{1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys

outobox

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys by outobox has been detected as adware by 27 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{1a147621-8c9a-4d6b-a557-6513a40d3207}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by outobox)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
628f05b9b9ecdb8cb41d38b668b87ad2

SHA-1:
f21ddddfc8b3869edf8b0488eff6574b08f4761c

SHA-256:
6377947fc7d45717d7e80798716604bc2445976d125825e946aa9e1f1890c942

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 6:30:55 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.BA
365

Agnitum Outpost
Trojan.BPlug
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.02

avast!
Win32:BrowseFox-FN [PUP]
2014.9-160204

AVG
Adware AdPlugin
2017.0.2843

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1624

Bitdefender
Adware.SwiftBrowse.BA
1.0.20.175

Bkav FE
W64.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/20563

Dr.Web
Trojan.Yontoo.1808
9.0.1.035

Emsisoft Anti-Malware
Adware.SwiftBrowse.BA
8.16.02.04.10

ESET NOD32
Win64/Riskware.NetFilter.F application
10.7.0.302.0

F-Prot
W64/A-a8e2f748
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.BA
11.2016-04-02_5

G Data
Adware.SwiftBrowse.BA
16.2.24

IKARUS anti.virus
AdWare.SpadeCast
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.205.16231

McAfee
Program.Artemis!397A0D5A9625
5600.6499

MicroWorld eScan
Adware.SwiftBrowse.BA
17.0.0.105

Norman
Adware.SwiftBrowse.BA
11.20160204

nProtect
Adware.SwiftBrowse.BA
14.09.01.01

Reason Heuristics
PUP.Yontoo.outobox (M)
16.2.4.22

Sophos
PUA 'OutoBox' (of type Adware)
5.15

SUPERAntiSpyware
Adware.NetFilter/Variant
9343

Trend Micro House Call
Suspicious_GEN.F47V0819
7.2.35

VIPRE Antivirus
Threat.4150696
29708

Zillya! Antivirus
Adware.Yotoon.Win64.3
2.0.0.1908

File size:
59.7 KB (61,112 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{1a147621-8c9a-4d6b-a557-6513a40d3207}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/6/2013 5:00:00 PM

Valid to:
10/7/2014 4:59:59 PM

Subject:
CN=outobox, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=outobox, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
603472DEF1C8B65B2E93E06C16768DB7

File PE Metadata
Compilation timestamp:
1/30/2014 4:45:30 PM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:oot2dxF9O8ZF33iqiIy938bWp9XcfBvJkowidI343:o9JRicy938ip9ea1jI3

Entry address:
0xF064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, 2E, 20, FF, FF, CC, CC, 38, F2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 1C, F6, 00, 00, 60, C1, 00, 00, 28, F1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BE, F9, 00, 00, 50, C0, 00, 00, D8, F0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, FA, 00, 00, 00, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 9A, FA, 00, 00, 00, 00, 00, 00, 86, FA, 00, 00...
 
[+]

Entropy:
5.9640

Code size:
46.5 KB (47,616 bytes)

Driver
Display name:
{1a147621-8c9a-4d6b-a557-6513a40d3207}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI