Wherever you are,
we are always ready to help you with your PC troubles.

Encyclopedia Encyclopedia FAQ FAQ Video Guides Video Guides Ticket System Ticket System


Adware is a kind of software used to display advertising banners. It aims to overwhelm you with endless ads and pop-ups. Adware turns a profit for its author by means of showing adverts in the user interface of the software or on a toolbar on your computer or browser. But the methods of doing this can be intrusive and sometimes dangerous.

Aware is originally created for computers, but mobile devices can also have it.

Despite its annoyance, adware can gather your personal information, track your traffic and even record your keystrokes. The worst thing about adware is demolishing your security settings in order to monitor your online activities and show adverts where they normally must be banned. Hackers tend to use these security gaps for malvertising that is the use of online advertising to spread malware.

As a rule, adware doesn’t report about its appearing. You will have no signs of the program in your computer’s system tray. Adware can get into your computer using two ways. In one case, it can be included within some freeware or shareware programs. In another case, adware is a result of visiting an infected website.


Adware.Elex appear on a system being downloaded from the Internet. Usually user installs it as a tool that can detect and remove adware. Often it  disguises himself like a Java update or Adobe Flash installer. Once executed, it displays ads by injecting them into visited sites and pops up browser windows.


From this family also:

Delete TSvr.exe virus (Adware.Elex trojan)

iSafeNetFilter.sys trojan



A backdoor is the technique in which a system security mechanism is bypassed undetectable to access a computer or its data. As a rule, it is used to attack computers, spread copyrighted software or media, or compromise user’s device.

The main purpose of creating a backdoor is getting the “gap” to your system. However, attackers often use backdoors as a part of an exploit. Firstly, they attack PC with the backdoor, then design a worm or a virus to take an advantage from it.

Backdoors are really diverse if to say about their “invasion”. Some can be put in place by developers, while others appear accidentally as a result of programming errors. So backdoor is able to take the form of an installed program or to be a modification to an existing program.

But the most popular way of catching a backdoor is visiting suspicious sites and clicking on unknown links. In this case backdoor might take the login and password combination which give access to the system. The benefit of attacking your PC with backdoor is that it itself can help cyber criminals break into the infrastructure without being discovered.

Browser hijacker

Is a type of malicious software that modifies a web browser’s settings without a user’s permission. It redirects your start page to cyber criminal’s own start page, replaces search results with its own data. Browser hijacker aims to overwhelm your browser with undesirable adverts.

Some browser hijackers intend to gather such sensitive information as banking and e-mail authentication data. This becomes possible with the help of spyware, for example keyloggers. Browser hijacker is able to disrupt the registry of Windows systems.

Those, who already have browser hijacker on their computers, may see that their search is getting redirected to different websites or their homepage or search engine is changed without any permission. Slow load of webpages  or slew of pop-ups adverts can also be signs of browser hijackers activity.

The possibility to reverse browser hijacking is not permanent. Consequently, various software packages are used to prevent such modification.

Browser Miner

Browser-based cryptocurrency mining is gaining its popularity now. It’s a new method of cryprocurrency mining, that is injected into usual browser. The principle of works is very much like file-based cryptocurrency mining.

The main symptom is enormously high CPU usage from your browser in the Task Manager and web browsing goes not so fast as it used to be. What purpose of it? Browser miner uses power of your system to mine cryptocurrency for its creators.

This type of virus is very tricky, because you din’t suspect that your usual and reliable browser can be infected with any kind of virus.
Moreover it’s very easy to get infected if you download browser from suspicious sites. Program seems like a usual one, but malicious scripts are bundled in it.

Coin Miner

Coin miner is virus that turns your computer into a cryptocurrency mining without your knowledge. The main symptoms of it are overheating of system, very high CPU usage and overall computer performance is slowing down. Coin miners spread itself via emails attachment and bundling with free software. It has one purpose – to use most of your system’s power for mining and gaining profit.


Crack is another kind of pirated software. Crack represents adware with its main purpose to deliver adverts.Similar to Hack is going to disturb your privacy. They contain toolbars, multi offer-installers, unwanted applications, and so on.
Computer infected with Hack or Crack displays a sle of pop-ups with various commercial items or advertised software.
Hack and Crack go into the category of potentially unwanted software. Cyber criminals often use them to attack users, for example, password revealers.


