SuperSocket.ClientEngine.Core.dll

SuperSocket ClientEngine

Stampede Technologies

The module SuperSocket.ClientEngine.Core.dll, “SuperSocket.ClientEngine.Core for .NET 2.0” by Stampede Technologies has been detected as adware by 26 anti-malware scanners. The library is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
SuperSocket  (signed by Stampede Technologies)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Core for .NET 2.0

Version:
0.3.0.0

MD5:
4f63b307aad40477bd293fff7c12b5dc

SHA-1:
e1f37e28391c4e67dcddf159270210924e6f53c6

SHA-256:
2105b863099026150b5130f2dd7ea4827939afccb878d416920315473a2b466a

Scanner detections:
26 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/27/2024 3:22:31 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2015.02.27

Avira AntiVirus
Adware/CrossRider.pl
7.11.168.242

avast!
Win32:Crossrider-AX [PUP]
150525-2

AVG
Potentially harmful program Crossrider.IIN
2014.0.4311

Baidu Antivirus
Adware.Win32.GoogUpdate
4.0.3.15527

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Googupdate-11
0.98/20507

Comodo Security
Application.Win32.CrossRider.AY
22250

Dr.Web
Trojan.Crossrider1.29642
9.0.1.05190

ESET NOD32
Win32/Toolbar.CrossRider.BE potentially unwanted application
7.0.302.0

F-Prot
W32/S-7b11c6e0
v6.4.7.1.166

IKARUS anti.virus
PUA.Plush
t3scan.1.7.5.0

K7 AntiVirus
Riskware
13.1915096

Kaspersky
Trojan.NSIS.GoogUpdate
15.0.0.543

McAfee
Artemis!7065AB985F4A
5600.6752

NANO AntiVirus
Trojan.Win32.GoogUpdate.djdgga
0.30.0.296

nProtect
Trojan/W32.Agent.26488.G
14.10.02.01

Panda Antivirus
Trj/Chgt.B
15.05.27.12

Qihoo 360 Security
Win32/Trojan.a2d
1.0.0.1015

Quick Heal
Trojan.NSIS.r3
5.15.14.00

Reason Heuristics
PUP.StampedeTechnologies
15.5.27.8

Sophos
Generic PUA GM
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
9850

Trend Micro House Call
Suspicious_GEN.F47V0816
7.2.147

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
32476

File size:
25.9 KB (26,488 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Core.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\total-1.8\supersocket.clientengine.core.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/28/2014 4:00:00 AM

Valid to:
7/29/2015 3:59:59 AM

Subject:
CN=Stampede Technologies, O=Stampede Technologies, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0CC7970117FD591A57609D71BEE0FCB8

File PE Metadata
Compilation timestamp:
4/11/2014 6:22:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:Hu27nH/DYYxTFBA5Wuj6LV466g8qtBYo1gm1hl8j7B:HdhxTFBAkuugm6j7B

Entry address:
0x6A2E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
19 KB (19,456 bytes)

Remove SuperSocket.ClientEngine.Core.dll - Powered by Reason Core Security