plugincontainer.exe

Razor Web

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application plugincontainer.exe by Razor Web has been detected as adware by 19 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Service Mgr RazorWeb”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Razor Web  (signed and verified)

Version:
1.0.5626.12029

MD5:
1a6f70411625b1c8bace5a51361d1598

SHA-1:
78c495d4aacff94ac07d66d66d2ab978dd9b7673

SHA-256:
5e9796aa18928681eb84baa409971fa164af0f415b07e59a4945fb9d28a9b761

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 8:50:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.CX
5575765

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.05.29

Avira AntiVirus
ADWARE/BrowseFox.Gen
8.3.1.6

AVG
Adware AdPlugin.DOG
2014.0.4311

Bitdefender
Adware.BrowseFox.CX
1.0.20.740

Clam AntiVirus
Win.Adware.Browsefox-906
0.98/20518

Dr.Web
Trojan.Yontoo.1854
9.0.1.05190

Emsisoft Anti-Malware
Adware.BrowseFox.CX
10.0.0.5366

ESET NOD32
Win32/BrowseFox.AU potentially unwanted application
7.0.302.0

F-Prot
W32/S-de2f153c
v6.4.7.1.166

F-Secure
Adware.BrowseFox.CX
5.14.151

G Data
Adware.BrowseFox.CX
15.5.25

Malwarebytes
PUP.Optional.RazorWeb.A
v2015.05.28.06

McAfee
BrowseFox.h
5600.6751

MicroWorld eScan
Adware.BrowseFox.CX
16.0.0.444

NANO AntiVirus
Trojan.Win32.Yontoo.drcfxd
0.30.24.1636

nProtect
Adware.BrowseFox.CX
15.05.28.01

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.28.18

Zillya! Antivirus
Backdoor.PePatch.Win32.71343
2.0.0.2193

File size:
543.3 KB (556,296 bytes)

Product version:
1.0.5626.12029

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\4776dc07-f30f-4d0b-87a6-e2d583c890d4\plugincontainer.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/25/2015 4:00:00 AM

Valid to:
3/25/2016 3:59:59 AM

Subject:
CN=Razor Web, O=Razor Web, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1607E89C1B423660BDDDD63E03C260E2

File PE Metadata
Compilation timestamp:
5/28/2015 6:41:06 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:YbEaNRedy8prQ3GhAGDix9udz0ZONSkkYoSQoAW:QpKd5RQW2GDqcdAZ0oSQoAW

Entry address:
0x30372

Entry point:
E8, CE, F4, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, 3C, F5, 30, E5, 47, 00, 00, 75, 13, 56, E8, 71, 00, 00, 00, 59, 85, C0, 75, 08, 6A, 11, E8, 08, 4C, 00, 00, 59, FF, 34, F5, 30, E5, 47, 00, FF, 15, 84, 31, 46, 00, 5E, 5D, C3, 56, 57, BE, 30, E5, 47, 00, 8B, FE, 53, 8B, 1F, 85, DB, 74, 17, 83, 7F, 04, 01, 74, 11, 53, FF, 15, 78, 31, 46, 00, 53, E8, CC, A0, FF, FF, 83, 27, 00, 59, 83, C7, 08, 81, FF, 50, E6, 47, 00, 7C, D8, 5B, 83, 3E, 00, 74, 0E, 83, 7E, 04, 01, 75, 08, FF, 36, FF, 15...
 
[+]

Code size:
391 KB (400,384 bytes)

Service
Display name:
Service Mgr RazorWeb

Type:
Win32OwnProcess

Depends on:
RPCSS


Remove plugincontainer.exe - Powered by Reason Core Security