SuperSocket.ClientEngine.Common.dll

SuperSocket ClientEngine

Evangelion Group

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The module SuperSocket.ClientEngine.Common.dll, “SuperSocket.ClientEngine.Common for .Net 2.0” by Evangelion Group has been detected as adware by 18 anti-malware scanners. The library is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
SuperSocket  (signed by Evangelion Group)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Common for .Net 2.0

Version:
0.3.0.0

MD5:
3099aa3553d0355471f6775a5e6a774a

SHA-1:
adcdb51ca2c726fe55930a629a7f283be144716e

SHA-256:
6ee2d0a39a0b8eb543be3dc7dd257d4a8ab1b882bd455b5996655782535a5adf

Scanner detections:
18 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/24/2024 3:07:39 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Crossrider-M [PUP]
2014.9-141126

AVG
Generic
2015.0.3278

Baidu Antivirus
Adware.Win32.GoogUpdate
4.0.3.141126

Clam AntiVirus
Win.Trojan.Googupdate-15
0.98/19490

Dr.Web
Trojan.Crossrider.28247
9.0.1.0330

ESET NOD32
Win32/Toolbar.CrossRider.BM (variant)
8.10657

IKARUS anti.virus
PUA.Plush
t3scan.1.7.5.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.2887

McAfee
Artemis!572A6020128E
5600.6934

NANO AntiVirus
Trojan.Win32.GoogUpdate.deefsh
0.28.2.61861

nProtect
Trojan/W32.Agent.23408.K
14.08.22.01

Panda Antivirus
Trj/Chgt.B
14.11.26.02

Qihoo 360 Security
Win32/Trojan.921
1.0.0.1015

Reason Heuristics
PUP.EvangelionGroup.DD
14.11.26.14

Rising Antivirus
PE:Trojan.Win32.Generic.171FD102!387961090
23.00.65.141124

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
10214

Trend Micro House Call
Suspicious_GEN.F47V0820
7.2.330

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
22.9 KB (23,408 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Common.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\cinema-plus-1.2c\supersocket.clientengine.common.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/27/2014 6:00:00 PM

Valid to:
7/28/2015 5:59:59 PM

Subject:
CN=Evangelion Group, O=Evangelion Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0095E2A1168FF10F1D56CF5FFE4ABC7450

File PE Metadata
Compilation timestamp:
4/11/2014 8:22:22 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:U64b8rYkcUTMdzJzga3Vmt1xf3Qa/qOle+1aRu7/2hjwOiabAl82J:S8iUTMdzJkEMnlQa/q+YR5jwOiab72J

Entry address:
0x5FBE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.8737

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
16 KB (16,384 bytes)

Remove SuperSocket.ClientEngine.Common.dll - Powered by Reason Core Security