{ab7fd32d-0f7b-4b8f-842d-7df94246698f}w64.sys

diamondata

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {ab7fd32d-0f7b-4b8f-842d-7df94246698f}w64.sys by diamondata has been detected as adware by 25 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{ab7fd32d-0f7b-4b8f-842d-7df94246698f}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by diamondata)

Product:
StdLib

Version:
1.4.4.6 built by: WinDDK

MD5:
c82c10999a7188e6632539fd54645127

SHA-1:
b5510a0aad87cc2551372c2929dccabf71982e43

SHA-256:
93c01339876e1dd2127c3c9b63cb9f052cddefff4e3788372ab19c2eaf18055e

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 3:04:54 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CH
356

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.23

avast!
Win32:BrowseFox-GR [PUP]
2014.9-160214

AVG
AdPlugin
2017.0.2834

Bitdefender
Adware.SwiftBrowse.CH
1.0.20.225

Bkav FE
W64.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/21511

Dr.Web
Trojan.Yontoo.1734
9.0.1.045

Emsisoft Anti-Malware
Adware.SwiftBrowse.CH
8.16.02.14.05

ESET NOD32
Win64/BrowseFox.CF potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Adware/BrowseFox
2/14/2016

F-Prot
W64/A-59c9c70a
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CH
11.2016-14-02_1

G Data
Adware.SwiftBrowse.CH
16.2.25

K7 AntiVirus
Adware
13.203.15842

McAfee
Trojan.Artemis!874F645974A0
5600.6490

MicroWorld eScan
Adware.SwiftBrowse.CH
17.0.0.135

Norman
Adware.SwiftBrowse.CH
11.20160214

nProtect
Adware.SwiftBrowse.CH
15.05.08.01

Reason Heuristics
PUP.Yontoo.diamondata (M)
16.2.14.5

Sophos
Browse Fox
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9325

VIPRE Antivirus
Trojan.Win32.Generic
40054

Zillya! Antivirus
Adware.Yotoon.Win64.14
2.0.0.2172

File size:
47.7 KB (48,832 bytes)

Product version:
1.4.4.6

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{ab7fd32d-0f7b-4b8f-842d-7df94246698f}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/13/2013 3:00:00 AM

Valid to:
8/14/2015 2:59:59 AM

Subject:
CN=diamondata, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=diamondata, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
013DE313C00D49CFC0FA964B3315CD82

File PE Metadata
Compilation timestamp:
2/24/2015 8:05:38 AM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:lM7G2EjsnyXeOUEGG0LA8tWFZuL470h6aqxcCT2kvsVRwlZD3a7P:GFID6EGnLA8AFJTNEVmDA

Entry address:
0xC064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, E2, 50, FF, FF, CC, CC, 78, C2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 54, C6, 00, 00, A0, 91, 00, 00, 28, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, DA, CA, 00, 00, 50, 90, 00, 00, D8, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D2, CB, 00, 00, 00, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, CB, 00, 00, 00, 00, 00, 00, A2, CB, 00, 00...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Driver
Display name:
{ab7fd32d-0f7b-4b8f-842d-7df94246698f}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI