dapfsjvkp.exe.53d6ccac

Movie Mode

GenTechnologies Apps, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The file dapfsjvkp.exe.53d6ccac, “MovieMode Service” by GenTechnologies Apps has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
GenTechnologies Apps, LLC  (signed and verified)

Product:
Movie Mode

Description:
MovieMode Service

Version:
1.0.0.0

MD5:
db576ee5c364337e294ba6f2b6871942

SHA-1:
1c8907b2d58569cacc7605532dc258bb4f77726c

SHA-256:
48ae02e222b4a80e28ed3a3255f980d6b2e67270d4aaaf85e6ca61b41c5a3e76

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
12/25/2024 1:08:46 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
16.11.20.18

File size:
2.2 MB (2,319,216 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © GenTechnologies Apps, LLC 2014

Original file name:
MovieModeService.exe

Language:
Language Neutral

Common path:
C:\ProgramData\mietaxtpfrq\dapfsjvkp.exe.53d6ccac

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/1/2014 9:00:00 PM

Valid to:
5/2/2015 8:59:59 PM

Subject:
CN="GenTechnologies Apps, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="GenTechnologies Apps, LLC", L=Grandville, S=Michigan, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
169927F400601EBFFB8BCB8CA159DB85

File PE Metadata
Compilation timestamp:
7/24/2014 1:17:05 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:xylnlcCpB52BMJ+yX38TzhMGUNHr9pdByu3xhasl9wfutNyl69dK:sIszH32GGmHxByMaatcsdK

Entry address:
0x235EFE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.2 MB (2,310,144 bytes)

Remove dapfsjvkp.exe.53d6ccac - Powered by Reason Core Security