FacebookTwitterLinkedIn

How to uninstall the MYWebWatch browser-hijacking application

Also Known As: MYWebWatch redirect
Damage level: Medium

What kind of application is MYWebWatch?

MYWebWatch is a browser-hijacking application discovered by our researchers during a routine investigation of dubious websites. Unlike most browser hijackers, which are extensions, MYWebWatch does not modify browser settings in order to generate redirects to promoted webpages. Instead, this app detects when a Web search is made and produces a redirect in response.

It is noteworthy that browser-hijacking software commonly has data-tracking functionalities, and this might apply to MYWebWatch.

MYWebWatch browser hijacker install folder

MYWebWatch browser hijacker overview

Typically, browser hijackers make changes to browser settings (e.g., homepages, default search engines, new tab/window URLs, etc.) to promote websites. However, the MYWebWatch application (installation location – C:\Users\[username]\AppData\Local\Temp\Microsoft\WebWatch) does not modify browsers. Instead, it detects when the Web is searched and generates a redirect to the endorsed site.

At the time of research, this app produced redirects leading through the guardflares.com fake search engine before landing on another – potterfun.com.

Most fraudulent search engines cannot provide search results, so they redirect to legitimate Internet search sites. Potterfun.com is an exception, but the search results generated by this webpage are irrelevant and may include sponsored, untrustworthy, deceptive, and possibly malicious content. It must be mentioned that MYWebWatch could produce different redirection chains.

Furthermore, browser hijackers often spy on users' browsing activity, and this might be true of MYWebWatch. Targeted information may include: visited URLs, viewed pages, searched queries, Internet cookies, usernames/passwords, personally identifiable details, finance-related data, and so on. The collected information can be shared with or sold to third-parties.

In summary, the presence of software like MYWebWatch on devices may result in system infections, severe privacy issues, financial losses, and even identity theft.

Note that before commencing with MYWebWatch's removal, as instructed in the guide below, its process must be terminated using Task Manager. It must be emphasized that this browser hijacker has to be eliminated thoroughly, including any files left in its installation folder.

Threat Summary:
Name MYWebWatch redirect
Threat Type Browser Hijacker, Redirect, Search Hijacker, PUP (Potentially Unwanted Program), PUA (Potentially Unwanted Application)
Detection Names (installer) Microsoft (Trojan:Win32/Wacatac.H!ml), Rising (Adware.Agent@XH.99F9 (CERT:9d2dlh/drc), Full List Of Detections (VirusTotal)
Detection Names (app) Bkav Pro (W32.AIDetectMalware.CS), MaxSecure (Trojan.Malware.300983.susgen), McAfee Scanner (Real Protect-LS!283AABE73D49), Microsoft (Program:Win32/Wacapew.C!ml), Trapmine (Suspicious.low.ml.score), Full List Of Detections (VirusTotal)
Promoted URL guardflares.com
Detection Names (guardflares.com) Bfore.Ai PreCrime (Malicious), Full List Of Detections (VirusTotal)
Serving IP Address (guardflares.com) 172.67.182.12
Rogue Process Name MYWebWatch (process name may vary)
Symptoms A program that you do not recall installing suddenly appeared on your computer. Users are forced to visit the hijacker's website and search the Internet using their search engines.
Distribution Methods Deceptive pop-up ads, free software installers (bundling).
Damage Internet browser tracking (potential privacy issues), display of unwanted ads, redirects to dubious websites.
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.
▼ Download Combo Cleaner
To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Browser hijacker examples

BlazeSearchSpeedyLookRapidFinderPrimeLookup, and SwiftSeek are just some of our latest articles on browser hijackers.

Software within this classification usually appears legitimate and harmless. It can also offer a broad range of useful functionalities; however, these features seldom work as advertised, and in most cases – they do not work at all. Remember that operational functions alone do not prove a software's legitimacy or safety.

How did MYWebWatch install on my computer?

We have found several scam pages using pirated movie and adult video download-themed lures to promote MYWebWatch. Other endorsement techniques are possible. In addition to various scam sites, browser hijackers can have "official" promotional webpages.

Most visitors access these pages via redirects caused by websites employing rogue advertising networks, intrusive ads, spam browser notifications, mistyped URLs, and installed adware.

Browser-hijacking software can also be bundled with ordinary programs. The risk of unintentionally permitting bundled content into the system is increased by downloading from dubious channels (e.g., freeware and free file-hosting websites, Peer-to-Peer sharing networks, etc.) and by treating installations with negligence (e.g., ignoring terms, skipping steps, using "Easy/Express" settings, etc.).

Intrusive advertisements proliferate browser hijackers as well. Once clicked on, some of these adverts can execute scripts to perform downloads/installations without user consent.

How to avoid installation of browser hijackers?

