gpyqhkbe.exe

Zombie News

Time Lapse Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application gpyqhkbe.exe, “ZombieNews Service” by Time Lapse Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “gpyqhKBE”.
Publisher:
Time Lapse Solutions  (signed and verified)

Product:
Zombie News

Description:
ZombieNews Service

Version:
1.0.0.0

MD5:
92fd18173048780a0c62a6f33cf49935

SHA-1:
be8e51285812d38e21c92b267909f2c8006b6d93

SHA-256:
dcc93e2ddb2fdd12bba9c4d46f56536d24ed66b2248b465164fc6dce897a7b07

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
1/12/2025 4:31:45 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
16.11.20.22

File size:
2.6 MB (2,726,256 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Time Lapse Solutions 2014

Original file name:
ZombieNewsService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\fjyjwm\gpyqhkbe.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/25/2014 12:00:00 AM

Valid to:
3/25/2015 11:59:59 PM

Subject:
CN=Time Lapse Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Time Lapse Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4E2D648A5233B2106CC4A2A6BE9F33FA

File PE Metadata
Compilation timestamp:
11/24/2014 2:15:18 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:wc5rcJ4qHISz3b3TKQxNntkjbnlFhprC2b3qc3T4Pjs7pFrtZgyTrcuxVpqg:VoJ7HISGKh0Hvmf7kF5CyTrc4Vpq

Entry address:
0x2995AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9996

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,717,184 bytes)

Service
Display name:
gpyqhKBE

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


Remove gpyqhkbe.exe - Powered by Reason Core Security