linkswift - 12% Detection Rate *

Did you just run into a download or a file on your computer that has been digitally signed by linkswift? Some of the security products refers to the detected files as PUP.Optional.LinkSwift.A and not-a-virus:AdWare.Win32.LinkSwift.a. The detection rate for the linkswift files collected here is 12%. Please read on for more details.

You will typically see linkswift when double-clicking to run the file. The publisher name is displayed as the "Verified publisher" in the UAC dialog as the screencap shows:

Screenshot where linkswift appears as the verified publisher in the UAC dialog

You can view the additional details from the linkswift digital signature with the following steps:

  1. Open Windows Explorer and locate the linkswift file
  2. Right-click the file and select Properties
  3. Click on the Digital Signatures tab
  4. Click on the View Certificate button

Here is a screenshot of a file signed by linkswift:

Screenshot of the linkswift certificate

As you can see in the screenshot above, Windows reports that "This digital signature is OK". This implies that the file has been published by linkswift and that the file has not been tampered with.

If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also examine the address for linkswift, such as the street name, city and country.

VeriSign Class 3 Code Signing 2010 CA has issued the linkswift certificates. You can also view the details of the issuer by clicking the View Certificate button shown in the screenshot above.

linkswift Files

The following are the linkswift files I have gathered, thanks to the FreeFixer users.

Detection RatioFile Name
2/51XTLSApp.exe
5/46updatelinkswift.exe
4/47LinkSwiftbho.dll
7/48LinkSwiftbho.dll
4/48updatelinkswift.exe
3/47updatelinkswift.exe
4/51updateLinkSwift.exe
14/54{25d71abf-7776-46f5-a269-9951331f9030}w.sys
1/46desktop.exe
15/50utilLinkSwift.exe
9/50LinkSwiftBHO.dll
1/48LinkSwift.BrowserAdapterS.dll
19/55LinkSwiftBHO.dll
3/48LinkSwiftbho.dll
10/50LinkSwiftBHO.dll
1/51tstlib.sys
7/53{25d71abf-7776-46f5-a269-9951331f9030}w64.sys

Scanner and Detection Names

Here is the detection names for the linkswift files. I've grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
AVGBrowseFox.F
AVwareTrojan.Win32.Generic!BT, Yontoo (fs)
AgnitumPUA.Yotoon!, Riskware.Agent!
AhnLab-V3Adware/Win32.Downloader
Antiy-AVLGrayWare[AdWare:not-a-virus]/Win32.LinkSwift, AdWare/Win32.Agent, Trojan/Win32.TSGeneric
AvastWin32:BrowseFox-H [PUP]
AviraADWARE/BrowseFox.Gen2
Baidu-InternationalAdware.Win64.BrowseFox.bBC, Adware.Win32.BrowseFox.bO
BkavHW32.Laneul.wwko
ClamAVWin.Adware.Swiftbrowse-79
ComodoApplication.Win32.Altbrowse.AK, Application.Win32.BrowseFox.JM
DrWebAdware.Plugin.100, Trojan.BPlug.35, Trojan.BPlug.123, Adware.Searcher.2574, Trojan.BPlug.22, Trojan.BPlug.17, Trojan.BPlug.141
ESET-NOD32a variant of MSIL/BrowseFox.A, Win32/BrowseFox.E, probably a variant of Win32/BrowseFox.A, a variant of Win32/BrowseFox.G, a variant of Win64/BrowseFox.BC, a variant of Win32/BrowseFox.F, a variant of Win32/BrowseFox.O
F-ProtW32/A-dd00b781!Eldorado
FortinetAdware/LinkSwift
Ikarusnot-a-virus:AdWare.Win32.LinkSwift, AdWare.BrowseFox, AdWare.Win32.LinkSwift
JiangminAdWare/Yotoon.l
K7AntiVirusUnwanted-Program ( 00454f261 )
K7GWUnwanted-Program ( 00454f261 )
Kasperskynot-a-virus:AdWare.Win32.LinkSwift.a
KingsoftWin32.Troj.Generic.a.(kcloud), Win32.Troj.LinkSwift.a.(kcloud), Win32.Troj.Agent.ah.(kcloud)
MalwarebytesPUP.Optional.LinkSwift.A
McAfeeArtemis!670EECFD0593, Artemis!CAEADE48507C, Artemis!5476015FC594
McAfee-GW-EditionArtemis!670EECFD0593, Artemis, Artemis!5476015FC594
NANO-AntivirusRiskware.Win32.Yotoon.ddghtt, Riskware.Win32.Agent.crkvek, Trojan.Win32.BPlug.ddwtte
Qihoo-360HEUR/Malware.QVM30.Gen
SUPERAntiSpywareAdware.BrowseFox/Variant
SophosGeneric PUA FJ, Generic PUA BG, BrowseSmart
SymantecYontoo.C
TrendMicro-HouseCallTROJ_GEN.F47V0904, TROJ_GEN.F47V1011, TROJ_GEN.F47V0906, TROJ_GEN.F47V1004, TROJ_GEN.F47V0225, TROJ_GEN.F47V0928, Suspicious_GEN.F47V0626
VBA32AdWare.Win64.Yotoon, AdWare.Agent
VIPREAdware.Agent, Yontoo (fs), Trojan.Win32.Generic!BT
ViRobotTrojan.Win32.S.Agent.65312.A
ZillyaAdware.Yotoon.Win64.1, Adware.LinkSwift.Win32.175

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I have gathered 888 scan results for the linkswift files. 109 of these scan results came up with some sort of detection. If you like, you can review the full details of the scan results by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply