{c486bc7a-4f2c-4a8b-ac38-4952f70809b9}w64.sys

findopolis

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {c486bc7a-4f2c-4a8b-ac38-4952f70809b9}w64.sys by findopolis has been detected as adware by 33 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{c486bc7a-4f2c-4a8b-ac38-4952f70809b9}w64”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by findopolis)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
2a0f176ace15a7b879a8ceb98e5f1234

SHA-1:
a0ce4c3e4e31caffacd22ffe3ceaec49ba03df05

SHA-256:
d0be8ca6724e3387ceb9769bec12ca6197b0bdb9d15c2b402d0cfd5acfee23c1

Scanner detections:
33 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 1:08:16 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.W
356

Agnitum Outpost
Trojan.BPlug
7.1.1

AhnLab V3 Security
Trojan/Win64.SwiftBrowse
2014.09.02

Avira AntiVirus
Adware/BrowseFox.aou
7.11.210.88

avast!
Win32:BrowseFox-CF [PUP]
2014.9-160213

AVG
Webpade
2017.0.2834

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16213

Bitdefender
Adware.SwiftBrowse.W
1.0.20.220

Clam AntiVirus
Win.Adware.Swiftbrowse-497
0.98/21411

Dr.Web
Trojan.BPlug.123
9.0.1.044

Emsisoft Anti-Malware
Adware.SwiftBrowse.W
8.16.02.13.03

ESET NOD32
Win64/BrowseFox.BQ potentially unwanted application
10.7.0.302.0

F-Prot
W64/A-bd57be8c
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.W
11.2016-13-02_7

G Data
Adware.SwiftBrowse
16.2.24

IKARUS anti.virus
AdWare.SpadeCast
t3scan.1.7.5.0

K7 AntiVirus
Adware
13.194.14969

McAfee
Artemis!FA7B5BC3E4C2
5600.6490

MicroWorld eScan
Adware.SwiftBrowse.W
17.0.0.132

NANO AntiVirus
Trojan.Win64.BPlug.decfln
0.28.2.61721

Norman
Adware.SwiftBrowse.W
11.20160213

nProtect
Adware.SwiftBrowse.W
14.08.04.01

Panda Antivirus
Adware/BrowserFox
16.02.13.03

Reason Heuristics
PUP.Yontoo.findopolis (M)
16.2.13.15

Rising Antivirus
PE:Trojan.Win32.Generic.1710E86A!386984042
23.00.65.16211

Sophos
BrowseSmart
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9326

Trend Micro House Call
Suspicious_GEN.F47V0807
7.2.44

Trend Micro
HS_BROWSEFOX.SM
10.465.13

VIPRE Antivirus
Adware.SwiftBrowse
32252

Zillya! Antivirus
Adware.Yotoon.Win64.3
2.0.0.1908

File size:
43.7 KB (44,736 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{c486bc7a-4f2c-4a8b-ac38-4952f70809b9}w64.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/8/2014 4:00:00 PM

Valid to:
1/9/2015 3:59:59 PM

Subject:
CN=findopolis, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=findopolis, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
41FD37ED8D644A11E361329013F51FC2

File PE Metadata
Compilation timestamp:
9/12/2014 4:33:02 PM

OS version:
6.1

OS bitness:
Win64

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:CgLmaZF8aSQ7DwZmEhzg8ClFHeDrTdRfsQCa5075YLwidHo1:95ZEQI8E7ClquaC759E

Entry address:
0xB064

Entry point:
48, 83, EC, 28, 4C, 8B, C2, 4C, 8B, C9, E8, 95, FF, FF, FF, 49, 8B, D0, 49, 8B, C9, 48, 83, C4, 28, E9, C6, 60, FF, FF, CC, CC, 38, B2, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 1C, B6, 00, 00, 60, 81, 00, 00, 28, B1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BE, B9, 00, 00, 50, 80, 00, 00, D8, B0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, B6, BA, 00, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 9A, BA, 00, 00, 00, 00, 00, 00, 86, BA, 00, 00...
 
[+]

Code size:
30.5 KB (31,232 bytes)

Driver
Display name:
{c486bc7a-4f2c-4a8b-ac38-4952f70809b9}w64

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI