SuperSocket.ClientEngine.Protocol.dll

SuperSocket ClientEngine

Stampede Technologies

The module SuperSocket.ClientEngine.Protocol.dll, “SuperSocket.ClientEngine.Protocol for .NET 2.0” by Stampede Technologies has been detected as adware by 28 anti-malware scanners. The library is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
SuperSocket  (signed by Stampede Technologies)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Protocol for .NET 2.0

Version:
0.3.0.0

MD5:
351fa652a1eb0c17231badf2a2dd17c1

SHA-1:
4018e5db423edbc08e148bfe38cab1e1131611a9

SHA-256:
1131c72b3e63645d4a06daba95021da08118d69fb9621ba5c11e04bfa5deb2ca

Scanner detections:
28 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/25/2024 12:56:06 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2015.04.06

Avira AntiVirus
Adware/CrossRider.pl
7.11.215.110

avast!
Win32:Crossrider-AX [PUP]
2014.9-150707

AVG
Stampede
2016.0.3055

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.1577

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Googupdate-13
0.98/21511

Comodo Security
Application.Win32.CrossRider.AY
21663

Dr.Web
Trojan.Crossrider.33330
9.0.1.0188

ESET NOD32
Win32/Toolbar.CrossRider.BE potentially unwanted (variant)
9.11430

F-Prot
W32/S-7b11c6e0
v6.4.7.1.166

G Data
Win32.Application.Agent.4UO8QK
15.7.25

IKARUS anti.virus
not-a-virus:AdWare.Adwapper
t3scan.1.8.9.0

K7 AntiVirus
Riskware
13.202.15489

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.1771

McAfee
Artemis!351FA652A1EB
5600.6711

NANO AntiVirus
Trojan.Win32.GoogUpdate.dkjwbo
0.30.8.659

nProtect
Trojan/W32.Agent.19832.E
15.04.03.01

Panda Antivirus
Trj/Chgt.E
15.07.07.05

Qihoo 360 Security
Win32/Trojan.a2d
1.0.0.1015

Quick Heal
Trojan.NSIS.r3
7.15.14.00

Reason Heuristics
PUP.StampedeTechnologies (M)
15.7.7.17

Sophos
Generic PUA EA
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Artemis
9768

Trend Micro House Call
TROJ_GEN.R047C0EJF14
7.2.188

Trend Micro
TROJ_GEN.R047C0EJF14
10.465.07

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
38268

File size:
19.4 KB (19,832 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Protocol.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\highdv1\supersocket.clientengine.protocol.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/28/2014 1:00:00 AM

Valid to:
7/29/2015 12:59:59 AM

Subject:
CN=Stampede Technologies, O=Stampede Technologies, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0CC7970117FD591A57609D71BEE0FCB8

File PE Metadata
Compilation timestamp:
4/11/2014 3:22:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:c0K1XmogLQQkmW8GdaO6cWmgLq0F1hl8j7:IXm/n6dkmgLq0F6j7

Entry address:
0x51CE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 48, 00, 00, 00, 58, 60, 00, 00, 44, 04...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
12.5 KB (12,800 bytes)

Remove SuperSocket.ClientEngine.Protocol.dll - Powered by Reason Core Security