{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w.sys

Adanak

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w.sys by Adanak has been detected as adware by 6 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Adanak)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
59b01a32621fc781b8ecab5e5f6a31dc

SHA-1:
674103f9de108fa1db53f2abd915a498def42c58

SHA-256:
b7bf17fcafa6ad1ce38313cb6a9d23527aecaea6d29b03d38e4cce707b89921d

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 5:35:03 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.BPlug
7.1.1

AVG
Generic
2015.0.3367

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14829

Dr.Web
Trojan.BPlug.123
9.0.1.0241

Reason Heuristics
PUP.Adanak.k
14.8.29.18

VIPRE Antivirus
Yontoo
32406

File size:
51.2 KB (52,408 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{2f0ff925-183b-4210-98f5-cb2ffd917f2b}w.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/22/2014 3:00:00 AM

Valid to:
4/23/2015 2:59:59 AM

Subject:
CN=Adanak, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Adanak, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
54EAA4FDDD0AEB1183ED278A995C36F7

File PE Metadata
Compilation timestamp:
8/7/2014 2:52:14 AM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:GIsHpnKnCBSqUPJHKQpkJvRpvqIT2bcWiJmOt13g2rp3lnK5ag:xsHRKnLJqQpkIITsiTt1xtqag

Entry address:
0xC03E

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, 62, 50, FF, FF, CC, CC, 74, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BC, C4, 00, 00, C0, A0, 00, 00, B4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 12, C5, 00, 00, 00, A0, 00, 00, EC, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, AE, C8, 00, 00, 38, A0, 00, 00, C4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, A6, C9, 00, 00, 10, A0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, EA, C4, 00, 00, FE, C4, 00, 00, D6, C4...
 
[+]

Code size:
37 KB (37,888 bytes)

Remove {2f0ff925-183b-4210-98f5-cb2ffd917f2b}w.sys - Powered by Reason Core Security