WebSocket4Net.dll

Kimahri Software inc.

This adware uses the Crossrider platform to build and distribute this web browser advertising injection extension. Once installed in the browser it will hijack various browser settings (homepage, search) and may interfere and track behaviors as well as deliver ads. The module WebSocket4Net.dll, “WebSocket4Net for .NET 2.0” by Kimahri Software inc has been detected as adware by 8 anti-malware scanners. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
WebSocket4Net  (signed by Kimahri Software inc.)

Product:
WebSocket4Net

Description:
WebSocket4Net for .NET 2.0

Version:
0.9.0.0

MD5:
7e596dc3834b9501ef00a90b92b820a1

SHA-1:
6088bd3bfd0b70ab45153ef33ad100e90861808b

SHA-256:
3dd27786958129d0cb14399cd5dab96240ea56a4124d698b9807b82d53eb4949

Scanner detections:
8 / 68

Status:
Adware

Analysis date:
4/18/2024 4:46:17 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.14724

G Data
Win32.Application.Plush
14.7.24

IKARUS anti.virus
PUA.Plush
t3scan.1.6.1.0

Reason Heuristics
PUP.KimahriSoftwareinc.N
14.7.24.23

VIPRE Antivirus
Threat.4789396
30086

File size:
62.9 KB (64,360 bytes)

Product version:
0.9.0.0

Copyright:
Copyright © websocket4net.codeplex.com 2012

Original file name:
WebSocket4Net.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\plus-hd-9.5\websocket4net.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/7/2013 5:30:00 AM

Valid to:
3/7/2016 5:29:59 AM

Subject:
CN=Kimahri Software inc., O=Kimahri Software inc., STREET=666 Sherbrooke Rue w, L=Montreal, S=Quebec, PostalCode=H3A 1E7, C=CA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A1BB8569950C0B2080A11A0E2F618B33

File PE Metadata
Compilation timestamp:
5/26/2014 6:43:38 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:ErKEBvRG7IE/kWkMm+kDjHz66x8ljDAMIonIg7To4:ErXBv07cEm+knHz66iljDAMIonIg7TJ

Entry address:
0xFFCE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 48, 00, 00, 00, 58, 00, 01, 00, AC, 03...
 
[+]

Entropy:
5.8769

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
56 KB (57,344 bytes)

Remove WebSocket4Net.dll - Powered by Reason Core Security