dfarxbtrz.exe

Movie Master

Green Fire Software

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application dfarxbtrz.exe by Green Fire Software has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Green Fire Software  (signed and verified)

Product:
Movie Master

Description:
MovieMaster

Version:
1.0.0.0

MD5:
7ade89dd9aae6ba54b082d75a4fe568d

SHA-1:
dd296400463e733782f8fecee3c0f8c5d11ae665

SHA-256:
62eb8a94f1417f17b99dd399d2237464c1c7989101712dfe7e9b4254c06a7f33

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/26/2024 4:51:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
16.11.23.10

File size:
48.9 KB (50,032 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Green Fire Software 2014

Original file name:
MovieMaster.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\xnvqysaziuc\dat\dfarxbtrz.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
9/20/2013 2:00:00 AM

Valid to:
9/21/2014 1:59:59 AM

Subject:
CN=Green Fire Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Green Fire Software, L=La Jolla, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
38E34FCC0FDD5E91FD5048A198AAABF1

File PE Metadata
Compilation timestamp:
6/13/2014 1:55:05 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:KeOADBNL4Rx5vDdy2dvcnuFBe9xxFLzVoZDSTro:VDfL2tNdUnfxrGe

Entry address:
0xBF8E

Entry point:
48, A1, 00, 20, 00, 40, 00, 00, 00, 00, FF, E0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Code size:
40 KB (40,960 bytes)

Remove dfarxbtrz.exe - Powered by Reason Core Security