PUP.Optional.Zaxar

Short bio

This detection is for an ad fraud application that is offered to users as a gaming platform called Zaxar Game Browser.

Type and source of infection

PUP.Optional.Zaxar can reach user systems via:

Protection

Malwarebytes protects users from PUP.Optional.Zaxar by using real-time protection.

block PUP.Optional.Zaxar

Malwarebytes blocks PUP.Optional.Zaxar

Remediation

Malwarebytes can detect and remove PUP.Optional.Zaxar without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click mb3-setup-consumer-{version}.exe and follow the prompts to install the program.
  3. Then click Finish.
  4. Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  5. If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  6. When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  7. Restart your computer when prompted to do so.

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

The Exclusions tab includes a list of items to be excluded from scans. The items may include files, folders, websites, or applications that connect to the Internet, as well as previously detected exploits.

To access the exclusions in Malwarebytes:

  • Click on the Settings tab in the left pane.
  • Click on the Exclusions tab.
  • Click the Add Exclusion button.
  • Select the exclusion type Exclude a File or Folder and use the Browse button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary folder(s) that belong to the software.

If you want to allow the program to connect to the Internet, for example to fetch updates, add an exclusion of the type Exclude an application that Connects to the Internet and use the Browse button to select the file you wish to grant access.

Traces/IOCs

Associated files:

  • SHA256 d17846158db88ff666fb9df9951b069df65ca4ea34e0dbf50b160e6349e6a89e
  • SHA256 eaaea76c6b3d916126138c0726dc9cf33038343515157ad8895405bf8329c304
  • SHA256 f1adc0c9cfaae1e95432b77e267cbfcfe544046e5ca9aec6d349f26c63a9841c
  • SHA256 835a48c0e261835bed25f3b24851acb7bf8ca391c1dd68d04d0fa62a19f125f3

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language