{ba099a85-e825-4802-83e7-d386a5b4a734}t.sys

BuzzSearch

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {ba099a85-e825-4802-83e7-d386a5b4a734}t.sys by BuzzSearch has been detected as adware by 7 anti-malware scanners. It runs as a Windows kernel mode device driver named “{ba099a85-e825-4802-83e7-d386a5b4a734}t”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by BuzzSearch)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
81d661f63ce670649d92de39c3f783aa

SHA-1:
0677f4c81c7173723bdd4a334871ce83c22cb15f

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 3:57:29 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Buzzeach
2017.0.2833

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16214

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.6.1.0

McAfee
Artemis!7AE07034A137
5600.6489

Reason Heuristics
PUP.Yontoo.BuzzSearch (M)
16.2.14.21

Trend Micro House Call
Suspicious_GEN.F47V0624
7.2.45

VIPRE Antivirus
Yontoo
31020

File size:
53.4 KB (54,720 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{ba099a85-e825-4802-83e7-d386a5b4a734}t.sys

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
5/3/2014 2:00:00 AM

Valid to:
5/4/2015 1:59:59 AM

Subject:
CN=BuzzSearch, OU=BuzzSearch, O=BuzzSearch, STREET=10620 Treena Street Suite 230, L=San Diego, S=Ca, PostalCode=92131, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00DD9FCB2E901E39FD097F0632D190AF7E

File PE Metadata
Compilation timestamp:
8/7/2014 1:52:31 AM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:hOnnE+ZwNszUTw/RqzGojR/h3cKG45q30XGBUuJ0xEkMHd8OagKmvz11/6RRRZ+S:SnERxTukHzTrGCuGOVh1/yRy5Q

Entry address:
0xA6BE

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, 4A, E4, FF, FF, CC, CC, 34, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, AB, 00, 00, 94, 90, 00, 00, 20, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 3A, AB, 00, 00, 80, 90, 00, 00, 2C, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 56, AB, 00, 00, 8C, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 26, AB, 00, 00, 12, AB, 00, 00, 00, 00, 00, 00, 42, AB, 00, 00, 00, 00, 00, 00, 2C, A8, 00, 00, 44, A8, 00, 00, 56, A8...
 
[+]

Code size:
36.3 KB (37,120 bytes)

Driver
Display name:
{ba099a85-e825-4802-83e7-d386a5b4a734}t

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove {ba099a85-e825-4802-83e7-d386a5b4a734}t.sys - Powered by Reason Core Security