SuperSocket.ClientEngine.Core.dll

SuperSocket ClientEngine

Kimahri Software inc.

This adware uses the Crossrider platform to build and distribute this web browser advertising injection extension. Once installed in the browser it will hijack various browser settings (homepage, search) and may interfere and track behaviors as well as deliver ads. The module SuperSocket.ClientEngine.Core.dll, “SuperSocket.ClientEngine.Core for .NET 2.0” by Kimahri Software inc has been detected as adware by 22 anti-malware scanners. The library is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
SuperSocket  (signed by Kimahri Software inc.)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Core for .NET 2.0

Version:
0.3.0.0

MD5:
7a663f406b1eb0616f0bf37e327c7ac2

SHA-1:
972b2bac7e9ef1d6135eb4d17b5417116bb712ee

SHA-256:
f78b48ccc6c1abd04813808b31a3754d012118b0598eb9cbde67baed7aa15d28

Scanner detections:
22 / 68

Status:
Adware

Analysis date:
4/24/2024 8:18:13 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2015.01.04

Avira AntiVirus
Adware/CrossRider.pl
7.11.170.84

avast!
Win32:Crossrider-F [PUP]
2014.9-151004

AVG
Stampede
2016.0.2967

Baidu Antivirus
Adware.Win32.GoogUpdate
4.0.3.15104

Clam AntiVirus
Win.Trojan.Googupdate-11
0.98/21411

F-Prot
W32/S-6d94a1a8
v6.4.7.1.166

G Data
Win32.Application.Plush
15.10.24

IKARUS anti.virus
PUA.Plush
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.185.14098

Kaspersky
not-a-virus:WebToolbar.Win32.CroRi
14.0.0.1330

McAfee
Artemis!491050899B14
5600.6623

NANO AntiVirus
Trojan.Win32.GoogUpdate.djdgga
0.28.6.63474

nProtect
Trojan/W32.Agent.26472.D
14.10.31.01

Panda Antivirus
Trj/Chgt.B
15.10.04.12

Qihoo 360 Security
Win32/Virus.Adware.960
1.0.0.1015

Reason Heuristics
PUP.Brightcicrle.Brightcircle (M)
15.10.4.0

Sophos
Generic PUA GM
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
9591

Trend Micro House Call
Suspicious_GEN.F47V0816
7.2.277

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
32730

File size:
25.9 KB (26,472 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Core.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\clip-high_d_06\supersocket.clientengine.core.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/6/2013 4:00:00 PM

Valid to:
3/6/2016 3:59:59 PM

Subject:
CN=Kimahri Software inc., O=Kimahri Software inc., STREET=666 Sherbrooke Rue w, L=Montreal, S=Quebec, PostalCode=H3A 1E7, C=CA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A1BB8569950C0B2080A11A0E2F618B33

File PE Metadata
Compilation timestamp:
4/11/2014 7:22:22 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:3u27nH/DYYxTFBA5Wuj6LV466g8qtBYo1g0SL6l8se:3dhxTFBAkuugHse

Entry address:
0x6A2E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7628

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
19 KB (19,456 bytes)

Remove SuperSocket.ClientEngine.Core.dll - Powered by Reason Core Security