{786e0460-9b1c-4665-ac61-0d36341cac47}w64.sys

PowerfulBrowse

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {786e0460-9b1c-4665-ac61-0d36341cac47}w64.sys by PowerfulBrowse has been detected as adware by 26 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{786e0460-9b1c-4665-ac61-0d36341cac47}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by PowerfulBrowse)

Product:
StdLib

Version:
1.4.4.6 built by: WinDDK

MD5:
4006e0939e43c63c32f6e6242d22cb3d

SHA-1:
473a5b94bd4664cf090a4d3609381266258f9729

SHA-256:
07d1bcafe3b112d34b26f31fa15da4c0258aa26cf0ed0ace260fc4e28db939cf

Scanner detections:
26 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/23/2024 9:28:09 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CH
405

Agnitum Outpost
Riskware.Agent
7.1.1

avast!
MSIL:BrowseFox-AS [PUP]
2014.9-151227

AVG
AdPlugin
2016.0.2883

Bitdefender
Adware.SwiftBrowse.CH
1.0.20.1805

Bkav FE
W64.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/21511

Dr.Web
Trojan.Yontoo.1734
9.0.1.0361

Emsisoft Anti-Malware
Adware.SwiftBrowse.CH
8.15.12.27.09

ESET NOD32
Win64/BrowseFox.CG potentially unwanted application
9.7.0.302.0

F-Prot
W64/A-59c9c70a
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CH
11.2015-27-12_1

G Data
Adware.SwiftBrowse.CH
15.12.25

K7 AntiVirus
Adware
13.204.16073

McAfee
Artemis!D83B308EF6F9
5600.6539

MicroWorld eScan
Adware.SwiftBrowse.CH
16.0.0.1083

NANO AntiVirus
Trojan.Win64.Yontoo.dquzrz
0.30.24.1636

Norman
Adware.SwiftBrowse.CH
11.20151227

nProtect
Adware.SwiftBrowse.CH
15.05.29.01

Reason Heuristics
PUP.Yontoo.PowerfulBrowse (M)
15.12.27.9

Rising Antivirus
PE:Trojan.Win32.Generic.187657AE!410408878
23.00.65.151225

SUPERAntiSpyware
Adware.BrowseFox/Variant
9422

Trend Micro House Call
TROJ_GEN.R08NC0OE315
7.2.361

Trend Micro
TROJ_GEN.R08NC0OE315
10.465.27

VIPRE Antivirus
Trojan.Win32.Generic
40658

Zillya! Antivirus
Adware.Yotoon.Win64.14
2.0.0.2195

File size:
47.7 KB (48,840 bytes)

Product version:
1.4.4.6

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{786e0460-9b1c-4665-ac61-0d36341cac47}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/28/2014 7:00:00 PM

Valid to:
3/29/2015 6:59:59 PM

Subject:
CN=PowerfulBrowse, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=PowerfulBrowse, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0D18FDCF326B0F33033260BCD44C1918

File PE Metadata
Compilation timestamp:
12/5/2014 6:35:13 PM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:lc7G2EjsnyXeOUEGG0LA8tWFZuL470h6aqxcCT2kvsVRwlZD3vb:aFID6EGnLA8AFJTNEVmDD

Entry address:
0xC064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, E2, 50, FF, FF, CC, CC, 78, C2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 54, C6, 00, 00, A0, 91, 00, 00, 28, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DA, CA, 00, 00, 50, 90, 00, 00, D8, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D2, CB, 00, 00, 00, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, CB, 00, 00, 00, 00, 00, 00, A2, CB, 00, 00...
 
[+]

Entropy:
6.3932

Code size:
34.5 KB (35,328 bytes)

Driver
Display name:
{786e0460-9b1c-4665-ac61-0d36341cac47}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI