vcsrwzsev.exe

Movie Mode

GenTechnologies Apps, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application vcsrwzsev.exe by GenTechnologies Apps has been detected as adware by 6 anti-malware scanners. According to AVG, this software downloads additional adware offers during setup.
Publisher:
GenTechnologies Apps, LLC  (signed and verified)

Product:
Movie Mode

Description:
MovieMode

Version:
1.0.0.0

MD5:
2dc75ca1bb8e33c915aed4f3881ca9a2

SHA-1:
bab988da7e0e38d7b3b63586faa0bcf073eb3901

SHA-256:
7b1210668e278f108b1496adf208c40594b09cc809a7c3451bcb82f3461780f6

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/18/2024 9:30:44 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Potentially harmful program Downloader.BSH
2014.0.4037

Baidu Antivirus
Adware.MSIL.PullUpdate
4.0.3.14103

ESET NOD32
probably MSIL/Adware.PullUpdate.E application
7.0.302.0

Malwarebytes
Adware.MovieMode
v2014.10.03.09

Reason Heuristics
PUP.GenTechnologiesApps.J
14.10.3.21

VIPRE Antivirus
Threat.4784449
33624

File size:
48.9 KB (50,032 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © GenTechnologies Apps, LLC 2014

Original file name:
MovieMode.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\application data\appdata\application data\appdata\application data\appdata\application data\appdata\application data\appdata\application data\upmbzq\dat\vcsrwzsev.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/1/2014 9:00:00 PM

Valid to:
5/2/2015 8:59:59 PM

Subject:
CN="GenTechnologies Apps, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="GenTechnologies Apps, LLC", L=Grandville, S=Michigan, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
169927F400601EBFFB8BCB8CA159DB85

File PE Metadata
Compilation timestamp:
10/1/2014 10:28:30 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:9C8fC+l0OQarAaiMgA9jAqq/Toz7Cvtr7ULUDC2bzoAi6wEJMtDt:suWZa0aiMgAdkS7Wtr7RC2MEOL

Entry address:
0xBF4E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
40 KB (40,960 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-50-112-218-190.us-west-2.compute.amazonaws.com  (50.112.218.190:80)

TCP (HTTP):
Connects to a201-016-134-145.deploy.akamaitechnologies.com  (201.16.134.145:80)

TCP (HTTP):
Connects to ec2-52-10-180-179.us-west-2.compute.amazonaws.com  (52.10.180.179:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-51-229-163.deploy.static.akamaitechnologies.com  (23.51.229.163:80)

TCP (HTTP):
Connects to a201-016-134-136.deploy.akamaitechnologies.com  (201.16.134.136:80)

TCP (HTTP):

TCP (HTTP):

Remove vcsrwzsev.exe - Powered by Reason Core Security