{1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys

outobox

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys by outobox has been detected as adware by 27 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{1a147621-8c9a-4d6b-a557-6513a40d3207}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by outobox)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
cb94c146744ab070ee725022196fe1df

SHA-1:
99a4ae49f852d45a9eeafc3fcd5db9c4409642d6

SHA-256:
430a19e4f1f2be045d5fe9b6fdd59012383b3ad377d6456def95880c1328efa1

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 5:44:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.BA
366

Agnitum Outpost
Trojan.BPlug
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.02

avast!
Win32:BrowseFox-FN [PUP]
2014.9-160203

AVG
Adware AdPlugin
2017.0.2844

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1623

Bitdefender
Adware.SwiftBrowse.BA
1.0.20.170

Bkav FE
W64.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/20563

Dr.Web
Trojan.Yontoo.1808
9.0.1.034

Emsisoft Anti-Malware
Adware.SwiftBrowse.BA
8.16.02.03.09

ESET NOD32
Win64/Riskware.NetFilter.F application
10.7.0.302.0

F-Prot
W64/A-a8e2f748
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.BA
11.2016-03-02_4

G Data
Adware.SwiftBrowse.BA
16.2.24

IKARUS anti.virus
AdWare.SpadeCast
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.205.16231

McAfee
Program.Artemis!397A0D5A9625
5600.6500

MicroWorld eScan
Adware.SwiftBrowse.BA
17.0.0.102

Norman
Adware.SwiftBrowse.BA
11.20160203

nProtect
Adware.SwiftBrowse.BA
14.09.01.01

Reason Heuristics
PUP.Yontoo.outobox (M)
16.2.3.21

Sophos
PUA 'OutoBox' (of type Adware)
5.15

SUPERAntiSpyware
Adware.NetFilter/Variant
9345

Trend Micro House Call
Suspicious_GEN.F47V0819
7.2.34

VIPRE Antivirus
Threat.4150696
29708

Zillya! Antivirus
Adware.Yotoon.Win64.3
2.0.0.1908

File size:
59.7 KB (61,112 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/7/2013 8:00:00 AM

Valid to:
10/8/2014 7:59:59 AM

Subject:
CN=outobox, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=outobox, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
603472DEF1C8B65B2E93E06C16768DB7

File PE Metadata
Compilation timestamp:
1/31/2014 8:45:30 AM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:Iot2dxF9O8ZF33iqiIy938bWp9XcfBvJkowidI34I:I9JRicy938ip9ea1jII

Entry address:
0xF064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, 2E, 20, FF, FF, CC, CC, 38, F2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 1C, F6, 00, 00, 60, C1, 00, 00, 28, F1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BE, F9, 00, 00, 50, C0, 00, 00, D8, F0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, FA, 00, 00, 00, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 9A, FA, 00, 00, 00, 00, 00, 00, 86, FA, 00, 00...
 
[+]

Entropy:
5.9640

Code size:
46.5 KB (47,616 bytes)

Driver
Display name:
{1a147621-8c9a-4d6b-a557-6513a40d3207}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI