SuperSocket.ClientEngine.Common.dll

SuperSocket ClientEngine

Stampede Technologies

The module SuperSocket.ClientEngine.Common.dll, “SuperSocket.ClientEngine.Common for .Net 2.0” by Stampede Technologies has been detected as adware by 29 anti-malware scanners. The library is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
SuperSocket  (signed by Stampede Technologies)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Common for .Net 2.0

Version:
0.3.0.0

MD5:
c31837f1b658682ce3508de3dff1d2a7

SHA-1:
6af38f102bd08c36e62fb9cf14f6251428a208e4

SHA-256:
872f9d0cde067bd6d9f4addfab51ef17033f95248d52c43420a13fdb41e5212a

Scanner detections:
29 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/18/2024 1:09:30 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.GoogUpdate
7.1.1

AhnLab V3 Security
Win-PUP/CrossRider
2015.04.06

Avira AntiVirus
Adware/CrossRider.pl
7.11.171.244

avast!
Win32:Crossrider-AX [PUP]
2014.9-150707

AVG
Stampede
2016.0.3055

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.1577

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Googupdate-15
0.98/21511

Comodo Security
Application.Win32.CrossRider.AY
21663

Dr.Web
Trojan.Crossrider.28247
9.0.1.0188

ESET NOD32
Win32/Toolbar.CrossRider.BE potentially unwanted (variant)
9.11430

F-Prot
W32/S-7b11c6e0
v6.4.7.1.166

G Data
Win32.Adware.Crossrider.AC
15.7.25

IKARUS anti.virus
PUA.Plush
t3scan.1.7.8.0

K7 AntiVirus
Riskware
13.202.15489

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.1771

McAfee
Artemis!C31837F1B658
5600.6711

NANO AntiVirus
Trojan.Win32.GoogUpdate.deefsh
0.30.8.659

nProtect
Trojan/W32.Agent.23416.B
15.04.03.01

Panda Antivirus
Trj/Chgt.E
15.07.07.05

Qihoo 360 Security
Win32/Virus.Adware.960
1.0.0.1015

Quick Heal
Trojan.NSIS.r3
7.15.14.00

Reason Heuristics
PUP.StampedeTechnologies (M)
15.7.7.17

Sophos
Generic PUA GK
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
9768

Trend Micro House Call
TROJ_GEN.R047C0EJK14
7.2.188

Trend Micro
TROJ_GEN.R047C0EJK14
10.465.07

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
39102

File size:
22.9 KB (23,416 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Common.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\highdv1\supersocket.clientengine.common.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/28/2014 1:00:00 AM

Valid to:
7/29/2015 12:59:59 AM

Subject:
CN=Stampede Technologies, O=Stampede Technologies, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0CC7970117FD591A57609D71BEE0FCB8

File PE Metadata
Compilation timestamp:
4/11/2014 3:22:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:s64b8rYkcUTMdzJzga3Vmt1xf3Qa/qOle+1aRu7/2hjwO61hl8jDfs:68iUTMdzJkEMnlQa/q+YR5jwO66jDfs

Entry address:
0x5FBE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
16 KB (16,384 bytes)

Remove SuperSocket.ClientEngine.Common.dll - Powered by Reason Core Security