SuperSocket.ClientEngine.Protocol.dll

SuperSocket ClientEngine

Gogo Network Club

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The module SuperSocket.ClientEngine.Protocol.dll, “SuperSocket.ClientEngine.Protocol for .NET 2.0” by Gogo Network Club has been detected as adware by 8 anti-malware scanners. This file is typically installed with the program Browser+ Apps+ by Gogo Network Club which is a potentially unwanted software program. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
SuperSocket  (signed by Gogo Network Club)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Protocol for .NET 2.0

Version:
0.3.0.0

MD5:
6cf88588b2889686f641ff5bd67648f4

SHA-1:
c35826506560e95c09c283a24c6d0b2d7b8fbdef

SHA-256:
a4e1aab222184f60c4820d506849b32477270330ba0442d4d08fe424f923460e

Scanner detections:
8 / 68

Status:
Adware

Analysis date:
4/27/2024 2:16:45 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3316

Clam AntiVirus
Win.Trojan.Googupdate-13
0.98/21411

IKARUS anti.virus
PUA.Plush
t3scan.1.7.5.0

McAfee
Artemis!6CF88588B288
5600.6972

Reason Heuristics
PUP.GogoNetworkClub.FF
14.10.19.16

SUPERAntiSpyware
Trojan.Agent/Gen-Artemis
10290

Trend Micro House Call
Suspicious_GEN.F47V0923
7.2.292

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
19.4 KB (19,872 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Protocol.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\browser+ apps+\supersocket.clientengine.protocol.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/18/2014 7:00:00 PM

Valid to:
8/19/2015 6:59:59 PM

Subject:
CN=Gogo Network Club, O=Gogo Network Club, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
75BF783471861CAD78DE03A20768BF56

File PE Metadata
Compilation timestamp:
4/11/2014 9:22:22 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:N0K1XmogLQQkmW8GdaO6cWmgLq0VxAYl8TA:hXm/n6dkmgLq08Ts

Entry address:
0x51CE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 48, 00, 00, 00, 58, 60, 00, 00, 44, 04...
 
[+]

Entropy:
5.9623

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
12.5 KB (12,800 bytes)

The file SuperSocket.ClientEngine.Protocol.dll has been discovered within the following program.

Browser+ Apps+  by Gogo Network Club
browser+ apps+ is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
84% remove it
 
Powered by Should I Remove It?

Remove SuperSocket.ClientEngine.Protocol.dll - Powered by Reason Core Security