{2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t.sys

DiVapton

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t.sys by DiVapton has been detected as adware by 20 anti-malware scanners. It runs as a Windows kernel mode device driver named “{2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by DiVapton)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
ccddcc861f26ecdfc3aabca2ce52c168

SHA-1:
7c89b8f0da5593b589c8fefa5b323949109d2e35

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 8:56:09 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.A.28
8.3.1.6

avast!
MSIL:BrowseFox-J [PUP]
2014.9-160214

AVG
Divapton
2017.0.2833

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16214

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Netfilter-130
0.98/20570

Comodo Security
TrojWare.Win32.AltBrowse.IZZV
22471

Dr.Web
Trojan.Yontoo.1734
9.0.1.045

ESET NOD32
Win32/Komodia.A potentially unsafe application
10.7.0.302.0

F-Prot
W32/A-b3b70cb0
v6.4.7.1.166

Malwarebytes
PUP.Optional.DiVapton.A
v2016.02.14.06

NANO AntiVirus
Riskware.Win32.NetFilter.dgqvkd
0.30.24.2086

Norman
Adware.NetFilter.J
11.20160214

Panda Antivirus
Generic Suspicious
16.02.14.06

Qihoo 360 Security
HEUR/QVM00.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo.DiVapton (M)
16.2.14.18

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
41188

Zillya! Antivirus
Adware.Yotoon.Win64.10
2.0.0.2082

File size:
54.5 KB (55,816 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/27/2014 7:00:00 AM

Valid to:
9/20/2015 6:59:59 AM

Subject:
CN=DiVapton, O=DiVapton, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
366277DEAF2752A755B6F775090768C5

File PE Metadata
Compilation timestamp:
1/12/2015 3:33:47 PM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:ho6LohZZMITF7zKLV3fXoKKxaFtFkW4VIWPLqvH9EQZLN+p60CehY7:ho6+pT1UvYDEHFV4nPe/kpvCei

Entry address:
0xA9BE

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, 2A, E4, FF, FF, CC, CC, 34, AA, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, AE, 00, 00, 94, 93, 00, 00, 20, AA, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 3A, AE, 00, 00, 80, 93, 00, 00, 2C, AA, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 56, AE, 00, 00, 8C, 93, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 26, AE, 00, 00, 12, AE, 00, 00, 00, 00, 00, 00, 42, AE, 00, 00, 00, 00, 00, 00, 2C, AB, 00, 00, 44, AB, 00, 00, 56, AB...
 
[+]

Entropy:
6.3453

Code size:
37 KB (37,888 bytes)

Driver
Display name:
{2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove {2e36eac3-11d1-40ea-ac16-6ffa2b3865e6}t.sys - Powered by Reason Core Security