webconnect.browseradapter.exe

Super Web LLC

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application webconnect.browseradapter.exe by Super Web has been detected as adware by 22 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Remove webconnect.browseradapter.exe - Powered by Reason Core Security
Publisher:
Super Web LLC  (signed and verified)

MD5:
fd9244b695c09f96ebb5cb3ff627ab99

SHA-1:
5f7d8b317e1485e94082d2144043b5845d338779

SHA-256:
c4366c40a69d1af01eb3396034f38bb21a4e0d9f81a4bc70991aaf776758547e

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
12/9/2016 2:43:11 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.1
970

Agnitum Outpost
Riskware.Agent
7.1.1

Antiy Labs AVL
Trojan/Win32.SGeneric
1.0.0.1

AVG
Generic_r
2015.0.3448

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14610

Bitdefender
Gen:Variant.Adware.SwiftBrowse.1
1.0.20.805

Dr.Web
Trojan.BPlug.48
9.0.1.0161

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
8.14.06.10.09

ESET NOD32
Win32/BrowseFox (variant)
8.9921

Fortinet FortiGate
Riskware/BrowseFox
6/10/2014

F-Secure
Gen:Variant.Adware.SwiftBrowse.1
11.2014-10-06_3

G Data
Gen:Variant.Adware.SwiftBrowse
14.6.24

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.6.1.0

Jiangmin
Adware/Agent.knt
KV140610

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud)
331020.49267

McAfee
Artemis!FD9244B695C0
5600.7104

McAfee Web Gateway
Artemis!FD9244B695C0
7.7104

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.1
15.0.0.483

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Reason Heuristics
PUP.SuperWeb.Y
14.8.7.20

Trend Micro House Call
TROJ_GEN.F47V0607
7.2.161

VIPRE Antivirus
Yontoo
30148

Remove webconnect.browseradapter.exe - Powered by Reason Core Security
File size:
94.3 KB (96,552 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\webconnect\bin\webconnect.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/3/2014 8:00:00 AM

Valid to:
1/4/2015 7:59:59 AM

Subject:
CN=Super Web LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Super Web LLC, L=Los Angeles, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
27033EAA9AFF39A69AA31E701AC9D731

File PE Metadata
Compilation timestamp:
6/7/2014 8:02:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:W2wSnW7yNee8DtbDB2zndKfAIklDnkBzX4TD8X:WIW7yUeql2BhdqzX4TDu

Entry address:
0x30E5

Entry point:
E8, 85, 20, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, 70, 40, 41, 00, 75, 02, F3, C3, E9, 0C, 21, 00, 00, 8B, FF, 55, 8B, EC, 5D, E9, 07, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 3E, 22, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, C5, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, 78, 53, 41, 00, 01, BF, 6C, 53, 41, 00, BE, 10, 02, 41, 00, 75, 2C, 83, 0D, 78, 53, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 18, 02, 41, 00, E8, 2C, 00, 00, 00, 68, 5E, FC, 40, 00, 89, 35, 6C...
 
[+]

Entropy:
6.3775

Code size:
59.5 KB (60,928 bytes)

Remove webconnect.browseradapter.exe - Powered by Reason Core Security