SearchPixieBar installs a toolbar into the Internet Explorer without user consent. The SearchPixieBar seems to provide the possibility to search the web like the Google Toolbar does. But in reality the search option does not work and only advertisements will be displayed. Hijacking programs covers a range of malicious software. The most generally accepted description for browser hijacking software is external code that changes your Internet Explorer settings. Generally your home page will be changed and new favourites will be added that point to sites of dubious content. In most cases, the hijacker will have made registry changes to your system, causing the home page to revert back to the unwanted destination even if you change it manually.
SexTracker:
This is considered as a PUP (potentially Unwanted Program), and tracking cookie. This type of program is installed when a user downloads a “Free”; program that allows third party companies to place additional programs in the user's computer during the initial download. Additional Adware, Malware,and spyware may be downloaded at a later date as the original “Free” download's privacy policy does not cover what third party programs do.
SmithFraud-C.generic:
This is a Trojan designed to generate unsolicited pop-up advertisements. It will also change your desktop background and try to sell you a fake security program. Smitfraud has the ability to disable your antivirus programs. Therefore, if you wish to remove the Smitfraud virus, you must do so manually.
SpywareDetector:
This file is recognized by some to be Malware and Rogue. It is considered this as the purchase tactics used follows those of rogue program. This program is associated with MaxSecure.
Spyware.SahAgent:
SAHAgent is adware (advertising oriented spyware) for Microsoft Windows running Internet explorer. SAHAgent is used to collect and send a user's sensitive information, such as personal information and configuration information about the system back to a server. It can also collect browsing session information and send it back to the company's servers. SAHAgent redirects the browser of a victim to merchant sites and takes affiliate fees from them automatically.
StatCounter:
This is a low level tracking cookie, but it has the potential to be misused and may allow unrelated companies access to the information it collected from you without your consent.
PerformanceOptimizer:
Performance Optimizer is a misleading application that will pop-up fake scan reports. Performance Optimizer can be manually installed with users knowledge when it pretend as a useful program coming from a remote server. Errors will be detected during the scan and prompt users to fix it using the licensed version of the program. This rogue software will also modify Internet browser that will redirect visitors to unwanted web pages.
PlayPickle:
This is considered Adware based on the company's privacy policy items. 1) We collect two kinds of information (“Information”) through the Site. The first kind is information that can identify you as a specific individual – such as your email address (“PII”). (See “Collection of Personally Identifiable Information” below). The second kind of information is the kind of non-personally identifiable information (“NPII”) collected and stored automatically by many websites. It includes, for example, information about your Internet service provider, operating system, type of browser, geographic location, and pages viewed on PlayPickle. 2) We will share your personal information with third parties only in the ways that are described in this privacy statement. 3) The use of cookies by Third Party Advertisers or ad servers is not subject to this Policy, but is subject to those third parties’ respective privacy policies. If you have a question about such third parties’ privacy policies, you will have to go to their websites for more information and/or contact them directly.
PSW:Win32/Zbot:
PWS:Win32/Zbot is a password-stealing Trojan that monitors for visits to certain Web sites. It allows limited backdoor access and control and may terminate certain security-related processes.
PUM.Disabled.SecurityCenter:
PUM means potentially unwanted modification. Spyware can disable the security center or some power users decided to disable it on their own. If you haven't disabled security center monitoring yourself, then we would recommend fixing it.
PUM.Hijack.StartMenu:
PUM means potentially unwanted modification. This form of Spyware is capable of changing the way your computer starts, change your start menu and extract personal information from your system.
PUP.BitMiner:
This Trojan uses your computer to create fraudulent money transactions, it may also be used as a rouge security program and/or as a browser hijacking program aimed at altering or redirecting a web search. This Trojan is capable of exposing you to malicious sites and stealing your financial information. Immediate removal is highly recommended and most anti-virus programs will be able to remove the infection. If your system continues to run slow, or your internet browser is still malfunctioning, then a deeper cleaning may be needed.
PUP.Bundle.Installer.OI:
This malicious backdoor infection can infect your computer secretly.
Pup.FunWebProducts:
PUP's are generally adware infested, since I run with some let's just say 'underground advertising', they are usually just the titled software maybe with a tool bar. The toolbar just monitors your search behavior, and some of them insert relevant ads/media on the page you're viewing.
