Threat Database Adware Browser Touch

Browser Touch

By GoldSparrow in Adware

Threat Scorecard

Popularity Rank: 5,700
Threat Level: 80 % (High)
Infected Computers: 122,903
First Seen: December 28, 2015
Last Seen: December 24, 2025
OS(es) Affected: Windows

Computer users that got affected by the Browser Touch adware will be presented with numerous advertisements that may appear on the Web pages they want to visit. The reason for these advertisements is that the developers of adware can make a good profit when computer users click on these advertisements or by increasing the traffic to sponsored websites. The advertisements displayed by Browser Touch may attract computer users because the adware may keep their activities under observation and collect data that will allow its sponsors to exhibit relevant content. Browser Touch may affect various Web browsers including Opera, Mozilla Firefox, Google Chrome and Internet Explorer. Browser Touch advertisements may present themselves as banners, coupons and deals. Due to the large amount of advertisements, the computer's performance may be affected, and your machine may become slow and irresponsive. Security researchers recommend the immediate removal of Browser Touch to avoid further problems and stop the unwanted advertisements displayed by it.

Analysis Report

General information

Family Name: Trojan.ClipBanker.J
Signature status: Root Not Trusted

Known Samples

MD5: 7ed167e3ec373aec3ce7f0f4c8ecd1f2
SHA1: 1f1e6c0473400e2835db2349f1d9d7efa74c9378
SHA256: B7CCD809E51B9A23E7ECD54C3E6A35267CD94F6E24F5DCB0721E38FF03CE1EA3
File Size: 5.04 MB, 5038256 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name 3DP
File Description 3DP Chip
File Version 25.1.1.0
Internal Name 3DP_Chip.exe
Legal Copyright 3DP. All rights reserved.
Original Filename 3DP_Chip.exe
Product Name 3DP Chip
Product Version 25.1.1.0

Digital Signatures

Signer Root Status
3DP Sectigo Public Code Signing Root R46 Root Not Trusted

File Traits

  • 2+ executable sections
  • HighEntropy
  • x86

Block Information

Total Blocks: 3
Potentially Malicious Blocks: 0
Whitelisted Blocks: 1
Unknown Blocks: 2

Visual Map

? 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...