ejemidvlf.exe

Ypicup Yiwekmabi Po

The application ejemidvlf.exe by Ypicup Yiwekmabi Po has been detected as a potentially unwanted program by 5 anti-malware scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘daugava’. While running, it connects to the Internet address map2.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Ypicup Yiwekmabi Po  (signed and verified)

Version:
1.0.0.3

MD5:
453e7f9a59f4e6cdf1b3ec4b996c63a7

SHA-1:
3a5133aea9d337402588d232684d8ce55e5e2259

SHA-256:
71cc50f53416a88ec66858c521286929f7a4ee8c001e27ca5d5fad68a57a85ff

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 11:58:44 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
PUA.Win32.Perion
4.0.3.15727

ESET NOD32
Win32/Toolbar.Perion.N potentially unwanted (variant)
9.12000

Fortinet FortiGate
Riskware/Perion
7/27/2015

Panda Antivirus
Trj/Genetic.gen
15.07.27.04

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.27.16

File size:
422.2 KB (432,288 bytes)

Product version:
1.0.0.3

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\daugava\ejemidvlf.exe

Digital Signature
Authority:
Ypicup Yiwekmabi Po

Valid from:
7/21/2015 6:33:59 AM

Valid to:
7/20/2016 6:33:59 AM

Subject:
CN=Eys Nijpi, O=Ypicup Yiwekmabi Po, L=Gitjinge, S=Rogfe, C=GB

Issuer:
CN=Toqa Lionb, O=Ypicup Yiwekmabi Po, L=Gitjinge, S=Rogfe, C=GB

Serial number:
01

File PE Metadata
Compilation timestamp:
7/22/2015 10:50:25 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:/YRM1kilGpvLQw61Nis8g8wTDPWx8ngxpppppppfJ9kgP:/YRRoyz61nuqPiH7P

Entry address:
0x26142

Entry point:
E8, 99, 79, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, 83, 3D, B0, 09, 45, 00, 01, 72, 5F, 0F, B6, 44, 24, 08, 8B, D0, C1, E0, 08, 0B, D0, 66, 0F, 6E, DA, F2, 0F, 70, DB, 00, 0F, 16, DB, 8B, 54, 24, 04, B9, 0F, 00, 00, 00, 83, C8, FF, 23, CA, D3, E0, 2B, D1, F3, 0F, 6F, 0A, 66, 0F, EF, D2, 66, 0F, 74, D1, 66, 0F, 74, CB, 66, 0F, EB, D1, 66, 0F, D7, CA, 23, C8, 75, 08, 83, C8, FF, 83, C2, 10, EB, DC, 0F, BC, C1, 03, C2, 66, 0F, 7E, DA, 33, C9, 3A, 10, 0F, 45, C1, C3, 33, C0, 8A, 44, 24, 08, 53, 8B, D8, C1...
 
[+]

Entropy:
5.9579

Code size:
243.5 KB (249,344 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
daugava

Command:
C:\Program Files\daugava\ejemidvlf.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to map2.hwcdn.net  (205.185.216.42:80)

Remove ejemidvlf.exe - Powered by Reason Core Security