Yoursearching.com
Posted: November 16, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Ranking: | 4,210 |
|---|---|
| Threat Level: | 5/10 |
| Infected PCs: | 50,304 |
| First Seen: | November 16, 2015 |
|---|---|
| Last Seen: | March 6, 2025 |
| OS(es) Affected: | Windows |
If your default homepage suddenly changes to Yoursearching.com, then chances are there is a browser hijacker in your Web clients. The site looks plain and simple, which explains why it may not attract your attention initially. However, you should leave it immediately because the platform is not completely safe. Yoursearching.com looks like popular search engines. It resembles Google greatly to confuse the PC user. You may even detect the 'Web,' 'Images,' 'Videos' and 'News' database directories in the top left corner. The search field itself looks oddly familiar. Of course, the Google logo is absent because otherwise it may be the reason for legal disputes about copyright infringement. In addition to visual similarities, Yoursearching.com seems to borrow most of its results from Google directly. The problem is that the suspicious site manipulates them. Yoursearching.com adds above the sites sponsored links that match the criteria most accurately. There is nothing unique to this advertising activity: the developers of Yoursearching.com receive the corresponding commissions whenever they generate page impressions on the partner sites. However, the process may lead to two kinds of problems. First, visiting platforms that don't correspond to your terms may waste your time as these sites may not offer what you need. The second reason not to use Yoursearching.com concerns to the legitimacy of promoted domains. It is possible for some of them to host unsafe software or undertake various hoaxes. Since yoursearching.com doesn't offer a single feature that trustworthy engines don't have, it is advisable not to use it and to delete the harmful extension related to it.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%TEMP%\in2A6C8B5A\08946CC7_stp\5218_cornl_yoursearching.exe
File name: 5218_cornl_yoursearching.exeSize: 533.82 KB (533824 bytes)
MD5: 8e5cbdf9638cacf28df55f265a89d0c2
Detection count: 83
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in2A6C8B5A\08946CC7_stp
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\1457966431078\itr2_yoursearching.exe
File name: itr2_yoursearching.exeSize: 705.24 KB (705248 bytes)
MD5: cd32def025fe7297b93d14ca5f49e75e
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\1457966431078
Group: Malware file
Last Updated: March 30, 2016
C:\Users\<username>\AppData\Local\Temp\B860526D-AB7E-4E18-BEEF-6810FC0D922D\itr_yoursearching.exe
File name: itr_yoursearching.exeSize: 692.44 KB (692448 bytes)
MD5: 36e1a18d7fbc2a2ffb6cee2c0ce4f4f8
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\B860526D-AB7E-4E18-BEEF-6810FC0D922D\itr_yoursearching.exe
Group: Malware file
Last Updated: June 15, 2022
%TEMP%\in0D9F241E\4BE67A4C_stp\5155_cornl_yoursearching.exe
File name: 5155_cornl_yoursearching.exeSize: 533.82 KB (533824 bytes)
MD5: d0b39745d178b7de98c4bdb34a2f5b8c
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in0D9F241E\4BE67A4C_stp
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\in6804F1F7\2E56B347_stp\5261_cor_yoursearching.exe
File name: 5261_cor_yoursearching.exeSize: 768.83 KB (768832 bytes)
MD5: 8f96cb5a5a1aa3ae50b7a1dfde4a96b1
Detection count: 34
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in6804F1F7\2E56B347_stp
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\in364BB553\6330E6AC_stp\5278_corna_yoursearching.exe
File name: 5278_corna_yoursearching.exeSize: 350.45 KB (350456 bytes)
MD5: c17860c2d8c12301a68d3704dfbe78da
Detection count: 31
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in364BB553\6330E6AC_stp
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\72f24519-c19e-4751-b79b-c818e4caf38b\llys_yoursearching.exe
File name: llys_yoursearching.exeSize: 563.37 KB (563376 bytes)
MD5: dc4bf12900103e744e8b5ccc0a6c0cd7
Detection count: 30
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\72f24519-c19e-4751-b79b-c818e4caf38b
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\in6B1B38D3\12102863_stp\5217_cor_yoursearching.exe
File name: 5217_cor_yoursearching.exeSize: 531.09 KB (531096 bytes)
MD5: ac48dab72fbc59851ba1ba72571d5c41
Detection count: 25
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in6B1B38D3\12102863_stp
Group: Malware file
Last Updated: March 30, 2016
%TEMP%\in1A1AEB34\6D2F6308_stp\5276_cor_yoursearching.exe
File name: 5276_cor_yoursearching.exeSize: 350.45 KB (350456 bytes)
MD5: dc82cfc12f18772f50d72286050fdf5b
Detection count: 14
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\in1A1AEB34\6D2F6308_stp
Group: Malware file
Last Updated: March 10, 2021
C:\Windows\Temp\_avast_\ws10A5FC18.dat
File name: ws10A5FC18.datSize: 194.22 KB (194224 bytes)
MD5: 1359989b08d8b88065733f92cf376791
Detection count: 9
File type: Data file
Mime Type: unknown/dat
Path: C:\Windows\Temp\_avast_\ws10A5FC18.dat
Group: Malware file
Last Updated: June 22, 2022
C:\Users\<username>\AppData\Local\Temp\component.exe
File name: component.exeSize: 753.4 KB (753400 bytes)
MD5: 91e6642d4341fae0d952b142e925d104
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: C:\Users\<username>\AppData\Local\Temp\component.exe
Group: Malware file
Last Updated: September 10, 2022
%TEMP%\is-BH3V8.tmp\brd_yoursearching.exe
File name: brd_yoursearching.exeSize: 189.66 KB (189664 bytes)
MD5: fa6819b291844a2de008661d78d7209e
Detection count: 7
File type: Executable File
Mime Type: unknown/exe
Path: %TEMP%\is-BH3V8.tmp
Group: Malware file
Last Updated: September 4, 2020
More files
Registry Modifications
File name without pathhttp_www.yoursearching.com_0.localstoragehttp_www.yoursearching.com_0.localstorage-journalwww.yoursearching[1].xmlRegexp file mask%HOMEDRIVE%\yoursearching.xmlHKEY..\..\..\..{RegistryKeys}Software\Microsoft\Internet Explorer\DOMStorage\yoursearching.comSOFTWARE\Wow6432Node\yoursearchingSoftwareSOFTWARE\yoursearchingSoftwareHKEY_LOCAL_MACHINE\Software\[APPLICATION]\Microsoft\Windows\CurrentVersion\Uninstall..{Uninstaller}yoursearchingyoursearching uninstall
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.