produpd.exe

produpd.exe

Vested Development, Inc

The executable produpd.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address video-edge-c67f2c.cdg02.hls.ttvnw.net on port 80 using the HTTP protocol.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
2e4139751114593a7e1ad0fa1ab97969

SHA-1:
f395f11f5a21bf0262fd61ca8518d743dcff6a3c

SHA-256:
5759a09be8a1ffafda83147cd3400dbc74e12bf5857cf490e7d84d69b72e9717

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/23/2024 3:23:44 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Glupteba
17.2.13.7

File size:
501.5 KB (513,536 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
2/13/2017 10:26:47 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe" \20831


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to su1.oshq.ru  (46.28.69.13:444)

TCP (HTTP):
Connects to g1.formy.net  (195.191.248.36:80)

TCP (HTTP SSL):
Connects to server-54-192-98-146.arn1.r.cloudfront.net  (54.192.98.146:443)

TCP:
Connects to ih396272.dedic.myihor.ru  (194.67.211.107:444)

TCP:
Connects to dtc.cifraclub.com  (213.159.212.211:444)

TCP (HTTP):
Connects to static.khi77.pie.net.pk  (221.120.207.34:80)

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.181.96:443)

TCP (HTTP):
Connects to ip230.ip-5-135-168.eu  (5.135.168.230:80)

TCP:
Connects to interviewder.net  (91.203.5.26:8000)

TCP (HTTP SSL):
Connects to a23-78-93-104.deploy.static.akamaitechnologies.com  (23.78.93.104:443)

TCP (HTTP SSL):
Connects to a104-122-243-148.deploy.static.akamaitechnologies.com  (104.122.243.148:443)

TCP (HTTP SSL):
Connects to webcluster.ngs.ru  (195.93.187.10:443)

TCP (HTTP):
Connects to video-edge-c67f2c.cdg02.hls.ttvnw.net  (52.223.195.209:80)

TCP:
Connects to p087.purple.myloc.de  (85.114.133.87:444)

TCP (HTTP SSL):
Connects to mobileproxy.passport.yandex.net  (213.180.193.115:443)

TCP:
Connects to l094.lemon.myloc.de  (93.186.192.94:444)

TCP:
Connects to ip83_242.sevtelecom.ru  (185.71.83.242:4899)

TCP (HTTP SSL):
Connects to instagram-p3-shv-01-fra3.fbcdn.net  (31.13.93.52:443)

TCP:
Connects to f755.fuchsia.servdiscount-customer.com  (85.14.243.91:8000)

TCP:
Connects to ec2-52-88-18-148.us-west-2.compute.amazonaws.com  (52.88.18.148:6667)

Remove produpd.exe - Powered by Reason Core Security