FakeAV is an identification for Trojans that misleads the real performance of the security level. In typical situation users are told that their computer is at risk because of poor anti-virus tool. They start worrying about it and agree to buy suggested software.

In fact, there is no potentially fraud programs on your device, but you really believe that it is. And what’s more, you really think that purchased item will solve all your problems. As a rule, such trade transaction are conducted through your credit card that enables malicious users to get your financial information.

You will see no end until you purchase what you are asked to. Special programs are involved here to manage this. You typically come across with this threat when you visit websites with alerting notifications. You see the information about security risks and offer to get fake software. Of course, Trojan Horse is a perfect company for these bogus programs.

Users are familiar with FAKEAV as they keep visual payloads. Then, they see messages about malware infection. Only the calmest ones can avoid panicking. In real life people pay money for the fake antivirus tool and relax. Unfortunately, it is the beginning of invasion.


Fraud stands for hacking, monitoring the traffic and stealing information. Criminals use all these methods for own benefits. In the form of hacking fraud allows the hacker to get a remote access to user’s computer even if it is protected. If monitoring takes place, user’s passwords, credit card details, and other types of sensitive information is stolen.

Online fraud is a type of electronic crimes aimed to get monetary benefits through stealing user’s data. Fraud is intended to alter corporate or individual information to obtain gains. It can hack an OS to get passwords or data. Suggesting to buy bogus products or services online is a typical activity for the fraud.

Users are at risk to lose their financial details, too. Typical situation is alerting you with a notification that your phone will be disconnected as you have an unpaid bill. They are going to ask you purchase over the phone, otherwise, your line will be invalid. In fact, they are not able to do so. Be really careful about it.Don’t give cyber criminals opportunity to deceive you.

Hack Tool

Hack relates to different versions of pirated software. Crack represents adware with its main purpose to deliver adverts. Both of them are going to disturb your privacy. They contain toolbars, multi offer-installers, unwanted applications, and so on.
Computer infected with Hack or Crack displays a sle of pop-ups with various commercial items or advertised software.
Hack and Crack go into the category of potentially unwanted software. Cyber criminals often use them to attack users, for example, password revealers.


short for malicious software, is a computer program intended to do harm to your computer.  All kinds of threats referring to hostile or intrusive software and malicious programs can be called malware.

Typically, viruses and Trojans are the most well-known computer threats that can be referred to malware. Among malwares adware, backdoors, ransomware, rootkits, scareware, spyware, Trojans, viruses and worms can be distinguished.

You can come across with such forms of malwares as executable codes, scripts, active content, and other software.

Malware obtains its profits through strong advertising (adware), scamming and defrauding (ransomware), stealing personal information (spyware, keyloggers) and spreading non-consensual materials (zombie computers).

Your computer can be compromised without a permission with the help of malicious software. Someone can steal your private data or have access to your credit card details, creating a backdoor to your computer.

Malware can be automatically download through drive-by-downloads without your approval. A USB drive can also deliver malware. There are emails contain malicious links or attachments, so it is one more way to get a malware on your computer.


A fake “Internet Security Pack” message pretending to be a peaceful notification. It says there are security patches for Microsoft Outlook and Internet Explorer. And in fact, it contains a malicious worm inside.
The files in this message are packed in a weird manner. All users, who maintain at least basic computer skills, will notice that there is something strange with this message.
As usual, Pack-Software is used to compress files with the aim to increase disk space. However, this software is able to compress trojans and worms, too. Malware becomes hard to detect in the same way.


Patch is a file designed to update or fix a computer program, operating system. Usually, it’s a file with .exe extension, that not only “improves” your software or activates it without key, but launches unknown processes as well. Agree, developer of such patches are not working on patch file only to be helpful, they have own malicious purposes.

It is a kind of Trojan that changes system files and infects the system. What’s more, it is able to modificate system components through the parts of its own code. It aims to use particular options of the original file for own purposes. Components that tend to be patched most of all are:
• winlogon.exe
• wininet.dll
• kernel32.dll
• iexplore.exe
• services.exe.
Users will have no special notifications about the threat if they don’t use anti-malware scanner. This malicious software is not very symptomatic as it doesn’t show itself. So, the presence of the Patch may be hidden for a long time. The only way out is anti-virus software. It will manage to find and remove Patches.

PUP (Potentially Unwanted Program)

A potentially Unwanted Program, abbreviated as PUP, is a software that may be unwanted on your computer. It installs toolbars and has unpredictable purposes about your computer.

PUP is slightly not the same as malware as it doesn’t have a goal to destroy your operating system or steal sensitive information. In most cases PUPs are marketing tools that get to your computer with the help of social engineering.

However, PUPs might be harmful for your computer as they contain adware, spyware and dialers, that aim to disturb your privacy and irritate you.

The main diverse between PUP and malware is that the first one is downloaded with users agreement. In other words, PUP is almost legal as people give them a permission for installation. This situation is common for those, who want to download a program from the Internet, but refuse to read the download requirements. As usual, malicious software is attached to the program that users want. Thus, both get to your computer, and people fail to know what else has been obtained.


PWS is a kind of a Trojan intending to steal sensitive information. It is famous around the Web as a financial data thief. It is haunting bank logins and credit card information.
What PWS is going to do on your computer:
• Download and install more malicious software.
• Do frauding activities.
• Monitor your keystrokes and the sites you visit.
• Send various data about your computer to the remove user.
• Make a remote access to your computer possible.
• Show you advertising banners.
• Turn random web page text into hyperlinks.
• Recommend you to install fake software.
• Prevents start of different programs.


Ransomware is a type of malicious software that blocks your computer till you pay money. Users can’t use their device as the screen is locked, files are not available to use without a special unlock code. And the sums of money usually depend on the attackers’ greed.
Developers of ransomware meet the modern standards and create a new version of malware that is called crypto-ransomware. The main diverse is forcing victims to pay through online payments. To do this, users have to buy digital currency which costs a lot.
This type of malware really takes care of its “clients”. Users are notified about the ransom, they are given instructions how to encrypt their files. And the main motivation for cyber criminals is money. And the chances to identify hackers are minimum as everything is going on online.


Riskware is legal software that is not developed to carry a direct and explicit threat to the user, but allows attackers to access personal information, start or stop computer processes or services. These programs have legal distribution. They are used in daily work by system administrators, as a rule.

Why is riskware detected as malicious software? The fact is that some of these programs have functions that can harm the user under certain conditions. Riskware can block access to your data, delete it, copy or modify information, disrupt the OS or computer networks. That is why it is defined as potentially dangerous software.

In most cases plenty of legitimate programs confuse users when they decide which software might cause harm to their computer. Malicious users install riskware without your knowledge and they are able to use your sensitive information at any time.

Riskware tends to attach to the program that is not malicious by itself, but may have identified gaps. Malicious programs exploit these gaps easily. To function properly, riskware programs need to have access to critical system resources.

Not only that programs, which intend to bring risk to the device, are considered to be riskware. The lack of providing functionality in some software allows to claim the program riskware.

Rogue Software

Rogue is a form of malicious software that has an intention to take your money. It cheats users and makes them believe that there is a virus on their computers. Next step is to manipulate users into paying money for a fake malware removal tool. In other words, rough is a kind of ransomware.

Rogue software tends to use malware to advertise or install itself. Users are mainly confused with rough behaviour as they think it is a Trojan.

There are different forms of this Trojan: a browser toolbar, a screensaver, a free online malware scanning service, a multimedia program supposedly necessary for viewing a certain clip, etc. As a rule, they install a trial version that has a ransomware attached to it. The Trojan starts alerting the user that his device has been infected with a virus or it may provide other unwanted actions. The user is recommended to download a fake antivirus software.

Once installed, it becomes hard to delete the fake antivirus from user’s device. Rogues aim to disrupt system security and firewall tools, shutting them down and modifying their registers.


A rootkit is a type of software designed to hide the fact that an operating system has been compromised. The term was made by combining two words “root” and “kit”. Previously, rootkit represented a collection of tools and made administrative-level access to a PC or network possible. Root referred to the Admin and Kit to the software components that brought the tool action.

The rootkit is able to monitor traffic and keystrokes, it can make a loophole in your system, so called backdoor. If you get a rootkit on your PC, your log files can be changed and existing system tools, too.

Rootkits themselves are not dangerous. But they allow different other viruses to hide without being discovered. Attacker can install it only if he has access to the root account. This is possible in case of using an exploit or obtaining the password.

Rootkits are activated before the OS is booting up. That makes them hard to detect. In such a way rootkits allow cyber criminals to access and use the targeted device.


Spyware is a kind of malicious software that can cause such problems as gathering your personal information or asserting control over a device without user’s knowledge and monitor log browsing activity and keystrokes. Spyware refers to tracking software.

