Swift Record - 48% Detection Rate *

Did you just run into a download or a file on your computer that has been digitally signed by Swift Record? Some of the security products refers to the detected files as Adware.BrowseFox.V and BrowseFox.BBD. The detection rate for the Swift Record files collected here is 48%. Please read on for more details.

You will probably notice Swift Record when running the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Swift Record appears as the verified publisher in the UAC dialog

You can also view the Swift Record certificate with the following steps:

  1. Open Windows Explorer and locate the Swift Record file
  2. Right-click the file and select Properties
  3. Click the Digital Signatures tab
  4. Click the View Certificate button

Here is a screenshot of a file that has been digitally signed by Swift Record:

Screenshot of the Swift Record certificate

As you can see in the screenshot above, Windows states that "This digital signature is OK". This means that the file has been published by Swift Record and that no one has tampered with the file.

If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, and so on. You can also see the address for Swift Record, such as the street name, city and country.

VeriSign Class 3 Code Signing 2010 CA has issued the Swift Record certificates. You can also examine the details of the issuer by clicking the View Certificate button shown in the screenshot above.

Swift Record Files

These are the Swift Record files I have gathered, thanks to the FreeFixer users.

Detection RatioFile Name
38/57{2c5699ec-85f1-4ae8-892b-4feb9efc1813}gw.sys
26/57SwiftRecordbho.dll
38/55{86495074-1e01-4c57-b1c7-869ad9007a9b}gw.sys
36/57SwiftRecordbho.dll
19/56utilSwiftRecord.exe
26/57{996d1aa5-d397-4272-8bde-0cf232732324}gw.sys
17/56{682d77bf-fc9c-450a-91b2-3a6982f155c6}w64.sys

Scanner and Detection Names

Here's the detection names for the Swift Record files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
ALYacAdware.BrowseFox.V, Gen:Variant.Adware.Mikey.11547, Adware.SwiftBrowse.CH
AVGBrowseFox.BBD, AdPlugin.DIU
AVwareTrojan.Win32.Generic!BT, Yontoo (fs)
Ad-AwareAdware.BrowseFox.V, Gen:Variant.Adware.Mikey.11547, Adware.SwiftBrowse.CH
AegisLabAdWare.Win64.Agent
AgnitumPUA.BrowseFox!, Riskware.Agent!
AhnLab-V3Win-PUP/BrowseFox.Gen, PUP/Win32.BrowseFox
Antiy-AVLGrayWare[AdWare:not-a-virus]/Win32.Yotoon.kam, GrayWare[NetTool:not-a-virus]/Win64.NetFilter.a
ArcabitAdware.BrowseFox.V, PUP.Adware.SwiftRecord
AvastWin32:BrowseFox-MJ [PUP]
AviraADWARE/BrowseFox.A.1227, ADWARE/BrowseFox.Gen2, ADWARE/BrowseFox.Gen7, Adware/BrowseFox.A.1227
Baidu-InternationalAdware.Win32.BrowseFox.Swif, Adware.Win32.BrowseFox.AE, Adware.MSIL.BrowseFox.G
BitDefenderAdware.BrowseFox.V, Gen:Variant.Adware.Mikey.11547, Adware.SwiftBrowse.CH
BkavW32.HfsAdware.2F5F, W32.HfsAdware.5F04
CAT-QuickHealPUA.Swiftrecor.Gen
ClamAVWin.Adware.Netfilter-134, Win.Adware.Browsefox-796, Win.Adware.Swiftbrowse-497
ComodoTrojWare.Win32.AltBrowse.IZZV
CyrenW32/S-a7161e1c!Eldorado, W32/S-f64f6ec1!Eldorado, W32/S-bc825f4f!Eldorado, W64/A-59c9c70a!Eldorado
DrWebTrojan.Yontoo.1734, Tool.NetFilter.313
ESET-NOD32a variant of Win32/NetFilter.A potentially unsafe, a variant of Win32/BrowseFox.AE potentially unwanted, a variant of MSIL/BrowseFox.G potentially unwanted
EmsisoftAdware.BrowseFox.V (B), Gen:Variant.Adware.Mikey.11547 (B), Adware.SwiftBrowse.CH (B)
F-ProtW32/S-a7161e1c!Eldorado, W32/S-f64f6ec1!Eldorado, W32/S-bc825f4f!Eldorado, W64/A-59c9c70a!Eldorado
F-SecureAdware.BrowseFox.V, Gen:Variant.Adware.Mikey, Adware.SwiftBrowse.CH
FortinetRiskware/NetFilter, Riskware/BrowseFox
GDataAdware.BrowseFox.V, Gen:Variant.Adware.Mikey.11547
IkarusPUA.BrowseFox, AdWare.BrowseFox, PUA.MSIL.BrowseFox
JiangminAdWare/SwiftBrowse.dxt, AdWare/Yotoon.nb
K7AntiVirusUnwanted-Program ( 0040f9e71 ), Trojan ( 004b55d71 ), Adware ( 700000121 )
K7GWUnwanted-Program ( 0040f9e71 ), Trojan ( 004b55d71 ), Adware ( 700000121 )
MalwarebytesPUP.Optional.SwiftRecord.A, PUP.Optional.BrowseFox
McAfeeArtemis!7B8655CD154B, Artemis!9D924B9B0611, Artemis!7599F2414780, Artemis!2A60D2919CC2
McAfee-GW-EditionArtemis!PUP, BehavesLike.Win32.PUPAmonetize.ph, BehavesLike.Win64.PUPAmonetize.ph
MicroWorld-eScanAdware.BrowseFox.V, Gen:Variant.Adware.Mikey.11547
NANO-AntivirusRiskware.Win32.Yotoon.dsmpht, Trojan.Win32.Yontoo.dnkubo, Riskware.Win32.BPlug.djpkri
PandaPUP/SwiftBrowse
Qihoo-360Win32/Virus.Adware.618, HEUR/QVM30.1.Malware.Gen, Win32/Virus.Adware.708
RisingPE:Adware.BrowseFox!6.1D8B
SUPERAntiSpywareAdware.BrowseFox/Variant
SophosGeneric PUA LF, Generic PUA PL
SymantecTrojan.Gen.2
TencentTrojan.Win32.Qudamah.Gen.16, Win32.Risk.Adware.Ahyn, Trojan.Win32.Qudamah.Gen.14, Win32.Risk.Adware.Wpsy, Win32.Risk.Adware.Syse
TrendMicroTROJ_GEN.R08NC0EDU15, TROJ_GEN.R00UC0OCQ15, TROJ_GEN.R00UC0EEB15, HS_BROWSEFOX.SM
TrendMicro-HouseCallTROJ_GEN.R08NC0EDU15, TROJ_GEN.R00UC0OCQ15, TROJ_GEN.R00UC0EEB15, HS_BROWSEFOX.SM
VBA32AdWare.Zaitu, AdWare.MSIL.Agent
VIPRETrojan.Win32.Generic!BT, Yontoo (fs)
ZillyaBackdoor.CPEX.Win32.29350, Backdoor.PePatch.Win32.71216
nProtectAdware.BrowseFox.V, Adware.SwiftBrowse.CH

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I've gathered 1299 scan reports for the Swift Record files. 627 of these scan reports came up with some sort of detection. If you like, you can review the full details of the scan reports by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply