updater.exe

Razor Web

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application updater.exe by Razor Web has been detected as adware by 19 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Mgr RazorWeb”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Razor Web  (signed and verified)

Version:
1.0.5626.10224

MD5:
5200c251269d1c19bd3ca03d9c20bbdb

SHA-1:
1982cc5ba92191d3d48d0ff8a401d57f9bbf8b1c

SHA-256:
a9b31979c5e2509947313a3eb2bf4af53a0355d1e8baf1f496b0575774a2b01a

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 4:59:08 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.DB
5575765

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.05.29

Avira AntiVirus
ADWARE/BrowseFox.Gen
8.3.1.6

Bitdefender
Adware.BrowseFox.DB
1.0.20.740

Clam AntiVirus
Win.Adware.Jatif
0.98/20518

Dr.Web
Trojan.Yontoo.1857
9.0.1.05190

Emsisoft Anti-Malware
Adware.BrowseFox.DB
10.0.0.5366

ESET NOD32
Win32/BrowseFox.AU potentially unwanted application
7.0.302.0

F-Prot
W32/S-f8beccbe
v6.4.7.1.166

F-Secure
Adware.BrowseFox.DB
5.14.151

G Data
Adware.BrowseFox.DB
15.5.25

Malwarebytes
PUP.Optional.RazorWeb.A
v2015.05.28.06

McAfee
BrowseFox.h
5600.6751

MicroWorld eScan
Adware.BrowseFox.DB
16.0.0.444

NANO AntiVirus
Trojan.Win32.Yontoo.drblfj
0.30.24.1636

nProtect
Adware.BrowseFox.DB
15.05.28.01

Panda Antivirus
Trj/Genetic.gen
15.05.28.06

Reason Heuristics
Threat.Win.Reputation.IMP
15.5.28.18

Zillya! Antivirus
Backdoor.PePatch.Win32.71155
2.0.0.2193

File size:
467.8 KB (478,984 bytes)

Product version:
1.0.5626.10224

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\common files\4776dc07-f30f-4d0b-87a6-e2d583c890d4\updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/25/2015 4:00:00 AM

Valid to:
3/25/2016 3:59:59 AM

Subject:
CN=Razor Web, O=Razor Web, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1607E89C1B423660BDDDD63E03C260E2

File PE Metadata
Compilation timestamp:
5/28/2015 5:40:57 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:VA4lrw75S41rf8AeZkl9jEjEuAdhZ0Av8d5xpcRjfJf:eOw1Sm8kzAj2vZoORh

Entry address:
0x245E2

Entry point:
E8, BE, E7, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, 3C, F5, 30, D5, 46, 00, 00, 75, 13, 56, E8, 71, 00, 00, 00, 59, 85, C0, 75, 08, 6A, 11, E8, B8, 47, 00, 00, 59, FF, 34, F5, 30, D5, 46, 00, FF, 15, 48, 41, 45, 00, 5E, 5D, C3, 56, 57, BE, 30, D5, 46, 00, 8B, FE, 53, 8B, 1F, 85, DB, 74, 17, 83, 7F, 04, 01, 74, 11, 53, FF, 15, 80, 41, 45, 00, 53, E8, B0, A6, FF, FF, 83, 27, 00, 59, 83, C7, 08, 81, FF, 50, D6, 46, 00, 7C, D8, 5B, 83, 3E, 00, 74, 0E, 83, 7E, 04, 01, 75, 08, FF, 36, FF, 15...
 
[+]

Code size:
330.5 KB (338,432 bytes)

Service
Display name:
Update Mgr RazorWeb

Type:
Win32OwnProcess

Depends on:
RPCSS


Remove updater.exe - Powered by Reason Core Security