lkmtofjyb.exe

Best Video Converter

Fantastic Tech

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application lkmtofjyb.exe, “BestVideoConverter Service” by Fantastic Tech has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “lkmTofjYB”.
Publisher:
Fantastic Tech  (signed and verified)

Product:
Best Video Converter

Description:
BestVideoConverter Service

Version:
1.0.0.0

MD5:
ac9d37937db3082aaef4bf90a161fded

SHA-1:
5e960f613e8320ab0744e444399b82eea9370c6f

SHA-256:
f2a74915c0fca36dc569d1c8305a239ea5c2fceaa3466b40d2a1736bcfe8e1da

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/1/2024 3:36:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.1.22.1

File size:
2.9 MB (2,999,240 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Fantastic Tech 2015

Original file name:
BestVideoConverterService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\pgvcorjpsal\lkmtofjyb.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
4/29/2015 7:00:00 PM

Valid to:
4/29/2016 6:59:59 PM

Subject:
CN=Fantastic Tech, O=Fantastic Tech, L=St. Michael, S=St. Michael, C=BB

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
1C671B855532F80010EB70036D50FC34

File PE Metadata
Compilation timestamp:
10/29/2015 12:40:43 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x2DBEEE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9996

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.9 MB (2,990,080 bytes)

Service
Display name:
lkmTofjYB

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


Remove lkmtofjyb.exe - Powered by Reason Core Security