produpd.exe

produpd.exe

Vested Development, Inc

The application produpd.exe has been detected as a potentially unwanted program by 18 anti-malware scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘produpd’. While running, it connects to the Internet address nb.captcha.yandex.net on port 443.
Publisher:
Vested Development, Inc

Product:
produpd.exe

Version:
2.2.1.23

MD5:
d824b06fd505ed7c99fc34d669d7d71b

SHA-1:
04d21444504f680dd1248c439020e98fda1334b8

SHA-256:
2648ed3175314aba9ac2f01359832dbee63e277723bacb1bf29e1eee67c40733

Scanner detections:
18 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 12:27:59 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Razy.84351
59

AhnLab V3 Security
Trojan/Win32.Generic.C1612235
3.8.2.16

Avira AntiVirus
TR/ATRAPS.hefpy
8.3.3.4

Arcabit
Trojan.Razy.D1497F
1.0.0.789

avast!
Win32:Malware-gen
2014.9-161207

AVG
Atros4
2017.0.2537

Bitdefender
Gen:Variant.Razy.84351
1.0.20.1710

Emsisoft Anti-Malware
Gen:Variant.Razy.84351
8.16.12.07.01

ESET NOD32
Win32/Glupteba.AT
10.14563

F-Secure
Gen:Variant.Razy.84351
11.2016-07-12_4

G Data
Gen:Variant.Razy.84351
16.12.25

IKARUS anti.virus
Trojan.Win32.Glupteba
0.1.3.4

K7 AntiVirus
Trojan
13.245.21735

Malwarebytes
PUP.Optional.ProductUpdater
v2016.12.07.01

MicroWorld eScan
Gen:Variant.Razy.84351
17.0.0.1026

Panda Antivirus
Generic Malware
16.12.07.01

Qihoo 360 Security
HEUR/QVM10.1.0000.Malware.Gen
1.0.0.1120

VIPRE Antivirus
Trojan.Win32.Generic
54300

File size:
502 KB (514,048 bytes)

Product version:
2.2.0.2

Copyright:
Copyright © 2016

Original file name:
produpd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe

File PE Metadata
Compilation timestamp:
12/7/2016 7:05:23 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x1C39E

Entry point:
E8, D8, 09, 00, 00, E9, 8E, FE, FF, FF, FF, 25, B0, 52, 45, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 8B, 4D, F0, 33, CD, F2, E8, 71, F8, FF, FF, F2, E9, DA, FF, FF, FF, 8B, 4D, EC, 33, CD, F2, E8, 60, F8, FF, FF, F2, E9, C9, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, F0, 46, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00...
 
[+]

Entropy:
6.5692

Code size:
333.5 KB (341,504 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
produpd

Command:
"C:\users\{user}\appdata\roaming\vdi\shared\product updater\produpd.exe"


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to signin.ea.com  (159.153.228.140:443)

TCP (HTTP SSL):
Connects to a104-122-252-240.deploy.static.akamaitechnologies.com  (104.122.252.240:443)

TCP (SMTP):
Connects to mta-v1.mail.vip.bf1.yahoo.com  (66.196.118.33:25)

TCP (HTTP):
Connects to l2top.ru  (91.121.37.31:80)

TCP (HTTP):
Connects to is-dccache01.i.smailru.net  (188.93.56.112:80)

TCP:
Connects to sv829.xserver.jp  (157.112.176.30:587)

TCP (HTTP SSL):
Connects to static.172.8.251.148.clients.your-server.de  (148.251.8.172:443)

TCP (HTTP SSL):
Connects to sso.suntrust.com  (167.181.46.184:443)

TCP (HTTP SSL):
Connects to signin.g.ebay.com  (66.211.181.96:443)

TCP (HTTP):
Connects to server.newsan.com.ar  (190.183.255.141:80)

TCP (SMTP):
Connects to mail.asahi-net.or.jp  (202.224.39.196:25)

TCP:
Connects to ip-static-94-242-254-135.server.lu  (94.242.254.135:8000)

TCP:
Connects to host136-200-static.57-82.alice.it  (82.57.200.136:143)

TCP (HTTP SSL):
Connects to e.mail.ru  (94.100.180.216:443)

TCP (HTTP SSL):
Connects to accounts.ea.com  (159.153.228.137:443)

TCP (HTTP SSL):
Connects to a23-62-132-223.deploy.static.akamaitechnologies.com  (23.62.132.223:443)

TCP (HTTP SSL):
Connects to a104-75-53-115.deploy.static.akamaitechnologies.com  (104.75.53.115:443)

TCP (HTTP SSL):
Connects to yandex.ru  (5.255.255.77:443)

TCP (HTTP):
Connects to www34.totaalholding.nl  (31.186.174.118:80)

TCP (HTTP):
Connects to web340.default-host.net  (185.68.16.196:80)

Remove produpd.exe - Powered by Reason Core Security