PUA.SafelyOnline

Updated: August 02, 2019 6:02:00 AM Type: Potentially Unwanted App Infection Length: Varies Name: Safely Version: 1.0.1 Publisher: Unknown Risk Impact: Low Systems Affected: Windows Behavior PUA.SafelyOnline is a potentially unwanted application that modifies web browser settings without user consent. Technical Description When the application is executed, it creates the following folders: %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebpjnjghimiofdlpnmhclanhckablllf %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebpjnjghimiofdlpnmhclanhckablllf\1.7.2_0 %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebpjnjghimiofdlpnmhclanhckablllf\1.7.2_0\_metadata %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebpjnjghimiofdlpnmhclanhckablllf\1.7.2_0\frame %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ebpjnjghimiofdlpnmhclanhckablllf\1.7.2_0\img %AllUsersProfile%\Administrator\AppData\Local\Google\Chrome\User

Read More

Adware.4SharedDesktop

Updated: July 29, 2019 7:40:16 AM Type: Adware Infection Length: Varies Name: 4Shared Desktop Version: 4.0.2.6 Publisher: New IT Limited Risk Impact: High Systems Affected: Windows Behavior Adware.4SharedDesktop is a program that modifies browser settings and displays out-of-context pop-up advertisements on the computer. Technical Description When the program is executed, it creates the following files: %ProgramFiles%\4shared Desktop\desktop.exe %ProgramFiles%\4shared Desktop\Desktop32.dll %ProgramFiles%\4shared Desktop\license.txt %ProgramFiles%\4shared Desktop\readme.txt

Read More

Backdoor.Wellmess

Discovered: November 04, 2019 Updated: November 04, 2019 4:41:36 PM Infection Length: Varies Systems Affected: Windows Backdoor.Wellmess is a Trojan horse that opens a backdoor on the compromised computer. Technical Description The malware must be manually installed. When executed, the malware contacts one or more command and control (C&C) servers for instructions that may include uploading and downloading files,

Read More