WebShieldService.exe

Web Shield Service

Parallel Lines Development, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application WebShieldService.exe by Parallel Lines Development has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Parallel Lines Development, LLC  (signed and verified)

Product:
Web Shield Service

Version:
1.0.0.0

MD5:
a196983e2737af076fa0742855cf0fd9

SHA-1:
da1251699a0ec1caa71e1003d3a54a9566289d14

SHA-256:
cbcf3e55cb821b812a977a997e707269413e9d3d81d35aceb5a665febd73b95a

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/25/2024 12:19:14 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
16.12.21.21

File size:
50.9 KB (52,096 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Parallel Lines Development, LLC 2014

Original file name:
WebShieldService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\webshield\webshieldservice.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/5/2013 8:00:00 AM

Valid to:
6/6/2014 7:59:59 AM

Subject:
CN="Parallel Lines Development, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Parallel Lines Development, LLC", L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
064A26D7B85E090E11BEBC6B460594A8

File PE Metadata
Compilation timestamp:
1/9/2014 8:21:16 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xC46E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
41.5 KB (42,496 bytes)

Remove WebShieldService.exe - Powered by Reason Core Security