We highly recommend researching software and downloading it only from official/verified sources. Installation processes must be approached with caution, e.g., by reading terms, exploring possible options, using the "Custom/Advanced" settings, and opting out of all additional apps, extensions, features, etc.

Another recommendation is to be vigilant while browsing since fraudulent and malicious online content usually appears legitimate and harmless. For example, while intrusive adverts may look innocuous – they redirect to questionable and unreliable websites (e.g., scam-promoting, pornography, gambling, adult dating, etc.).

In case of continuous encounters with such ads/redirects, inspect the device and immediately remove all suspicious applications and browser extensions/plug-ins. If your computer is already infected with MYWebWatch, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate this browser hijacker.

Appearance of guardflares.com redirecting to potterfun.com (GIF):

MYWebWatch browser hijacker redirecting to via guardflares.com to potterfun.com (GIF)

Screenshot MYWebWatch browser hijacker's installation setup:

MYWebWatch browser hijacker installer

Screenshot of MYWebWatch browser hijacker's process on Task Manager ("MYWebWatch" – process name):

MYWebWatch browser hijacker process (MYWebWatch - process name)

Screenshots of deceptive websites promoting MYWebWatch browser hijacker:

Scam site used to promote MYWebWatch browser hijacker 1 Scam site used to promote MYWebWatch browser hijacker 2 Scam site used to promote MYWebWatch browser hijacker 3 Scam site used to promote MYWebWatch browser hijacker 4

Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:
▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.

Quick menu:

Removal of unwanted applications:

Windows 11 users:

Accessing Apps and Features in Windows 11

Right-click on the Start icon, select Apps and Features. In the opened window search for the application you want to uninstall, after locating it, click on the three vertical dots and select Uninstall.

Windows 10 users:

Accessing Programs and Features (uninstall) in Windows 8

Right-click in the lower left corner of the screen, in the Quick Access Menu select Control Panel. In the opened window choose Programs and Features.

Windows 7 users:

Accessing Programs and Features (uninstall) in Windows 7

Click Start (Windows Logo at the bottom left corner of your desktop), choose Control Panel. Locate Programs and click Uninstall a program.

macOS (OSX) users:

Uninstall app in OSX (Mac)

Click Finder, in the opened screen select Applications. Drag the app from the Applications folder to the Trash (located in your Dock), then right click the Trash icon and select Empty Trash.

MYWebWatch uninstall via Control Panel

In the uninstall programs window, look for "MYWebWatch" and other suspicious/recently-installed applications, select these entries and click "Uninstall" or "Remove".

After uninstalling the potentially unwanted application, scan your computer for any remaining unwanted components or possible malware infections. To scan your computer, use recommended malware removal software.

Remove rogue extensions from Internet browsers:

At time of research, MYWebWatch did not install any unwanted browser extensions, however, some unwanted applications can be installed together with additional adware and browser-hijacking extensions. In which case, continue with the removal guide below.

Video showing how to remove potentially unwanted browser add-ons:

Google Chrome logoRemove malicious extensions from Google Chrome:

Removing rogue extensions from Google Chrome step 1

Click the Chrome menu icon Google Chrome menu icon (at the top right corner of Google Chrome), select "More Tools" and click "Extensions". Locate all recently-installed suspicious extensions, select these entries and click "Remove".

Removing rogue extensions from Google Chrome step 2

Optional method:

If you continue to have problems with removal of the mywebwatch redirect, reset your Google Chrome browser settings. Click the Chrome menu icon Google Chrome menu icon (at the top right corner of Google Chrome) and select Settings. Scroll down to the bottom of the screen. Click the Advanced… link.

Google Chrome settings reset step 1

After scrolling to the bottom of the screen, click the Reset (Restore settings to their original defaults) button.

Google Chrome settings reset step 2

In the opened window, confirm that you wish to reset Google Chrome settings to default by clicking the Reset button.

Google Chrome settings reset step 3

Mozilla Firefox logoRemove malicious plugins from Mozilla Firefox:

Removing rogue extensions from Mozilla Firefox step 1

Click the Firefox menu firefox menu icon (at the top right corner of the main window), select "Add-ons and themes". Click "Extensions", in the opened window locate all recently-installed suspicious extensions, click on the three dots and then click "Remove".

Removing rogue extensions from Mozilla Firefox step 2

Optional method:

Computer users who have problems with mywebwatch redirect removal can reset their Mozilla Firefox settings.

Open Mozilla Firefox, at the top right corner of the main window, click the Firefox menu, firefox menu icon in the opened menu, click Help.

Accessing settings (Reset Firefox to default settings step 1)

Select Troubleshooting Information.

Accessing Troubleshooting Information (Reset Firefox to default settings step 2)

In the opened window, click the Refresh Firefox button.

Clicking on Refresh Firefox button (Reset Firefox to default settings step 3)

In the opened window, confirm that you wish to reset Mozilla Firefox settings to default by clicking the Refresh Firefox button.

