WebShieldService.exe

Parallel Lines Development, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application WebShieldService.exe by Parallel Lines Development has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Web Shield”.
Publisher:
Parallel Lines Development, LLC  (signed and verified)

Version:
1.0.0.0

MD5:
93a2bdbf879bac804907b34a983f7df6

SHA-1:
70e04560b532233613651837f1982cfb736246e7

SHA-256:
a7d1ee8684558377573489521216a48ef7f0c5c246f35e6e3cfb120812e0d204

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/24/2024 1:33:03 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.2.25.11

File size:
45.9 KB (46,976 bytes)

Product version:
1.0.0.0

Original file name:
WebShieldService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\webshield\webshieldservice.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/5/2013 7:00:00 AM

Valid to:
6/6/2014 6:59:59 AM

Subject:
CN="Parallel Lines Development, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Parallel Lines Development, LLC", L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
064A26D7B85E090E11BEBC6B460594A8

File PE Metadata
Compilation timestamp:
12/6/2013 8:16:03 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xB34E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
37 KB (37,888 bytes)

Service
Display name:
Web Shield

Service name:
WebShield

Description:
Provides system level support for Web Shield.

Type:
Win32OwnProcess


Remove WebShieldService.exe - Powered by Reason Core Security