Threat description




Apropos uses highly sophisticated stealth techniques to avoid detection.

The spyware collects the browsing habits of users and system information and sends it back to ContextPlus servers. Targeted pop-up advertisements are displayed while browsing the Web.


Automatic action

Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.

More scanning & removal options

More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

PeopleOnPage produces the Apropos family of spyware.

It uses the same ContextPlus engine as the public software POP!, made by PeopleOnPage. However, the Apropos branch uses a silent installer and rootkit techniques to hide itself from detection. When the client connects to the server, the name Apropos is used as the client name.

ContextPlus gathers an extensive amount of information from the user's computer. The application tracks which software is installed, what web sites are visited, and the user's browsing behavior. Each installation is given a unique ID, which is sent to the ContextPlus server to request a pop-up advertisement.

Rootkit Details

Apropos contains a kernel-mode rootkit that allows it to hide files, directories, registry keys, and processes. The rootkit is implemented by a kernel-mode driver which starts automatically early in the boot process. When the files and registry keys have been hidden, no user-mode process is allowed to access them.


Apropos installs itself into a randomly named directory under the Program Files folder.

Additional, it installs one randomly named executable file (.EXE) into the Windows\System32 folder and one randomly named driver (.SYS) into the Windows\System32\Drivers folder.

The following two log files generated by the F-Secure security product illustrate this behavior:

In addition to the randomly named files, Apropos uses several statically named files that reside in the installation directory, such as ace.dll, data.bin and WinGenerics.dll. Also, the log files and cache files are easy to recognize.

Hiding Technique

The kernel-mode driver patches the kernel at a very deep level. Important data structures and several Native API functions implemented by the kernel are modified. Specifically, the following functions are patched:

  • NtCreateKey
  • NtOpenKey
  • NtEnumerateKey
  • IoCreateFile
  • NtQueryDirectoryFile
  • NtQuerySystemInformation

The operating system uses these functions to gain access to, and information about, files, directories, registry keys, and processes.

Additional Note

Apropos is not associated with Apropos Technologies, Inc (NASDAQ: APRS).

Description Created: 2006-01-01 14:58:16.0

Description Last Modified: 2006-01-01 00:00:00.0

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

More Info