{01531192-f7ef-415f-a549-cfdb11836731}t.sys

Surftastic

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {01531192-f7ef-415f-a549-cfdb11836731}t.sys by Surftastic has been detected as adware by 19 anti-malware scanners. It runs as a Windows kernel mode device driver named “{01531192-f7ef-415f-a549-cfdb11836731}t”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Surftastic)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
30ecb36a99ef95bcafcfe2ce85356818

SHA-1:
558f2a4a12d87ca9cdc1fb547be7e86a7dde15fd

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 11:31:07 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.BPlug
7.1.1

avast!
Win32:BrowseFox-DA [PUP]
2014.9-160214

AVG
Surfastic
2017.0.2833

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16214

Clam AntiVirus
Win.Adware.Agent-12778
0.98/19855

Comodo Security
TrojWare.Win32.AltBrowse.IZZV
20035

Dr.Web
Trojan.BPlug.309
9.0.1.045

ESET NOD32
Win64/BrowseFox.AE potentially unwanted application
10.7.0.302.0

F-Prot
W32/A-c972e623
v6.4.7.1.166

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.6.1.0

McAfee
Artemis!9AEE992A8722
5600.6489

NANO AntiVirus
Trojan.Win32.BPlug.dcxxfx
0.28.2.61148

nProtect
Trojan-Clicker/W32.Yotoon.54688
14.12.30.01

Qihoo 360 Security
Win32/Virus.Adware.720
1.0.0.1015

Reason Heuristics
PUP.Yontoo.Surftastic (M)
16.2.14.20

Trend Micro House Call
Suspicious_GEN.F47V0728
7.2.45

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
31910

Zillya! Antivirus
Adware.Yotoon.Win64.10
2.0.0.1958

File size:
53.5 KB (54,816 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{01531192-f7ef-415f-a549-cfdb11836731}t.sys

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
5/6/2014 7:00:00 PM

Valid to:
5/7/2015 6:59:59 PM

Subject:
CN=Surftastic, O=Surftastic, STREET=10620 Treena Street Suite 230, L=San Diego, S=Ca, PostalCode=92131, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1E51B1BC1DA0D725290BE84DCF88D4EB

File PE Metadata
Compilation timestamp:
1/30/2014 7:46:38 PM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:VhbP7EDNtMTw/RWDjR/McKV5qEXGBJgxgZ+4AOmvtnBU6+RRx+D7Q:vP7EJSTukuzTrGYs+JNBUtRODc

Entry address:
0xA73E

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, CA, E3, FF, FF, CC, CC, B4, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 84, AB, 00, 00, 94, 90, 00, 00, A0, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BA, AB, 00, 00, 80, 90, 00, 00, AC, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D6, AB, 00, 00, 8C, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, A6, AB, 00, 00, 92, AB, 00, 00, 00, 00, 00, 00, C2, AB, 00, 00, 00, 00, 00, 00, AC, A8, 00, 00, C4, A8, 00, 00, D6, A8...
 
[+]

Code size:
36.3 KB (37,120 bytes)

Driver
Display name:
{01531192-f7ef-415f-a549-cfdb11836731}t

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove {01531192-f7ef-415f-a549-cfdb11836731}t.sys - Powered by Reason Core Security