Megabrowse - 37% Detection Rate *

Did you just run into a download or a file on your computer that has been digitally signed by Megabrowse? Some of the security products refers to the detected files as Adware.SwiftBrowse.CF and Adware.SwiftBrowse.U. The detection rate for the Megabrowse files collected here is 37%. Please read on for more details.

You will typically see Megabrowse when clicking to run the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Megabrowse appears as the verified publisher in the UAC dialog

You can also view the Megabrowse certificate with the following steps:

  1. Open up Windows Explorer and locate the Megabrowse file
  2. Right-click on the file and select Properties
  3. Click on the Digital Signatures tab
  4. Click the View Certificate button

Here's a screenshot of a file signed by Megabrowse:

Screenshot of the Megabrowse certificate

As you can see in the screenshot above, Windows reports that "This digital signature is OK". This means that the file has been published by Megabrowse and that the file has not been tampered with.

If you click the View Certificate button shown in the screenshot above, you can view all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also examine the address for Megabrowse, such as the street name, city and country.

COMODO Code Signing CA 2 has issued the Megabrowse certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screengrab above.

Megabrowse Files

These are the Megabrowse files I've collected, thanks to the FreeFixer users.

Detection RatioFile Name
10/54{29b136c9-938d-4d3d-8df8-d649d9b74d02}Gw64.sys
2/54{29b136c9-938d-4d3d-8df8-d649d9b74d02}t.sys
14/53{29b136c9-938d-4d3d-8df8-d649d9b74d02}w64.sys
13/55updatemegabrowse.exe
9/54MegaBrowse.BrowserAdapter.dll
50/63{1a6d0cfb-dce2-4165-b21a-b549f29bee27}t.sys
48/63{29b136c9-938d-4d3d-8df8-d649d9b74d02}t.sys

Scanner and Detection Names

Here's the detection names for the Megabrowse files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
ALYacAdware.SwiftBrowse.CF
AVGMegabrowse, Win32:PoisonIvy-AV [Trj]
AVwareYontoo (fs), Trojan.Win32.Generic!BT
Ad-AwareAdware.SwiftBrowse.U, Adware.SwiftBrowse.CF
Antiy-AVLRiskWare[RiskTool]/Win32.NetFilter.q
ArcabitPUP.Adware.Megabrowse
AvastWin32:PoisonIvy-AV [Trj]
AviraADWARE/BrowseFox.A.28
BaiduWin32.Adware.BrowseFox.m
Baidu-InternationalAdware.Win32.BrowseFox.mega
BitDefenderAdware.SwiftBrowse.U, Adware.SwiftBrowse.CF
CAT-QuickHealPUA.Megabrowse.Gen
ClamAVWin.Adware.Netfilter-186
ComodoTrojWare.Win32.AltBrowse.IZZV
CrowdStrikemalicious_confidence_100% (D)
CyrenW32/A-c972e623!Eldorado
DrWebTrojan.Yontoo.1742
ESET-NOD32a variant of Win32/BrowseFox.H, probably a variant of MSIL/BrowseFox.G, a variant of Win64/BrowseFox.E potentially unwanted
EmsisoftAdware.SwiftBrowse.U (B), Adware.SwiftBrowse.CF (B)
Endgamemalicious (high confidence)
F-ProtW32/A-c972e623!Eldorado
F-SecureAdware.SwiftBrowse.U, Adware.SwiftBrowse.CF
FortinetRiskware/Generic.AC.4C94F
GDataAdware.SwiftBrowse.U, Win32.Riskware.Netfilter.A
IkarusAdWare.SpadeCast, AdWare.SwiftBrowse, PUA.BrowseFox, not-a-virus:RiskTool.Win32.Netfilter
Invinceaheuristic
K7AntiVirusUnwanted-Program ( 004ae5af1 )
K7GWUnwanted-Program ( 004ae5af1 )
Kasperskynot-a-virus:AdWare.Win32.Kranet.g, not-a-virus:RiskTool.Win32.NetFilter.q
KingsoftWin32.Troj.Kranet.g.(kcloud)
MAXmalware (ai score=46), malware (ai score=40)
MalwarebytesPUP.Optional.MegaBrowse.A, PUP.Optional.BrowseFox
McAfeeArtemis!4529C7B01DC4, Adware-MBrowse, Artemis!FC967FA2E6FD, Artemis!7CEF2BC66426
McAfee-GW-EditionArtemis!4529C7B01DC4, Artemis!PUP
MicroWorld-eScanAdware.SwiftBrowse.U, Adware.SwiftBrowse.CF
MicrosoftBrowserModifier:Win32/Foxiebro
NANO-AntivirusRiskware.Win32.NetFilter.dgqvkd
PandaTrj/CI.A, Trj/Chgt.D
Qihoo-360HEUR/QVM00.1.Malware.Gen
SUPERAntiSpywarePUP.AirGlobe/Variant
SentinelOnestatic engine - malicious
SophosBrowseSmart, Browse Fox, Browse Fox (PUA)
SymantecTrojan.ADH.2, Trojan.Gen.2
TencentWin32.Risk.Adware.Egeg, Win32.Adware.Yotoon.Ammx
TrendMicroTROJ_GEN.R047C0EDB17
TrendMicro-HouseCallSuspicious_GEN.F47V0611, TROJ_GEN.R047C0EDB17
VBA32AdWare.Yotoon
VIPRETrojan.Win32.Generic!BT, Yontoo (fs)
ViRobotAdware.Browsefox.55456.J
WebrootPua.Superweb
YandexRiskware.Agent!
ZillyaAdware.BrowseFoxCRT.Win32.120
ZoneAlarmnot-a-virus:RiskTool.Win32.NetFilter.q

* How the Detection Percentage is Calculated

The detection percentage is based on that I have collected 396 scan reports for the Megabrowse files. 146 of these scan results came up with some sort of detection. If you like, you can view the full details of the scan reports by examining the files listed above.

Analysis Details

The analysis is done on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply