Description is a malicious website that ESG PC security researchers have linked to a variety of known malware threats and rogue security programs. Rogue security programs associated with are fake security applications designed to take over your computer, cause deliberate damage to your operating system and then force you to pay, in order to remove the very problems they caused. ESG PC security researchers strongly recommend against downloading anything from the website. In fact, even visiting this malicious website may cause your computer to become infected with malware. Components in are capable of injecting malware directly onto your computer by taking advantage of vulnerabilities in your Internet browser's and operating system's security.

How Attempts to Infect Your Computer System with Malware

Malware from the website will typically infect a computer system in one of two possible ways. Some users may stumble upon by accident. Believing to be a legitimate website, they may download one of the many rogue anti-spyware applications advertised on This usually results in pop-up windows and a fake malware scan that claims to run on your computer system. While experienced computer users will quickly identify's fake scan for what is, many visitors to this malicious website fall for this scam, downloading malware in the process. However, it is not necessary to download a rogue security program in order to become infected. According to ESG PC security researchers, the website contains dangerous scripts and corrupted advertisements, which take advantage of security vulnerabilities in JavaScript or Adobe Flash, in order to cause their victim to become infected with a Trojan or other malware. Once a victim has become infected with malware from, the risk for identity theft, data theft, credit card fraud or additional malware infections is exponentially increased. This is why deleting malware from should be a top priority.

The Website is Associated with Browser Hijackers

Most malware related to the website is associated with browser-hijacking components. Some symptoms of browser hijackers related to include the following:

  • Browser hijackers associated with will often change your homepage to, as well as changing your Internet browser settings.
  • When entering a search onto a popular search engine, results may link to or similar websites, rather than to the actual search result.
  • Your Internet browser may force you to visit repeatedly after entering other addresses or clicking on any link.

Technical Information

File System Details creates the following file(s):
# File Name Detection Count

Registry Details creates the following registry entry or registry entries:
Registry key
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\PhishingFilter "Enabled" = '0'
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyOverride" = "
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyServer" = 'http='
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyEnable" = '1'