Did you just run into a download or a file on your computer that is digitally signed by Crawler Group, LLC? Some of the security products refers to the detected files as Program.Unwanted.331 and W32.HfsAdware.6E5A. The detection rate for the Crawler Group, LLC files collected here is 8%. Please read on for more details.
You will typically notice Crawler Group, LLC when clicking to run the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:
You can view the additional details from the Crawler Group, LLC digital signature with the following procedure:
Here is a screenshot of a file that has been signed by Crawler Group, LLC:
As you can see in the screenshot above, Windows reports that "This digital signature is OK". This means that the file has been published by Crawler Group, LLC and that the file has not been tampered with.
If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also examine the address for Crawler Group, LLC, such as the street name, city and country.
Symantec Class 3 SHA256 Code Signing CA and VeriSign Class 3 Code Signing 2010 CA has issued the Crawler Group, LLC certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screencap above.
The following are the Crawler Group, LLC files I've collected, thanks to the FreeFixer users.
Detection Ratio | File Name |
---|---|
1/57 | STINTE~2.DLL |
2/62 | STINTE~2.DLL |
2/56 | STINTE~2.DLL |
2/57 | STINTE~2.DLL |
3/55 | STINTE~1.DLL |
2/57 | STINTE~1.DLL |
3/56 | PCTechHotlineSvc.exe |
3/64 | STINTE~1.DLL |
1/54 | ctbr.dll |
1/56 | SpywareTerminatorShield.exe |
2/55 | SC_svc64.exe |
2/56 | st_rsser.exe |
3/53 | SCINTE~1.DLL |
4/57 | _iu14D2N.tmp |
3/54 | STINTE~1.DLL |
24/66 | 24x7help.exe |
1/57 | SpywareTerminatorShield.exe |
6/57 | PCPowerTray.exe |
1/57 | OVTray.exe |
2/57 | SC_Svc64.exe |
4/57 | _iu14D2N.tmp |
2/56 | st_rsser64.exe |
2/57 | STINTE~1.DLL |
3/53 | STINTE~1.DLL |
2/57 | STINTE~1.DLL |
3/53 | STINTE~2.DLL |
3/55 | STINTE~2.DLL |
4/53 | st_rsser64.exe |
3/53 | STINTE~2.DLL |
3/56 | STINTE~1.DLL |
3/57 | ctbr.dll |
10/56 | 24x7help.exe |
2/57 | SpywareTerminatorSetup.exe |
3/56 | STINTE~1.DLL |
1/56 | STINTE~1.DLL |
1/58 | st_rsser64.exe |
4/62 | STINTE~1.DLL |
3/62 | STINTE~1.DLL |
27/66 | InternetGuardSetup.exe |
3/68 | STINTE~2.DLL |
28/67 | 24x7help.exe |
7/64 | STShell64.dll |
Here's the detection names for the Crawler Group, LLC files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.
Scanner | Detection Names |
---|---|
AVG | Generic.41B, FileRepMetagen [Malware], Win32:Malware-gen |
AVware | Trojan.Win32.Generic!BT |
AegisLab | Pua.Crawler.Gen!c, Troj.W32.Gen, Trojan.Win32.Generic.4!c |
Agnitum | Riskware.Agent! |
Alibaba | PUA:Win32/Crawler.b3fcab18 |
Antiy-AVL | RiskWare[WebToolbar:not-a-virus]/Win32.MyWebSearch, GrayWare/Win32.CrawlerToolbar |
Avast | Win32:Malware-gen |
Avira | PUA/Crawler.Gen |
Bkav | W64.HfsAdware.6E5A, W32.HfsAdware.6E5A |
CAT-QuickHeal | Trojan.IGENERIC |
CMC | Packed.Win32.Obfuscated.10!O |
Comodo | CloudScanner.Trojan.Gen, ApplicUnwnt@#1d2tz2bgi7mxg |
CrowdStrike | malicious_confidence_70% (D) |
Cyren | W32/GenPua.465888F7!Olympus |
DrWeb | Program.Unwanted.1393, Program.Unwanted.1662, Program.Unwanted.331, Program.Unwanted.2826 |
ESET-NOD32 | a variant of Win32/24x7Help.B potentially unwanted |
Emsisoft | Application.Toolbar (A) |
Endgame | malicious (high confidence) |
F-Secure | PotentialRisk.PUA/Crawler.Gen |
Fortinet | Riskware/24x7Help, Riskware/InnoGenForcAlgo |
GData | Win32.Application.Crawler.A, Win32.Application.Agent.TOVCJU |
Gridinsoft | PUP.Toolbar.dd!c |
Invincea | heuristic |
K7AntiVirus | Adware ( 004bc4bc1 ), Trojan ( 0052b7d91 ) |
K7GW | Adware ( 004bc4bc1 ), Trojan ( 0052b7d91 ) |
Kaspersky | HEUR:Hoax.Win32.Reptile.gen, not-a-virus:HEUR:WebToolbar.Win32.Reptile.gen |
MAX | malware (ai score=96), malware (ai score=99) |
Malwarebytes | PUP.Optional.24x7Help, PUP.Optional.WebSearch, PUP.Optional.Crawler |
MaxSecure | not-a-virus:WebToolbar.Agent.AHJ |
McAfee | Artemis!C3CFE6F7963D, Artemis!CAB99FB65667, Artemis!36FE9A305A61, Artemis!34AEA6628A89 |
McAfee-GW-Edition | BehavesLike.Win32.BadFile.th, Artemis, Artemis!Trojan |
Microsoft | PUA:Win32/CrawlerToolbar |
NANO-Antivirus | Riskware.Win32.Unwanted.dypbiv, Riskware.Win32.Agent.eazsoh, Riskware.Win32.Crawler.eveldl, Riskware.Win64.Unwanted.dypbiv |
Paloalto | generic.ml |
Panda | PUP/Netcrawl, Trj/Genetic.gen, Generic Malware |
Qihoo-360 | HEUR/QVM42.1.Malware.Gen, Win32/Trojan.Hoax.a31 |
Rising | Malware.Undefined!8.C-g4cHdDXv2FS (cloud), Malware.Undefined!8.C (cloud:Mf4FO5FsJcN) |
SUPERAntiSpyware | PUP.InstallCore/Variant |
SentinelOne | static engine - malicious |
Sophos | Generic PUA OD (PUA) |
Symantec | ML.Attribute.HighConfidence, PCPowerSpeed |
TrendMicro-HouseCall | TROJ_GEN.R004H0CCO18, Suspicious_GEN.F47V0122, Suspicious_GEN.F47V0318, TROJ_GEN.R061H07DN18, TROJ_GEN.R004H0CDM19 |
VBA32 | BScope.Trojan-Dropper.Injector |
VIPRE | Trojan.Win32.Generic!BT |
ViRobot | Adware.24X7Help.1912960 |
Webroot | Pua.Adware.Crawler, Pua.24x7.Help, Pua.Websearch |
Yandex | Riskware.Agent! |
Zillya | Adware.MusIn.Win32.3, Adware.1ClickDownload.Win32.514 |
ZoneAlarm | HEUR:Hoax.Win32.Reptile.gen, not-a-virus:HEUR:WebToolbar.Win32.Reptile.gen |
The detection percentage is based on that I've gathered 2478 scan results for the Crawler Group, LLC files. 189 of these scan reports came up with some sort of detection. If you like, you can view the full details of the scan results by examining the files listed above.
The analysis has been done on certificates with the following serial numbers: