huxpkcugrnn.dll

Mathematical Applications

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The module huxpkcugrnn.dll by Mathematical Applications has been detected as adware by 2 anti-malware scanners. This file is typically installed with the program CrimeWatch by Mathematical Applications which is a potentially unwanted software program.
Publisher:
Mathematical Applications  (signed and verified)

Version:
1.0.0.1

MD5:
7c83810ebfb3ba78f62f57544888e4ee

SHA-1:
59f028694d968d99f046b85ec37c66ae679815ae

SHA-256:
50d3fe553999228d20cac0634ba94a39896c309dd048eaedf1b9cad6c8d86f67

Scanner detections:
2 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/19/2024 2:57:51 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Adware.PullUpdate.K.gen (variant)
8.10912

Reason Heuristics
PUP.MathematicalApplications.L
14.12.21.22

File size:
1.4 MB (1,456,968 bytes)

Product version:
1.0.0.1

Copyright:
Copyright (C) 2014

File type:
Dynamic link library (Win64 DLL)

Language:
English (United States)

Common path:
C:\ProgramData\zddiejimvy\dat\huxpkcugrnn.dll

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/26/2014 7:00:00 PM

Valid to:
10/27/2015 6:59:59 PM

Subject:
CN=Mathematical Applications, O=Mathematical Applications, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
79F6406432970C77D2FA7772E5EB6BDC

File PE Metadata
Compilation timestamp:
12/18/2014 6:08:52 PM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:LIywMz8Dt8JlEcW+kErdBBviAYw/2n6Ma7YmKjEfWrlHrEAzTjYcXUmGLl:8FR2EqdjBTY41RJEEfWrFEAzTsGUJ

Entry address:
0x2A18

Entry point:
48, 89, 5C, 24, 08, 48, 89, 74, 24, 10, 57, 48, 83, EC, 20, 49, 8B, F8, 8B, DA, 48, 8B, F1, 83, FA, 01, 75, 05, E8, FF, 2B, 00, 00, 4C, 8B, C7, 8B, D3, 48, 8B, CE, 48, 8B, 5C, 24, 30, 48, 8B, 74, 24, 38, 48, 83, C4, 20, 5F, E9, A7, FE, FF, FF, CC, CC, CC, 48, 89, 4C, 24, 08, 48, 81, EC, 88, 00, 00, 00, 48, 8D, 0D, 55, C6, 00, 00, FF, 15, 87, 76, 00, 00, 48, 8B, 05, 40, C7, 00, 00, 48, 89, 44, 24, 58, 45, 33, C0, 48, 8D, 54, 24, 60, 48, 8B, 4C, 24, 58, E8, FB, 4B, 00, 00, 48, 89, 44, 24, 50, 48, 83, 7C, 24...
 
[+]

Entropy:
7.9649  (probably packed)

Code size:
34 KB (34,816 bytes)

The file huxpkcugrnn.dll has been discovered within the following program.

CrimeWatch  by Mathematical Applications
CrimeWatch (by Injekts Media, dba Mathematical Applications) is an ad-supported program that may deliver third-party advertisements in the form of coupons, price-comparisons, display media, affiliate links, banners, popups/popunders and other links through means including but not limited to the content of any web page accessed, plug-ins, add-ons, or the browser itself.
88% remove it
 
Powered by Should I Remove It?

Remove huxpkcugrnn.dll - Powered by Reason Core Security