{440fcf74-387d-4c6b-83f7-b92c9cfbf61b}gw64.sys

Reverse Page

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {440fcf74-387d-4c6b-83f7-b92c9cfbf61b}gw64.sys by Reverse Page has been detected as adware by 25 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{440fcf74-387d-4c6b-83f7-b92c9cfbf61b}Gw64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Reverse Page)

Product:
StdLib

Version:
1.4.4.6 built by: WinDDK

MD5:
59cc7c61be24d1ee0f1670219e50372a

SHA-1:
c7cd80bcfe9286a766cb28ca9861058c32fca1d5

SHA-256:
75f605c5cf4e40807ac4c615665af1b63e6e403b82e1cdc32019e016032e3887

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 4:42:16 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CH
521

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Win-PUP/BrowseFox.Gen
2015.03.11

avast!
Win32:BrowseFox-GP [PUP]
2014.9-150901

AVG
Generic
2016.0.2999

Bitdefender
Adware.SwiftBrowse.CH
1.0.20.1220

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/21511

Dr.Web
Tool.NetFilter.313
9.0.1.0244

Emsisoft Anti-Malware
Adware.SwiftBrowse.CH
8.15.09.01.03

ESET NOD32
Win64/NetFilter.A potentially unsafe (variant)
9.11300

Fortinet FortiGate
Adware/NetFilter
9/1/2015

F-Prot
W64/A-59c9c70a
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CH
11.2015-01-09_3

G Data
Adware.SwiftBrowse.CH
15.9.25

K7 AntiVirus
Adware
13.200.15223

McAfee
Artemis!59CC7C61BE24
5600.6655

MicroWorld eScan
Adware.SwiftBrowse.CH
16.0.0.732

NANO AntiVirus
Riskware.Win64.NetFilter.dowpsv
0.30.0.296

nProtect
Adware.SwiftBrowse.CH
15.03.10.01

Reason Heuristics
PUP.Yontoo.ReversePage (M)
15.9.1.15

Trend Micro House Call
TROJ_GEN.R08NC0OC715
7.2.244

Trend Micro
TROJ_GEN.R08NC0OC715
10.465.01

VIPRE Antivirus
Trojan.Win32.Generic
38310

Zillya! Antivirus
Adware.Yotoon.Win64.14
2.0.0.2093

File size:
47.6 KB (48,792 bytes)

Product version:
1.4.4.6

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{440fcf74-387d-4c6b-83f7-b92c9cfbf61b}gw64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Subject:
CN=Reverse Page, O=Reverse Page, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
49B8C5928FD288CB8DBC7B5824AC1BF6

File PE Metadata
OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:lC7G2EjsnyXeOUEGG0LA8tWFZuL470h6aqxcCT2kvsVRwlZD3AeOD:MFID6EGnLA8AFJTNEVmDnc

Entry address:
0xC064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, E2, 50, FF, FF, CC, CC, 78, C2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 54, C6, 00, 00, A0, 91, 00, 00, 28, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DA, CA, 00, 00, 50, 90, 00, 00, D8, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D2, CB, 00, 00, 00, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, CB, 00, 00, 00, 00, 00, 00, A2, CB, 00, 00...
 
[+]

Entropy:
6.3931

Code size:
34.5 KB (35,328 bytes)

Driver
Display name:
{440fcf74-387d-4c6b-83f7-b92c9cfbf61b}Gw64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI