SuperSocket.ClientEngine.Core.dll

SuperSocket ClientEngine

Stampede Technologies

The module SuperSocket.ClientEngine.Core.dll, “SuperSocket.ClientEngine.Core for .NET 2.0” by Stampede Technologies has been detected as adware by 28 anti-malware scanners. The library is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
SuperSocket  (signed by Stampede Technologies)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Core for .NET 2.0

Version:
0.3.0.0

MD5:
a6161fb260e1a5b0ef00e0db9bceb977

SHA-1:
af32ef4529d679f485837ece117c8af16caa290c

SHA-256:
4662a7052cbfb2f91ce8a0cb2b33d1c4ce4b42eccd4a9224712c28651ec6f768

Scanner detections:
28 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/25/2024 9:11:25 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2015.04.06

Avira AntiVirus
Adware/CrossRider.pl
7.11.215.110

avast!
Win32:Crossrider-AX [PUP]
2014.9-150707

AVG
Stampede
2016.0.3055

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.1577

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Googupdate-11
0.98/21511

Comodo Security
ApplicUnwnt
21663

Dr.Web
Trojan.Crossrider.33330
9.0.1.0188

ESET NOD32
Win32/Toolbar.CrossRider.BE potentially unwanted (variant)
9.11430

F-Prot
W32/S-7b11c6e0
v6.4.7.1.166

G Data
Win32.Application.Agent.DZQMUM
15.7.25

IKARUS anti.virus
PUA.Plush
t3scan.1.7.5.0

K7 AntiVirus
Riskware
13.202.15489

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.1771

McAfee
Artemis!A6161FB260E1
5600.6711

NANO AntiVirus
Trojan.Win32.GoogUpdate.djdgga
0.30.8.659

nProtect
Trojan/W32.Agent.26488.G
15.04.03.01

Panda Antivirus
Trj/Chgt.E
15.07.07.05

Qihoo 360 Security
Win32/Virus.Adware.960
1.0.0.1015

Quick Heal
Trojan.NSIS.r3
7.15.14.00

Reason Heuristics
PUP.StampedeTechnologies (M)
15.7.7.17

Sophos
Generic PUA KP
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
9768

Trend Micro House Call
TROJ_GEN.R047C0EJK14
7.2.188

Trend Micro
TROJ_GEN.R047C0EJK14
10.465.07

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
39102

File size:
25.9 KB (26,488 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Core.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\highdv1\supersocket.clientengine.core.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/28/2014 1:00:00 AM

Valid to:
7/29/2015 12:59:59 AM

Subject:
CN=Stampede Technologies, O=Stampede Technologies, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0CC7970117FD591A57609D71BEE0FCB8

File PE Metadata
Compilation timestamp:
4/11/2014 3:22:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:Bu27nH/DYYxTFBA5Wuj6LV466g8qtBYo1gm1hl8jTK:BdhxTFBAkuugm6ju

Entry address:
0x6A2E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
19 KB (19,456 bytes)

Remove SuperSocket.ClientEngine.Core.dll - Powered by Reason Core Security