We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Aliases: No associated aliases
Windows Defender detects and removes this unwanted software.
Usually, this threat bypasses the normal prompts or dialogs that ask for your consent to install browser extensions, toolbars, or add-ons into the Internet Explorer and Google Chrome web browsers.
It also modifies browser shortcut files. When launched using these modified shortcuts, the browsers open certain websites that you may not intend to visit.
This threat is part of a suite of malware and unwanted software families that is also called "Fireball". Read about this threat group in the Windows Security blog:
Find out more about how and why we identify unwanted software.
This program poses a high threat to your PC.
Use the following free Microsoft software to detect and remove this threat:
- Windows Defender for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
You should also run a full scan. A full scan might find other, hidden threats.
Use cloud protection
Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10.
Go to All settings > Update & security > Windows Defender and make sure that your Cloud-based Protection settings is turned On.
Get more help
If you’re using Windows XP, see our Windows XP end of support page.