ywkzukumw.exe

Zombie Invasion

Time Lapse Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application ywkzukumw.exe by Time Lapse Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Time Lapse Solutions  (signed and verified)

Product:
Zombie Invasion

Description:
ZombieInvasion

Version:
1.0.0.0

MD5:
58c6dfa8660256bd7628037d8aa58b3d

SHA-1:
9760beccc9f1845cbc2cf37349e3214f2f824f27

SHA-256:
a4aceae920e036ed1d63037ea37cd917cd2e7bb0bea465ce30d96ed175342c7d

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
12/25/2024 12:25:58 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.1.20.4

File size:
48.8 KB (49,968 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Time Lapse Solutions 2015

Original file name:
ZombieInvasion.exe

File type:
Executable application (Win64 EXE)

Common path:
C:\ProgramData\vfwgpcitar\dat\ywkzukumw.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/25/2014 1:00:00 AM

Valid to:
3/26/2015 12:59:59 AM

Subject:
CN=Time Lapse Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Time Lapse Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4E2D648A5233B2106CC4A2A6BE9F33FA

File PE Metadata
Compilation timestamp:
1/16/2015 12:53:04 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xBF6E

Entry point:
48, A1, 00, 20, 00, 40, 00, 00, 00, 00, FF, E0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Code size:
40 KB (40,960 bytes)

Remove ywkzukumw.exe - Powered by Reason Core Security