Gridinsoft Security Lab

What is Detailed analysis of Trojan:Win32/LsassDump.A?

Trojan:Win32/LsassDump.A

Stephanie AdlamOct 1, 20245 min read

Trojan:Win32/LsassDump.A is a detection that targets the LSASS process. Similar to other heuristic detections, it focuses on behavior rather than…

Web Companion Unwanted Program Analysis & Removal

Adaware Web Companion

Stephanie AdlamSep 20, 20245 min read

Web Companion is an unwanted program works as a web protection tool. It appears unexpectedly, after the installation of a different program, and tries to make the user pay for a “premium” version. Questionable effectiveness and bloated results are what makes it not recommended to use. Pseudo-effective applications are not severely dangerous, but they can […]

What is PUA:Win32/MyWebSearch?

PUA:Win32/MyWebSearch

Stephanie AdlamMay 1, 20245 min read

PUA:Win32/MyWebSearch is a Microsoft Defender detection that refers to an unwanted browser modifier. This application adds add-ons and toolbars that in fact take control of the web browser, redirecting search queries and causing advertisements to appear. It usually spreads as add-on software in bundles and is often installed without the user’s explicit consent. PUA:Win32/MyWebSearch Overview […]

Broom Cleaner Analysis and Removal

Broom Cleaner App (Virus Removal)

Stephanie AdlamApr 23, 20245 min read

Broom Cleaner is an unwanted program that at first glance seems to be a safe tool for cleaning and optimizing your computer. However, in reality, once installed, it performs unwanted changes to system settings, shows ads, or even installs additional unwanted programs. This can cause significant disruption to your computer and leak confidential information. Let’s […]

What is Virus:Win32/Expiro?

Virus:Win32/Expiro

Stephanie AdlamOct 3, 20244 min read

Virus:Win32/Expiro is a detection of Microsoft Defender that refers to a malware with backdoor capabilities. It allows attackers to control the compromised system, spy on it, install other malware, manipulate systems, and create botnets. Expiro malware is distributed under the guise of legitimate software. Once the computer is infected, it can spread to other executable […]

PC Accelerate Removal guide

PC Accelerate

Stephanie AdlamSep 20, 20245 min read

PC Accelerate is a questionable software that is presented as a useful utility designed to optimize your computer’s performance. In reality though, this software can do more harm than good. Installing such applications often leads to unintended consequences, from system slowdowns to serious security threats. What is PC Accelerate? PC Accelerate is a potentially unwanted […]

URL:Scam Detection Explained

URL:Scam (Avast)

Stephanie AdlamNov 27, 20245 min read

URL:Scam is a generic detection name of a dangerous website, that appears in several antivirus engines. It may appear during routine Internet browsing, as well as a pop-up after opening a link from a document or a chat. This detection may refer to a wide variety of unsafe websites, as well as be a false […]

What is Walliant? Virus Removal

Walliant App

Stephanie AdlamJun 27, 20246 min read

The Walliant application is a Potentially Unwanted Application (PUA). It is promoted as an app that automatically changes desktop wallpapers. Though it in fact has hidden functionality: hijacking your bandwidth, it works as proxyware. This can eventually lead to rather unpleasant consequences. This unwanted app has a website that allows users to download it. However, […]

What is SMApps?

SMApps Virus

Stephanie AdlamSep 20, 20245 min read

SMApps is a malicious program that aims at spreading illegal promotions. It mainly attacks browsers by changing settings and redirecting search queries from Google to suspicious sites. Possible distribution methods are standard: malicious adverts and dodgy sites with hacked software. This malware uses different detection evasion, anti-analysis, and persistence tactics. Although primarily positioned as adware, […]

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Stephanie AdlamApr 6, 20244 min read

Hunt ransomware is a new sample of the Dharma/CrySis ransomware family that appeared on April 5, 2024. This malware aims at encrypting the files and asking a ransom payment for their decryption. It unselectively targets both home users and corporations, correcting the ransom depending on the target. Jakub Kroustek was the first to discover this […]

Apple Silicon GoFetch Flaw Discovered, No Patches Possible

GoFetch Vulnerability in Apple Silicon Uncovered

Stephanie AdlamMar 26, 20245 min read

Researchers uncovered a vulnerability in Apple Silicon processors, dubbed GoFetch. It allows attackers to extract secret keys from Mac computers while performing widespread cryptographic operations. Notably, it is practically impossible to patch the flaw as it stems from the microarchitecture of the processor. Apple Silicon Vulnerability Allows Hackers to Extract Encryption Keys Researchers have discovered […]

What is Dragon Angel extension?

Dragon Angel Malicious Browser Extension

Stephanie AdlamMar 22, 20245 min read

Dragon Angel is a browser extension that functions as a hijacker malware. It redirects users to promoted search engines or websites. These redirects ruin the process of browsing and can lead to irrelevant or potentially harmful content or malware distribution. Dragon Angel Overview Dragon Angel is a malicious browser extension that can appear in Chrome […]

What is Taskbarify?

Taskbarify Unwanted Application

Stephanie AdlamAug 20, 20245 min read

Taskbarify is unwanted software (like a Movidown)that claims it is a tiny little Windows tweaker. However, it also turns the device into a proxy server without the user’s knowledge. Let me show you what is so dangerous about this utility, and how to remove it. What is Taskbarify? Taskbarify is a Windows utility classified as […]