gujighqepotdebugerbinosy.exe

Yupeng Zhang

The application gujighqepotdebugerbinosy.exe by Yupeng Zhang has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time. While running, it connects to the Internet address server-54-192-159-62.sin3.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yupeng Zhang  (signed and verified)

MD5:
42f083ff47cb41f06399310e5a4e1d0b

SHA-1:
57fbfedab50fd897c675bd533d6feddafdb002f3

SHA-256:
a76f62628e240d56469020e7b32f56aad21e802c0ab056afa5b9778b7793033a

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
5/6/2025 7:15:56 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Zhang.YupengZh.Meta (M)
16.7.11.8

File size:
330.7 KB (338,656 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\pherdpy\gujighqepotdebugerbinosy.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
7/6/2016 7:00:00 AM

Valid to:
2/4/2017 6:59:59 AM

Subject:
CN=Yupeng Zhang, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
586AB8EF886672D7E61688910492107C

File PE Metadata
Compilation timestamp:
7/11/2016 2:48:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:43Z9xJ8+ZZvlvd2inYzRZGDtc4x6gKA6Vw4Cadu:WZ9vpZXvR0RmTQi54Cadu

Entry address:
0x1F4A6

Entry point:
E8, E2, 55, 00, 00, E9, 7F, FE, FF, FF, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, A8, 01, 45, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 70, E4, 44, 00, 01, 0F, 82, 02, 5B, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74, 06, F3...
 
[+]

Code size:
244.5 KB (250,368 bytes)

Scheduled Task
Task name:
Gujighqepot Debuger

Trigger:
Daily (Runs daily at 16:42)

Description:
Upload the info when Gujighqepot crash, make the next version more stable.


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-216-15.mrs50.r.cloudfront.net  (54.230.216.15:80)

TCP (HTTP):
Connects to server-54-230-216-10.mrs50.r.cloudfront.net  (54.230.216.10:80)

TCP (HTTP):
Connects to server-54-230-216-250.mrs50.r.cloudfront.net  (54.230.216.250:80)

TCP (HTTP):
Connects to server-54-192-159-62.sin3.r.cloudfront.net  (54.192.159.62:80)

TCP (HTTP):
Connects to server-52-85-83-206.lax1.r.cloudfront.net  (52.85.83.206:80)

TCP (HTTP):
Connects to server-52-85-77-51.lax3.r.cloudfront.net  (52.85.77.51:80)

TCP (HTTP):
Connects to server-54-230-216-190.mrs50.r.cloudfront.net  (54.230.216.190:80)

TCP (HTTP):
Connects to server-54-230-216-13.mrs50.r.cloudfront.net  (54.230.216.13:80)

TCP (HTTP):
Connects to server-54-230-149-76.sin2.r.cloudfront.net  (54.230.149.76:80)

TCP (HTTP):
Connects to server-54-230-149-226.sin2.r.cloudfront.net  (54.230.149.226:80)

TCP (HTTP):
Connects to server-54-230-149-147.sin2.r.cloudfront.net  (54.230.149.147:80)

TCP (HTTP):
Connects to server-54-192-159-46.sin3.r.cloudfront.net  (54.192.159.46:80)

TCP (HTTP):
Connects to server-54-192-159-36.sin3.r.cloudfront.net  (54.192.159.36:80)

Remove gujighqepotdebugerbinosy.exe - Powered by Reason Core Security