myopbctigf.exe

Video Converter

Surf Island Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application myopbctigf.exe, “VideoConverter Service” by Surf Island Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “myopbcTigF”.
Publisher:
Surf Island Solutions LLC  (signed by Surf Island Solutions)

Product:
Video Converter

Description:
VideoConverter Service

Version:
1.0.0.0

MD5:
971d3ddb1ccd5c9b49118ca9321ceaa1

SHA-1:
5694548e0971b74aa7ce5f422b1dc3e1dbb50fcd

SHA-256:
60800b7496fcce746fbd1fac2ea4d94fea4b72fb36d1188c30791b2fda00b6b1

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/24/2024 7:24:16 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.1.22.22

File size:
2.6 MB (2,734,464 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Surf Island Solutions LLC 2015

Original file name:
VideoConverterService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\fchmmierogm\myopbctigf.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/2/2014 4:00:00 PM

Valid to:
3/3/2015 3:59:59 PM

Subject:
CN=Surf Island Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Surf Island Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6FB79DDB9BE296B956A7181848AE7E71

File PE Metadata
Compilation timestamp:
1/8/2015 11:11:51 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x29B3DE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 68, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9996

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,724,864 bytes)

Service
Display name:
myopbcTigF

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


Remove myopbctigf.exe - Powered by Reason Core Security