Confirm your want to reset Firefox settings to default (Reset Firefox to default settings step 4)

safari browser logoRemove malicious extensions from Safari:

Removing browser hijackers from safari step 1 - accessing preferences

Make sure your Safari browser is active and click Safari menu, then select Preferences...

removing browser hijacker from safari step 2 - removing extensions

In the preferences window select the Extensions tab. Look for any recently installed suspicious extensions and uninstall them.

Removing browser hijackers from safari step 3 - changing homepage

In the preferences window select General tab and make sure that your homepage is set to a preferred URL, if its altered by a browser hijacker - change it.

removing browser hijackers from safari step 4 - changing the default Internet search engine

In the preferences window select Search tab and make sure that your preferred Internet search engine is selected.

Optional method:

Make sure your Safari browser is active and click on Safari menu. From the drop down menu select Clear History and Website Data...

resetting safari step 1

In the opened window select all history and click the Clear History button.

resetting safari step 2

Microsoft Edge (Chromium) logoRemove malicious extensions from Microsoft Edge:

Removing browser hijackers from Microsoft Edge step 1

Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the top right corner of Microsoft Edge), select "Extensions". Locate any recently-installed suspicious browser add-ons, and remove them.

Change your homepage and new tab settings:

Removing browser hijackers from Microsoft Edge step 2

Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the top right corner of Microsoft Edge), select "Settings". In the "On startup" section look for the name of the browser hijacker and click "Disable".

Change your default Internet search engine:

Removing browser hijackers from Microsoft Edge step 3

To change your default search engine in Microsoft Edge: Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the top right corner of Microsoft Edge), select "Privacy and services", scroll to bottom of the page and select "Address bar". In the "Search engines used in address bar" section look for the name of the unwanted Internet search engine, when located click the "Disable" button near it. Alternatively you can click on "Manage search engines", in the opened menu look for unwanted Internet search engine. Click on the puzzle icon Microsoft Edge (Chromium) puzzle icon near it and select "Disable".

Optional method:

If you continue to have problems with removal of the mywebwatch redirect, reset your Microsoft Edge browser settings. Click the Edge menu icon Microsoft Edge (chromium) menu icon (at the top right corner of Microsoft Edge) and select Settings.

Microsoft Edge (Chromium) reset step 1

In the opened settings menu select Reset settings.

Microsoft Edge (Chromium) reset step 2

Select Restore settings to their default values. In the opened window, confirm that you wish to reset Microsoft Edge settings to default by clicking the Reset button.

Microsoft Edge (Chromium) reset step 3

  • If this did not help, follow these alternative instructions explaining how to reset the Microsoft Edge browser.

Summary:

declining installation of browser hijackers while downloading free software sampleA browser hijacker is a type of adware infection that modifies Internet browser settings by assigning the homepage and default Internet search engine settings to some other (unwanted) website URL. Commonly, this type of adware infiltrates operating systems through free software downloads. If your download is managed by a download client, ensure that you decline offers to install advertised toolbars or applications that seek to change your homepage and default Internet search engine settings.

Post a comment:
If you have additional information on mywebwatch redirect or it's removal please share your knowledge in the comments section below.

Frequently Asked Questions (FAQ)

What is the purpose of forcing users to visit guardflares.com, potterfun.com, and similar websites?

Redirects to websites like guardflares.com and potterfun.com are produced because cyber criminals (e.g., developers of fake search engines and browser hijackers, etc.) profit through them.

Is visiting guardflares.com or potterfun.com a threat to my privacy?

To a certain extent, yes. Websites like guardflares.com and potterfun.com usually collect and sell information about their visitors.

How did a browser hijacker infiltrate my computer?

Browser hijackers are most commonly distributed via bundled installation setups, deceptive promotional webpages, online scams, freeware and free file-hosting sites, P2P sharing networks, spam browser notifications, and intrusive advertisements.

Will Combo Cleaner help me remove MYWebWatch browser hijacker?

Yes, Combo Cleaner will scan your computer and eliminate all browser-hijacking applications present. It is noteworthy that manual removal (performed without security tools) might be ineffective. In cases where multiple browser hijackers have infiltrated the system, after one is removed – the others may reinstall it. Furthermore, removal-related settings might be inaccessible when the software is installed. Therefore, it is paramount to eliminate browser hijackers thoroughly and all at once.

▼ Show Discussion

About the author:

Tomas Meskauskas

Tomas Meskauskas - expert security researcher, professional malware analyst.

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.

PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Software uninstall instructions
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

QR Code
MYWebWatch redirect QR code
Scan this QR code to have an easy access removal guide of MYWebWatch redirect on your mobile device.
We Recommend:

Get rid of Windows malware infections today:

▼ REMOVE IT NOW
Download Combo Cleaner

Platform: Windows

Editors' Rating for Combo Cleaner:
Editors ratingOutstanding!

[Back to Top]

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.