Spyware is able to redirect you to web pages you didn’t want to visit. It can capture your passwords, credit card details and everything else you wouldn’t like to share. What’s more, Spyware can “hijack” your computer and use it to send out spam or viruses to other people.

Crushes, slow work of the Internet, pop-ups and the situations when some programs, which used to work with any kinds of troubles, suddenly start function badly may say you have a spyware on your computer.

If you download some unknown programs, games or something like that offered as free from the Internet, there is a risk to infect your computer with spyware. One more way is to receive an unknown email with a malicious link in it.

Users typically don’t know about spyware presence, and it gathers internet interactions, passwords and other valuable data.


Susp is a sort of process that is going on because of a dangerous virus. This suspicious activity is detected on user’s IP and marked as harmful one.

As a rule it starts somewhere it shouldn’t be at all. It may be a fold to run this suspicious activity. Such activities are obviously undesirable in your system as their actions are unpredictable.
In most cases suspicious activity gives signals that your computer is infected. Tre reason of the infection is malicious software. One of your files may be malicious or you can have a virus on your computer.
We strongly recommend to detect and delete Susps as they disrupt the work of your system.


A Trojan horse, or Trojan, is any malicious computer program which aims to hide its true intentions. Trojans pretend to be legitimate software. However, it tries to mislead you that it is useful and helpful software, a Trojan is created to steal your data, take control over user’s device and cause harm to your device and privacy.

Some form of social engineering confuses users with loading and executing Trojans on their systems. Once they have been activated, Trojans let malicious users monitor your traffic, steal your personal information, and get backdoor access to your computer. Deleting, blocking, modifying, and copying data, and  disrupting computer performance are typical actions which follow Trojans installation.

Trojans can’t self-replicate, so they are not able to multiply themselves as computer viruses and worms.

In most cases Trojans prefer to hide their presence on your computer, collecting sensitive information, making loopholes in your security. As a result, they may take control over your system and lock you out.


Virtool is nothing more than an ordinary malware tool that infects the core of Windows. This threat manages to complete own plans about your system taking control over it.
Once occupied your system, it does various commands from attacker. Such commands are monitoring information about system settings, network configuration, and so on. Hackers will use this data for providing the attack.
Malicious code is the key reason of infection your computer with VirTool. The way of deployment determines the source of the Trojan. Users are deceived with spam letters from fake institutions. The main trick is to persuade users to open attached file. In most cases it really works.
VirTool is poor for symptoms. It makes its wet work deeply in the background.
VirTool:Win32/VBInject occasionally connects to a remote host to execute tasks like the following:
• Alerts hacker about the new infection
• Transfers gathered data from the attacked computer
• Downloads and executes extra files
• Does the tasks from a malicious user


Virus is the entity skipping from one user to another. It is able to generate itself a lot of times. For doing this, it needs a host cell that is an infected file or doc. It cannot replicate without it.

Virus is known as a type of harmful code or program written to penetrate the computer system and spread all over the network infecting all that is possible. Firstly, it attaches to legal software that supports macros. Then, it modifies existing code with own parts and harms the computer. Finally, you have your data corrupted and destroyed.

To get rid of viruses your computer needs a powerful anti-malware tool. Virus is dangerous as it may hide for a long time showing no symptoms. And you will see the consequence of its presence in form of pop-ups, modification of your data, losing your personal information, and so on.


Worm is one more type of malicious software. It gets into the OS to spread a malicious code. Worms don’t have a goal to infect one PC. They duplicate themselves a lot of times and spread via a network. In such a way they can infect a home network or office local network in short period.

Worms spread finding a vulnerability of the target system or with the help of social engineering to mislead users into executing them. This gap allows warm to take benefits from information-transport or file-transport features and worms can travel easily.

Users usually confuse worms with viruses because both of them self-replicate and cause the same type of damage. However, the first ones don’t need hackers’ guidance.

Worms don’t make harm to your PC but they are able to install backdoors on PC when hackers activate them. They use networks to spread copies of the malicious code to different other computers and start deleting files and sending documents via email.

Open a New Ticket

Please fill in the form below to open a new ticket.

Help Topic:*

Email Address:*

Full Name:*

Phone Number:


Ticket Details

Please Describe Your Issue

Issue Summary:*

Operating System:*

Installation ID:

Issue Details:*



Enter the text shown on the image