tstlibg.sys

ResultsAlpha

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file tstlibg.sys by ResultsAlpha has been detected as adware by 18 anti-malware scanners. It runs as a Windows kernel mode device driver named “tStLibG”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by ResultsAlpha)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
6aaa6b72dcef169433725ecb238989e0

SHA-1:
9cd486e0ad89cfeb7f65470fcceae998b1e6cc8e

SHA-256:
6c81bd58496fb679f869347ae4578aaf5955a1956ce10ec39fadf53e3c4c28e5

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/20/2024 2:42:42 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.J
800

AVG
Generic
2015.0.3278

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141126

Bitdefender
Adware.SwiftBrowse.J
1.0.20.1650

Bkav FE
W32.BrowseFoxM.Adware
1.3.0.4959

Comodo Security
TrojWare.Win32.AltBrowse.IZZV
20202

Dr.Web
Trojan.BPlug.117
9.0.1.05190

Emsisoft Anti-Malware
Adware.SwiftBrowse
9.0.0.4570

F-Prot
W32/A-dd00b781
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.J
11.2014-26-11_4

G Data
Adware.SwiftBrowse
14.11.24

MicroWorld eScan
Adware.SwiftBrowse.J
15.0.0.990

NANO AntiVirus
Trojan.Win32.BPlug.dcxxfx
0.28.6.63726

nProtect
Adware.SwiftBrowse.J
14.11.26.01

Reason Heuristics
Adware.Yontoo.ResultsAlpha.K
14.11.26.7

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.3

VIPRE Antivirus
Threat.4150696
35088

Zillya! Antivirus
Adware.Yotoon.Win64.2
2.0.0.1994

File size:
53.9 KB (55,232 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\tstlibg.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/7/2013 2:00:00 AM

Valid to:
10/8/2014 1:59:59 AM

Subject:
CN=ResultsAlpha, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=ResultsAlpha, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
469743F6036CB7B569DBDE100D5C126B

File PE Metadata
Compilation timestamp:
1/31/2014 1:46:38 AM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:VvbP7EDNtMTw/RWDjR/McKV5qEXGBJgxgZ+4AOmvtnBU6+RR0yvjd:dP7EJSTukuzTrGYs+JNBUtRBd

Entry address:
0xA73E

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, CA, E3, FF, FF, CC, CC, B4, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 84, AB, 00, 00, 94, 90, 00, 00, A0, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BA, AB, 00, 00, 80, 90, 00, 00, AC, A7, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, D6, AB, 00, 00, 8C, 90, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, A6, AB, 00, 00, 92, AB, 00, 00, 00, 00, 00, 00, C2, AB, 00, 00, 00, 00, 00, 00, AC, A8, 00, 00, C4, A8, 00, 00, D6, A8...
 
[+]

Entropy:
6.3491

Code size:
36.3 KB (37,120 bytes)

Driver
Display name:
tStLibG

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove tstlibg.sys - Powered by Reason Core Security