sjaqmdif.exe

Movie Mode

GenTechnologies Apps, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application sjaqmdif.exe, “MovieMode Service” by GenTechnologies Apps has been detected as adware by 2 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “sJAqmdiF”.
Publisher:
GenTechnologies Apps, LLC  (signed and verified)

Product:
Movie Mode

Description:
MovieMode Service

Version:
1.0.0.0

MD5:
f2177651071db7e4bcdad4f85dfd44f6

SHA-1:
ff1a2544fc4d74bf44ee1efe83de985c79f15927

SHA-256:
8611bf53422f0e6e3a4b9bb1696086b790b7771e6418c848733cf8aa2cf990db

Scanner detections:
2 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/27/2024 4:19:02 AM UTC  (today)

Scan engine
Detection
Engine version

Malwarebytes
Adware.MovieMode
v2014.07.02.09

Reason Heuristics
PUP.Service.GenTechnologiesApps.I
14.8.15.15

File size:
2.2 MB (2,315,632 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © GenTechnologies Apps, LLC 2014

Original file name:
MovieModeService.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\fqrgxosdt\sjaqmdif.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/2/2014 2:00:00 AM

Valid to:
5/3/2015 1:59:59 AM

Subject:
CN="GenTechnologies Apps, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="GenTechnologies Apps, LLC", L=Grandville, S=Michigan, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
169927F400601EBFFB8BCB8CA159DB85

File PE Metadata
Compilation timestamp:
6/16/2014 8:38:53 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:ZXdVsNp2nHKL/dEvf11e1BVWa7WDedbB4+k2wTV:TcGKTe31ywAnLdwp

Entry address:
0x2350FE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.2 MB (2,306,560 bytes)

Service
Display name:
sJAqmdiF

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-54-213-104-242.us-west-2.compute.amazonaws.com  (54.213.104.242:80)

Remove sjaqmdif.exe - Powered by Reason Core Security