SuperSocket.ClientEngine.Core.dll

SuperSocket ClientEngine

Hike Zone Plus

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The module SuperSocket.ClientEngine.Core.dll, “SuperSocket.ClientEngine.Core for .NET 2.0” by Hike Zone Plus has been detected as adware by 7 anti-malware scanners. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
SuperSocket  (signed by Hike Zone Plus)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Core for .NET 2.0

Version:
0.3.0.0

MD5:
29ae985ce7628d6c94f2e27d4ce736a3

SHA-1:
5ba3db2ec6b45edc84136102b75103bf260dd194

SHA-256:
a750941826815f7353f343f498b5de93115915ff800bfc534046e43f0ff91a3d

Scanner detections:
7 / 68

Status:
Adware

Analysis date:
4/23/2024 6:09:10 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3272

Clam AntiVirus
Win.Trojan.Googupdate-11
0.98/19431

IKARUS anti.virus
PUA.Plush
t3scan.1.7.8.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.2854

nProtect
Trojan-Clicker/W32.Agent.26520
14.09.18.01

Reason Heuristics
PUP.HikeZonePlus.BB
14.9.20.20

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
25.9 KB (26,520 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Core.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\totalplus01-3.1v17.09\supersocket.clientengine.core.dll

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/19/2014 3:00:00 AM

Valid to:
8/20/2015 2:59:59 AM

Subject:
CN=Hike Zone Plus, O=Hike Zone Plus, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7DF4D8EF200BAB292519E3CF5597AD86

File PE Metadata
Compilation timestamp:
4/11/2014 5:22:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:iu27nH/DYYxTFBA5Wuj6LV466g8qtBYo1gBul83W:idhxTFBAkuugv3W

Entry address:
0x6A2E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7651

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
19 KB (19,456 bytes)

Remove SuperSocket.ClientEngine.Core.dll - Powered by Reason Core Security