ngklnpy.exe

Zombie Invasion

Time Lapse Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application ngklnpy.exe, “ZombieInvasion Service” by Time Lapse Solutions has been detected as adware by 13 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “nGkLNpY”. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Time Lapse Solutions  (signed and verified)

Product:
Zombie Invasion

Description:
ZombieInvasion Service

Version:
1.0.0.0

MD5:
f0a673b7b54b490f0d825c4637e9af17

SHA-1:
99c90882eb01889b527b09f47a84c4c78a21e6db

SHA-256:
0157e35d65599d86695d110f68570f128c61fdfc98758d5b430e4fca08c70f72

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/26/2024 8:15:04 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.192.162

AVG
Downloader
2015.0.3256

Baidu Antivirus
Adware.MSIL.PullUpdate
4.0.3.141219

Comodo Security
ApplicUnwnt
20282

ESET NOD32
MSIL/Adware.PullUpdate.G.gen (variant)
8.10827

Fortinet FortiGate
Adware/PullUpdate
12/19/2014

Malwarebytes
PUP.Optional.ZombieInvasion.A
v2014.12.19.04

McAfee
Artemis!F0A673B7B54B
5600.6912

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Service.TimeLapseSolutions.H
14.12.19.3

Sophos
Generic PUA JJ
4.98

Trend Micro House Call
Suspicious_GEN.F47V1127
7.2.353

VIPRE Antivirus
MSIL.Adware.PullUpdate
35422

File size:
2.6 MB (2,726,776 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Time Lapse Solutions 2014

Original file name:
ZombieInvasionService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\rurndaegfcx\ngklnpy.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/24/2014 8:00:00 PM

Valid to:
3/25/2015 7:59:59 PM

Subject:
CN=Time Lapse Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Time Lapse Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4E2D648A5233B2106CC4A2A6BE9F33FA

File PE Metadata
Compilation timestamp:
10/24/2014 3:39:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:H+SvI7lkbqd6fcKfFNdtsVy9J0/ardMS8:bvI7mbqMfJDfKO0/ap0

Entry address:
0x2995BE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9996

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,717,184 bytes)

Service
Display name:
nGkLNpY

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


Remove ngklnpy.exe - Powered by Reason Core Security