RightMedia:
Right Media spyware is software distributed by the online advertising company Right Media Inc., which enables users and ad networks to trade digital media. Once a Right Media program is downloaded, the program uses a cookie to track user activity. A Right Media cookie is a piece of text that is stored by a PC user's web browser. The cookie is sent by Right Media's web server to monitor and record the user's browser activity and then send information back to the server. Spyware cookies can send financial and identity information to a server for malicious purposes and are often used for marketing applications to analyze browsing trends and other statistics. Right Media spyware can result in a loss of privacy due to distribution of a user's browsing habits without his express permission. Right Media spyware can also slow down computer operation, cause applications to freeze, and interrupt Internet connections.
RiskWare.Tool.CK:
Riskware is computer software, which actually was not programmed and intended as malware, but has security critical functions. These functions can be used to start or stop computer processes or computer services. Riskware can also be defined as potentially dangerous software. Riskware can be executed and misused by malware and will be noticed in certain cases by antivirus software.
Rogue.AntiVirus2008:
Antivirus 2008, is a rogue program. It uses fake spyware results to entice the user to purchase the full version in order to continue protection and/or cleanup. Antivirus 2008 is usually promoted via a ZLOB/MediaAccess Codec installer found on many adult websites. You can also install it manually on the rogue website antivirus-scanner.com. The program may also display other third-party ads. Do not click on any link provided by Antivirus 2008, it also has the ability to regenerate itself after reboot and its “System scan” messages may continue pop up on your task manager.
Rogue.ErrorFix:
This program advertises itself as a registry repair tool. Unfortunately, the only thing the program does is present false security alerts in order to scare the user into purchasing the product. If the user does pay the fee, the program does not fix anything as it is not a valid repair program. The program will load a lot of fake pop-ups which are designed the user to purchase the product, that is the only thing the program is capable of completing. Remove this program from your system and reset your browser.
Rogue.ErrorSmart:
ErrorSmart is dangerous malware and a part of scam. It uses misleading advertising online to attract victims. Error Smart is dangerous computer parasite. It disables legitimate security tools and installs other malware files. The program loads exaggerated infection alerts with a purpose to scare people. Do not trust this application and remove it as soon as possible.
Rogue.Link:
Rogue.Link is a family of programs that claim to scan for malware and display fake warnings of malicious files. They then inform the user that they need to pay money to register the software in order to remove these non-existent threats. Reports of Rogue Antivirus programs have been more prevalent as of late. These are programs that generate misleading alerts and false detections in order to convince users to purchase illegitimate security software. Some of these programs may display product names or logos in an apparently unlawful attempt to impersonate Microsoft products.
Rogue.SecurityTool:
This Rogue Program is capable of entering your system by shielding its code from your anti-virus signature recognition program. The basic program code is to open portals so other malicious programs can infect your computer and will either by-pass or shut-down your current anti-virus program. Like many rogue programs, it will display false popup windows claiming you have serious virus threats that need to be removed for a certain price. The program, like many rogue programs, may be difficult to extract.
Rogue.WinAntivirus:
Dishonest antivirus software which tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected. Winantivirus is an rogue antivirus program that pretends to scan the system, and then displays false or exaggerated results. This rogueware is closely related to the XPAntivirus rogueware family.
Rogue.Win32/WinWebSec:
Rogue:Win32/Winwebsec is a family of programs that claim to scan for malware and display fake warnings of “malicious programs and viruses”. They then inform the user that they need to pay money to register the software in order to remove these non-existent threats. Win32/Winwebsec has been distributed with several different names. The user interface varies to reflect each variant’s individual branding.
Rootkit.Win32.PMax.gen:
Rootkit.Win32.Pmax.gen needs to be removed immediately from your computer. If you have this rootkit infection you need to disconnect your unit from the internet by unplugging the internet cable or turning off your wireless router. This will keep the hackers from entering and keep your files from being stolen. This rootkit infection will run in the background and will slow your computer down as it uses your systems resources. This infection is known to steal your personal passwords and financial information. It is recommended that you bring your unit to a reputable repair technician and immediately change all of your passwords, especially those you use for banking, email and social media. The longer you remain on-line with this infection the higher chance you have of obtaining more malicious programs and having more personal information hijacked.
Rootkit.Win32.TDSS:
This infection sets the drive to autoplay by creating autorun.inf file in its root directory. If the drive is shared across the network then other remote computers can be infected any time they try to access this share. Infection will disable Windows Update and Windows Help and Support features.
Rootkit.Boot.Pihar.B:
This is a Trojan horse. The code is designed to compromise the infected computer by creating a back door for hackers to use in order to enter the computer. The hackers utilize this doorway to perform operations such as keystroke logging, data theft, modification or deletion of files. Rootkit.Boot.Pihar.b uses a number of sourcing channels to spread itself. For example, it can be installed through software bundling, instant-messaging network, email attachments, websites containing executable content, etc.