Threat Database Potentially Unwanted Programs Quick Auto Refresh Chrome Extension

Quick Auto Refresh Chrome Extension

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 23
First Seen: May 18, 2021
Last Seen: November 23, 2022
OS(es) Affected: Windows

The Quick Auto Refresh Chrome Extension from h[tt]p://snyangqi[.]com/ is promoted to do what its name suggests — force pages in Google Chrome to update at set intervals. Google's browser is configured to load the pages in the background tabs, but some users prefer the browser to load the tab after it is opened and there are those who like the browser to refresh the background pages. The default background page management in Chrome and other browsers serve to improve performance and decrease the amount of RAM the browser requires to run smoothly. However, installing the Quick Auto Refresh Chrome Extension may not result in significantly reduced performance, but your videos may stutter, and a lot of RAM may need to be allotted to the browser.

We have received reports that the Quick Auto Refresh Chrome Extension from h[tt]p://snyangqi[.]com/ performs browser redirects via h[tt]p://go2searching[.]com/qarctrl.php and several other domains registered at the 104.27.174.27 IP address. Computer security analysts warn that the Quick Auto Refresh Chrome Extension is an ad-supported program that may read your Internet history and the list of recent downloads to help affiliated marketers display better-suited commercials on your screen. You may notice that the Quick Auto Refresh Chrome Extension opens new tabs loaded with promotional materials and urges you to download and install trialware. That is how the creators of the Quick Auto Refresh Chrome Extension attempt to monetize their work by providing their product with a free-to-use plan. Unfortunately, the redirects to content on the 104.27.174.27 IP address might result in loading insecure resources. The Quick Auto Refresh Chrome Extension is perceived as a Potentially Unwanted Program (PUP), and AV shields may bring up security notifications that feature the following detection names:

  • Generic PUA BI (PUA)
  • Hacktool.Msil.Flooder!c
  • HEUR:HackTool.MSIL.Flooder.gen
  • RDN/Generic PUP.z
  • Trojan.MSILPerseus.D18F4D
  • malicious (moderate confidence)
  • malicious (moderate confidence)

Trending

Most Viewed

Loading...