Click on screenshot to zoom
Danger level 8
Type: Adware
Common infection symptoms:
  • Annoying Pop-up's
  • Connects to the internet without permission
  • Installs itself without permissions
  • Slow Computer
  • Slow internet connection
Other mutations known as: is a rogue domain (aka website) related to the AV Security Suite rogueware. This corrupt website acts as a system scan, one which will only produces false results – all of which claim that the PC in question is infected with malware. The user will then be bombarded by pop-up messages, urging the purchase of the full version of AV Security Suite.
Word to the wise: Do not click on anything produces and do not fall for its tactics of foul-play. Remove and AV Security Suite immediately using an updated malware remover. is further regarded as a dubious malware application, which may act as spyware on an infiltrated computer system. is also regarded as a process that belongs to an advertising program affiliated with the rogue application: Anti-Virus Elite. monitors the computer system user’s browsing habits and may distribute the gathered data back to the author\'s servers, for analysis. also prompts advertising pop-up messages. is a security risk and should be removed from any computer system is has infiltrated.

Also considered by many experts as Cloaked malware, is capable of performing the following behavior on an infected PC:

* Changes the Internet Explorer Search Page
* Creation and Registration of a Browser Helper Object in Internet Explorer
* Registers a Dynamic Link Library File
* Deleted as a process from disk
* Created as a process on disk
* Registered as a Dynamic Link Library File
* Allows parasites associated with the file to operate invisibly in the background
* May record your credit cards, bank passwords and other personal information
* Parasites operate on your PC while malicious file is present on the system tends to enter into a computer system via dubious scripts, embedded in JavaScript or VBS, however there are other ways the infection can enter into a system, via:

• Operating system and web browser exploits
• Unsafe Internet surfing practices
• The downloading and installing of Freeware and Shareware
• The use of Peer-to-peer (P2P) applications
• Visiting questionable web sties

The Windows registry stores highly important system information, such as system preferences, use settings, installed programs’ details, as well as additional information about applications which automatically run on start-up of the machine. This is a huge reason why malware of all sorts target the registry files, as it adjusts its functions so that it is automatically launched every time the user starts up their PC.

Editing the registry can be quite a daunting task, especially for those users who are not computer experts. Therefore it is always recommended to perform a thorough backup of all data on the infected system, this way allowing for reinstallation if so needed.

The most important thing to remember is that is not to be trusted – and one should NOT visit and its affiliate sites at all!

Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.