Updater.exe

Volaro Updater

VOLARO Ltd.

The application Updater.exe by VOLARO has been detected as adware by 4 anti-malware scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Volaro Update’. This file is typically installed with the program Volaro Updater by Volaro Technologies & Applications which is a potentially unwanted software program. While running, it connects to the Internet address static.213-239-220-70.clients.your-server.de on port 80 using the HTTP protocol.
Publisher:
Volaro  (signed by VOLARO Ltd.)

Product:
Volaro Updater

Description:
Volaro

Version:
1.0.0.0

MD5:
3fe83108cddd427c6965a743654d0b9b

SHA-1:
27a4396b401b5051f3c5ee46f17947f23be060e5

SHA-256:
939d3180d80aef7f720523feb3841ad3c16bf6610edc2dcdd8c66674f19a069f

Scanner detections:
4 / 68

Status:
Adware

Analysis date:
4/27/2024 12:12:54 AM UTC  (today)

Scan engine
Detection
Engine version

Malwarebytes
PUP.Optional.Volaro.A
v2015.04.09.03

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Reason Heuristics
PUP.Startup.VOLARO.H
14.8.7.21

VIPRE Antivirus
Vonteera
23616

File size:
274.8 KB (281,368 bytes)

Product version:
1.0.0.0

Copyright:
(c) Volaro All rights reserved.

Original file name:
Updater.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\volaro\updater\updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/15/2013 2:00:00 AM

Valid to:
2/28/2014 1:59:59 AM

Subject:
CN=VOLARO Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=VOLARO Ltd., L=Sofia, S=Bulgaria, C=BG

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45902E82A000D2497C38FE709EF124BC

File PE Metadata
Compilation timestamp:
6/7/2013 6:21:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:gvla1qDbBzsU8UQHeVaRLgEgmEOmPYnYkls9Btsf:GkU8fHeVaRsEgmEhPYn1cBtsf

Entry address:
0x16408

Entry point:
E8, 74, 36, 00, 00, E9, 79, FE, FF, FF, 3B, 0D, B4, 4C, 43, 00, 75, 02, F3, C3, E9, F6, 36, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 57, 33, FF, 3B, F7, 75, 04, 33, C0, EB, 65, 39, 7D, 08, 75, 1B, E8, D6, 17, 00, 00, 6A, 16, 5E, 89, 30, 57, 57, 57, 57, 57, E8, 6E, 3C, 00, 00, 83, C4, 14, 8B, C6, EB, 45, 39, 7D, 10, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, B5, 37, 00, 00, 83, C4, 0C, EB, C1, FF, 75, 0C, 57, FF, 75, 08, E8, 14, 18, 00, 00, 83, C4, 0C, 39, 7D, 10, 74, B6, 39, 75, 0C, 73...
 
[+]

Entropy:
6.0648

Code size:
154 KB (157,696 bytes)

Scheduled Task
Task name:
Volaro Update

Trigger:
Daily (Runs daily at 15:06)


Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Volaro Update

Command:
C:\Program Files\volaro\updater\updater.exe


The file Updater.exe has been discovered within the following program.

Volaro Updater  by Volaro Technologies & Applications
Privacy Policy - "Volaro Technologies may display various types of advertising to you throughout the Volaro Technologies and may provide you with certain added value services to enhance your Web browsing experience(i.e. a comparison shopping feature).
www.volarotech.com
79% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to static.213-239-220-70.clients.your-server.de  (213.239.220.70:80)

Remove Updater.exe - Powered by Reason Core Security