crimsolite - 38% Detection Rate *

Did you just stumble upon a download or a file on your computer that is digitally signed by crimsolite? Some of the security products refers to the detected files as Adware.SwiftBrowse.CH and Adware.NetFilter.E. The detection rate for the crimsolite files collected here is 38%. Please read on for more details.

You will typically see crimsolite when clicking to run the file. The publisher name is then displayed as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where crimsolite appears as the verified publisher in the UAC dialog

You can also view the crimsolite certificate with the following steps:

  1. Open up Windows Explorer and locate the crimsolite file
  2. Right-click on the file and select Properties
  3. Click the Digital Signatures tab
  4. Click on the View Certificate button

Here's a screenshot of a file digitally signed by crimsolite:

Screenshot of the crimsolite certificate

As you can see in the screenshot above, Windows states that "This digital signature is OK". This means that the file has been published by crimsolite and that the file has not been tampered with.

If you click the View Certificate button shown in the screenshot above, you can examine all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also view the address for crimsolite, such as the street name, city and country.

VeriSign Class 3 Code Signing 2010 CA has issued the crimsolite certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screenshot above.

crimsolite Files

These are the crimsolite files I have collected, thanks to the FreeFixer users.

Detection RatioFile Name
1/50{b525993a-167d-44eb-9f03-5966d1af451f}gw64.sys
28/57wstlibg64.sys
51/68{4d5a7527-ee4b-4e67-b62e-2b84d7af4488}w64.sys
52/68{ba11529b-ec51-41b3-92b7-085af4eef6a4}w64.sys
0/51tstlibg.sys

Scanner and Detection Names

Here's the detection names for the crimsolite files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
ALYacAdware.NetFilter.E, Adware.SwiftBrowse.CH
AVGMalSign.Crimso.E8C, Crimso.E8C, MSIL:BrowseFox-BL [PUP]
AVwareTrojan.Win32.Generic!BT
Ad-AwareAdware.NetFilter.E, Adware.SwiftBrowse.CH
AgnitumTrojan.BPlug!
AhnLab-V3Trojan/Win64.SwiftBrowse
Antiy-AVLGrayWare[NetTool:not-a-virus]/Win64.NetFilter.a
ArcabitAdware.SwiftBrowse.CH
AvastWin32:BrowseFox-DC [PUP], MSIL:BrowseFox-BL [PUP]
AviraAdware/BrowseFox.apn, ADWARE/NetFilter.fhdgd
BaiduWin32.Adware.BrowseFox.f
Baidu-InternationalAdware.Win32.BrowseFox.D
BitDefenderAdware.NetFilter.E, Adware.SwiftBrowse.CH
BkavW64.HfsAdware.F463
CAT-QuickHealAdware.SwiftBrowse.S9255
ClamAVWin.Adware.Swiftbrowse-75, Win.Adware.Swiftbrowse-513
CrowdStrikemalicious_confidence_100% (D)
Cybereasonmalicious.1b8fb7
CyrenW64/A-e967bae2!Eldorado, W64/A-59c9c70a!Eldorado
DrWebTrojan.BPlug.123, Trojan.Yontoo.1734
ESET-NOD32a variant of Win64/Komodia.A potentially unsafe, a variant of Win64/NetFilter.A potentially unsafe
EmsisoftAdware.NetFilter.E (B), Adware.SwiftBrowse.CH (B)
Endgamemalicious (high confidence)
F-ProtW64/A-e967bae2!Eldorado, W64/A-59c9c70a!Eldorado
F-SecureAdware.NetFilter.E, Adware.SwiftBrowse.CH
FortinetRiskware/NetFilter, Riskware/BrowseFox
GDataAdware.NetFilter.E, Adware.SwiftBrowse.CH
Ikarusnot-a-virus:NetTool.NetFilter
Invinceaheuristic
JiangminAdWare/Yotoon.m
K7AntiVirusAdware ( 0040f9f21 )
K7GWAdware ( 0040f9f21 )
Kasperskynot-a-virus:NetTool.Win64.NetFilter.k
MAXmalware (ai score=61), malware (ai score=65)
MalwarebytesPUP.Optional.BrowseFox
McAfeeBrowseFox-FBB
McAfee-GW-EditionBrowseFox-FBB
MicroWorld-eScanAdware.NetFilter.E, Adware.SwiftBrowse.CH
MicrosoftBrowserModifier:Win32/Foxiebro
NANO-AntivirusRiskware.Win64.NetFilter.djpsyi, Trojan.Win64.Yontoo.ermvdb
PandaTrj/CI.A
Qihoo-360Win32/Virus.Adware.a96, Win32/Virus.NetTool.094
SUPERAntiSpywareAdware.SwiftBrowse/Variant
SentinelOnestatic engine - malicious
SophosBrowseSmart, Browse Fox (PUA)
SymantecYontoo.C, Trojan.Gen.2
TencentWin32.Adware.Browsefox.Yqhk, Win32.Adware.Browsefox.Kmso
TrendMicroTROJ_GEN.R0C1C0OAH15, PUA_BROWSEFOX
TrendMicro-HouseCallTROJ_GEN.R0C1C0OAH15, PUA_BROWSEFOX
VIPRETrojan.Win32.Generic!BT
ViRobotAdware.SwiftBrowse.48784.GTF
WebrootPua.Superweb
YandexRiskware.Agent!
ZillyaAdware.Yotoon.Win64.3, Adware.Yotoon.Win64.14
ZoneAlarmnot-a-virus:NetTool.Win64.NetFilter.k
eGambitUnsafe.AI_Score_73%
nProtectAdware.NetFilter.E, Trojan-Clicker/W32.Yotoon.48784

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I have collected 345 scan results for the crimsolite files. 132 of these scan results came up with some sort of detection. If you like, you can review the full details of the scan results by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply