RiskWare.MisusedLegit

Short bio

RiskWare.MisusedLegit is Malwarebytes’ generic detection name for legitimate files that are suspected to be used for malicious purposes. Often these files will be detected because they are placed in another directory or folder than they would be under normal circumstances.

Type and source of the infection

Riskware, in general, is a detection for items that are not strictly malicious, but pose some sort of risk for the user in another way.

Programs might be termed as “riskware” because they:

  1. Violate the terms of service (ToS) of other software or a user platform.
  2. Block another application or software from being updated and patched.
  3. Might be illegal to use in the users’ country.
  4. Could be used as a backdoor for other malware.
  5. Are indicative of the presence of other malware.

RiskWare.MisusedLegit falls under the last two categories. A detection of this kind always should be reason for further investigation, unless there is a legitimate explanation for the detection.

RiskWare.MisusedLegit is often part of the toolkit an attacker has placed on the affected system.

Protection

Malwarebytes protects users from RiskWare.MisusedLegit by using real-time protection.

block RiskWare.MisusedLegit

Malwarebytes blocks RiskWare.MisusedLegit

Home remediation

Malwarebytes can detect and remove RiskWare.MisusedLegit without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Business remediation

How to remove RiskWare.MisusedLegit with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menuNebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

Nebula detections

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

Nebula Quarantaine

Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

  • Open Malwarebytes for Windows.
  • Click the Detection History
  • Click the Allow List
  • To add an item to the Allow List, click Add.
  • Select the exclusion type Allow a file or folder and use the Select a folder button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary files or folder(s) that belong to the software.

If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.

Select your language