{6aa64cb0-6d72-46d1-9577-2fb102a773ef}gw64.sys

Webfuii

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {6aa64cb0-6d72-46d1-9577-2fb102a773ef}gw64.sys by Webfuii has been detected as adware by 12 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{6aa64cb0-6d72-46d1-9577-2fb102a773ef}Gw64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Webfuii)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
133f7e12a1994c068b384e58d11d69d8

SHA-1:
2ebe8d6f16f14381dd19500ae41d6cdb424a9ec5

SHA-256:
62c1c96f821879d5fc709b6b22d8cc24b3e5aed4b51af0c4fe7bf0626f5753df

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/27/2024 1:50:40 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.BPlug
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.04

AVG
Generic
2016.0.3061

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1571

Dr.Web
Trojan.BPlug.123
9.0.1.0182

IKARUS anti.virus
AdWare.SpadeCast
t3scan.1.7.5.0

McAfee
Artemis!133F7E12A199
5600.6717

Reason Heuristics
PUP.Yontoo.Webfuii (M)
15.7.1.18

Sophos
BrowseSmart
4.98

Trend Micro House Call
Suspicious_GEN.F47V0819
7.2.182

VIPRE Antivirus
Trojan.Win32.Generic
32778

Zillya! Antivirus
Adware.Yotoon.Win64.3
2.0.0.1911

File size:
59.7 KB (61,112 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{6aa64cb0-6d72-46d1-9577-2fb102a773ef}gw64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/7/2013 1:00:00 AM

Valid to:
10/8/2014 12:59:59 AM

Subject:
CN=Webfuii, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Webfuii, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
658C92DE4B1AFFD7A1D69F49D0D049BA

File PE Metadata
Compilation timestamp:
1/31/2014 12:45:30 AM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:zot2dxF9O8ZF33iqiIy938bWp9XcfBvJkowidI3q:z9JRicy938ip9ea1j6

Entry address:
0xF064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, 2E, 20, FF, FF, CC, CC, 38, F2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 1C, F6, 00, 00, 60, C1, 00, 00, 28, F1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BE, F9, 00, 00, 50, C0, 00, 00, D8, F0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, FA, 00, 00, 00, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 9A, FA, 00, 00, 00, 00, 00, 00, 86, FA, 00, 00...
 
[+]

Entropy:
5.9631

Code size:
46.5 KB (47,616 bytes)

Driver
Display name:
{6aa64cb0-6d72-46d1-9577-2fb102a773ef}Gw64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI