oujzmdpj.exe

The executable oujzmdpj.exe has been detected as malware by 3 anti-virus scanners. It runs as a windows Service named “Policy Virtual Extensible SSDP”. While running, it connects to the Internet address expirepages-kiae-2.nic.ru on port 80 using the HTTP protocol.
MD5:
f8a96c312ff1b2994ca3aa1719ccb4e8

SHA-1:
f01c0e2fd292e5c173b84da73e93a4a121078fa1

SHA-256:
dfd956611b722c3eb3d9141b5731947e7399e67725a958870a11d102566a9d2f

Scanner detections:
3 / 68

Status:
Malware

Analysis date:
11/26/2024 11:13:09 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

avast!
Win32:Malware-gen
160917-0

Dr.Web
Trojan.DownLoader21.35838
9.0.1.05190

ESET NOD32
Win32/Bayrob.BL trojan
6.3.12010.0

File size:
1 MB (1,061,888 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\oujzmdpj.exe

File PE Metadata
Compilation timestamp:
6/5/2013 11:22:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

Entry address:
0xCA97C

Entry point:
E8, B1, 9E, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 28, D0, 4E, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 2C, D0, 4E, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, EB, 18, 00, 00, 85, C0, 75, 06, B8, 90, D1, 4E, 00, C3, 83, C0, 08, C3, E8, D8, 18, 00, 00, 85, C0, 75, 06, B8, 94, D1, 4E, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
7.0366

Code size:
913 KB (934,912 bytes)

Service
Display name:
Policy Virtual Extensible SSDP

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip234.208-100-26.static.steadfastdns.net  (208.100.26.234:80)

TCP:
Connects to 108-191-215-119.biz.bhn.net  (108.191.215.119:25714)

TCP:
Connects to static-191-98-226-199.alfanumeric.com.ni  (191.98.226.199:43162)

TCP (HTTP):
Connects to www1496.sakura.ne.jp  (219.94.163.106:80)

TCP (HTTP):
Connects to www1002.sakura.ne.jp  (219.94.129.12:80)

TCP (HTTP):
Connects to wnstatic1.wn.com  (195.149.84.100:80)

TCP (HTTP):
Connects to tux3.hoststar.at  (213.239.212.87:80)

TCP:
Connects to ppp25310786160.ambra.ro  (86.107.253.160:31907)

TCP (HTTP):
Connects to p8p-i.geo.vip.ne1.yahoo.com  (98.138.19.143:80)

TCP (HTTP):
Connects to ns367923.ip-94-23-28.eu  (94.23.28.181:80)

TCP (HTTP):
Connects to m2.halflife3.beget.com  (87.236.19.174:80)

TCP (HTTP):
Connects to li963-234.members.linode.com  (45.33.9.234:80)

TCP (HTTP):
Connects to kundenserver.de  (217.160.122.131:80)

TCP (HTTP):
Connects to k28.hostenko.com  (193.106.248.89:80)

TCP (HTTP):
Connects to ip-77-104-146-26.siteground.com  (77.104.146.26:80)

TCP (HTTP):
Connects to ip-50-63-202-55.ip.secureserver.net  (50.63.202.55:80)

TCP:
Connects to ip-223-36.tricom.net  (186.120.223.36:38705)

TCP (HTTP):
Connects to ip-184-168-221-60.ip.secureserver.net  (184.168.221.60:80)

TCP:
Connects to ip-118-90-95-101.xdsl.xnet.co.nz  (118.90.95.101:30173)

TCP:
Connects to host-97.hipuu.com.py  (190.104.164.97:51683)

Remove oujzmdpj.exe - Powered by Reason Core Security