updater.bak

Gem Grab

The file updater.bak by Gem Grab has been detected as a potentially unwanted program by 11 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Gem Grab  (signed and verified)

Version:
1.0.5693.20700

MD5:
9dd53c95049c21a97176a8215a8a83ad

SHA-1:
57968e089eb37c2f445f4615eb409b83048c0b6d

SHA-256:
1b6a4a36df9e74077bbe4dea8cb4955fb9dc65f858ac1bb026dedb372a465031

Scanner detections:
11 / 68

Status:
Potentially unwanted

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/23/2024 3:10:16 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.08.04

Avira AntiVirus
ADWARE/BrowseFox.Gen
8.3.1.6

AVG
BrowseFox
2016.0.3028

ESET NOD32
Win32/BrowseFox.AU potentially unwanted application
9.7.0.302.0

herdProtect (fuzzy)
2015.9.9.21

K7 AntiVirus
Unwanted-Program
13.207.16770

Malwarebytes
PUP.Optional.GemGrab.A
v2015.08.04.11

NANO AntiVirus
Riskware.Win32.MultiPlug.durcnf
0.30.24.2668

Panda Antivirus
Trj/Genetic.gen
15.08.04.11

Sophos
Browse Fox (PUA)
4.98

VIPRE Antivirus
Threat.4150696
41424

File size:
1 MB (1,072,856 bytes)

Product version:
1.0.5693.20700

Language:
English (United States)

Common path:
C:\Program Files\common files\6c7e10dc-163e-46cd-8258-1d75946fb47a\updater.bak

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/9/2015 1:00:00 AM

Valid to:
7/9/2016 12:59:59 AM

Subject:
CN=Gem Grab, O=Gem Grab, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
095FE5E97BD1FCE40B45EDA86B46ECD9

File PE Metadata
Compilation timestamp:
8/3/2015 7:30:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:ATbTW3d9zteATfz6SNINjcGHr6Zb6AAONZ24fDeu:su3d9zzQALPZ/

Entry address:
0x5342D

Entry point:
E8, 80, 61, 01, 00, E9, 39, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, 3C, F5, 30, 85, 4F, 00, 00, 75, 13, 56, E8, 91, 00, 00, 00, 59, 85, C0, 75, 08, 6A, 11, E8, DC, 8A, 00, 00, 59, FF, 34, F5, 30, 85, 4F, 00, FF, 15, 54, D1, 4A, 00, 5E, 5D, C3, E8, 62, 5A, 00, 00, 85, C0, 75, 0B, FF, 74, 24, 04, 50, FF, 15, 08, D3, 4A, 00, 68, FF, 00, 00, 00, E8, 8A, 89, 00, 00, 59, C3, 56, 57, BE, 30, 85, 4F, 00, 8B, FE, 53, 8B, 1F, 85, DB, 74, 17, 83, 7F, 04, 01, 74, 11, 53, FF, 15, 8C, D1, 4A, 00, 53, E8, 2F, 7C, FF...
 
[+]

Entropy:
6.5679

Code size:
685.5 KB (701,952 bytes)

Remove updater.bak - Powered by Reason Core Security