
9/21/2015

F-Secure
Trojan.GenericKD.2655394
11.2015-21-09_2

G Data
Trojan.GenericKD.2655394
15.9.25

K7 AntiVirus
Adware
13.2017171

McAfee
RDN/Generic PUP.x
5600.6635

MicroWorld eScan
Trojan.GenericKD.2655394
16.0.0.792

NANO AntiVirus
Trojan.Win32.DownLoader15.dvlzru
0.30.24.3283

nProtect
Trojan.GenericKD.2655394
15.09.10.01

Panda Antivirus
Generic Suspicious
15.09.21.03

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA EE (PUA)
4.98

Trend Micro
TROJ_GEN.R015C0OHM15
10.465.21

VIPRE Antivirus
Trojan.Win32.Generic
43638

Zillya! Antivirus
Adware.Imali.Win32.95
2.0.0.2392

File size:
186.5 KB (190,976 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\Local settings\temp\{random}.tmp\1p1i9lkpusw==0.exe

File PE Metadata
Compilation timestamp:
8/17/2015 3:27:35 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:eI86tqbaAE924K6nMyEtZIsPYNVLqYBTC1c1AvYqD1JvZpZa+1sqtI8/Gj:eI86tqWg1yAIXH3wVvZvPb1sYIfj

Entry address:
0xF5CC

Entry point:
E8, 48, 71, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, F8, E3, 41, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, B0, E0, 41, 00, C9, C2, 08, 00, FF, 35, B8, 91, 42, 00, FF, 15, 88, E0, 41, 00, 85, C0, 74, 02, FF, D0, 6A, 19, E8, 39, 69, 00, 00, 6A, 01, 6A, 00, E8, 40, 28, 00, 00, 83, C4, 0C, E9, 05, 28, 00, 00...
 
[+]

Entropy:
6.2028

Code size:
115 KB (117,760 bytes)

The file 1p1i9lkpusw==0.exe has been seen being distributed by the following URL.

Remove 1p1i9lkpusw==0.exe - Powered by Reason Core Security