App Explorer – an application that comes as a pre-installed module on laptops from Lenovo
App Explorer is a legitimate application developed by SweetLabs and is often bundled on devices produced by major companies like Lenovo. Allegedly, the application is designed as an alternative to Microsoft's Web store, which helps users to browse, download and update various apps. Unfortunately, the developer of the program also produced Pokki and OpenCandy – tools that are considered to be potentially unwanted or even malicious by some anti-virus vendors. In fact, App Explorer might just fit into the same category of adware – intrusive delivery of commercial content, as well as slowdown in system performance. Some users reported that the app appeared out of nowhere on their PCs, meaning that it can be distributed with the help of deceptive marketing technique called software bundling. Fortunately, users can easily remove App Explorer in case they are having troubles with it.
|Type||Potentially unwanted program|
|Symptoms||Increased amount of adverts, high CPU usage|
|Elimination||Check our App Explorer removal guide below|
|Optimization||We recommend using Reimage Reimage Cleaner Intego to keep the system running smoothly|
Once App Explorer is installed on the PC, it launches the update service HostAppServiceUpdater.exe, along with its main executable HostAppService.exe which run in the background. The app also creates a scheduled task so that it is started with every system reboot.
While the application is approved by Lenovo, it does not mean that it is entirely safe to use and does not cause any problems to users. Multiple people complained about excessive CPU usage of the service spawned by Lenovo App Explorer. Some users said their CPU spiked to 60-80% usage, which is abnormal for typical apps running in the background.
Speaking of Lenovo, it is not the first time the company was delivering adware on users' devices. The recent scandal over Superfish adware that was pre-installed on users' laptops between 2014 and 2015 and exposed them to potential cyber attacks, compromising their safety. Lenovo settlement reached $7.3 million. Have Lenovo learned the lesson? Maybe, considering that App Explorer did not get any negative criticism from security researchers so far, and no anti-virus engines flag it as malicious currently.
However, users complaining about advertisement content, as well as abnormally high CPU usage when the app is running should warrant App Explorer removal. Because none of the security applications currently recognize the file, users can only uninstall the app via the Control Panel. We explain the procedure below. Also, we recommend using Reimage Reimage Cleaner Intego as a system maintenance tool that can clean the device and keep it running smoothly.
App Explorer is a potentially unwanted program that enters users machines with the help of software bundling
Beware of bundled software – it can install potentially dangerous programs on your system
While we cannot say that Lenovo app explorer is a virus, its distribution techniques definitely resemble. Many users complained about finding the application performing updates, even though they never initiated the download of software in the first place. This is typical for potentially unwanted programs, such as adware or browser hijackers.
This happens because users do not pay much attention to the installation procedure of new applications they acquire from the internet. Beware that all websites that distribute freeware or shareware bundle software – it is a way to monetize, and such sites would simply not exist otherwise.
Once you pick the former, you will be able to view all the optional components that are marked for the installation. Merely remove the tick marks and only leave the initial program you required.
Uninstall Lenovo App Explorer from your device if it is causing you troubles
The answer to the question “Should I uninstall Lenovo App Explorer?” highly depends on whether or not your system is experiencing any difficulties, and whether or not you are using it in the first place. Our recommendation would be to opt for App Explorer removal, as we do not see any use of such a program. If anything, using default Microsoft store should be sufficient. You can check our instructions below for complete termination procedure.
Nevertheless, you should not remove App Explorer if you think that it is beneficial to you. As of now, Lenovo completely approves of the app, and no security researchers came forward with negative comments.
You may remove virus damage with a help of Reimage Reimage Cleaner Intego. SpyHunter 5Combo Cleaner and Malwarebytes are recommended to detect potentially unwanted programs and viruses with all their files and registry entries that are related to them.
To remove App Explorer, follow these steps:
Delete App Explorer from Windows systems
To remove App Explorer from the system, follow these step-by-step instructions:
- Click Start → Control Panel → Programs and Features (if you are Windows XP user, click on Add/Remove Programs).
- If you are Windows 10 / Windows 8 user, then right-click in the lower left corner of the screen. Once Quick Access Menu shows up, select Control Panel and Uninstall a Program.
Uninstall App Explorer and related programs
Here, look for App Explorer or any other recently installed suspicious programs.
- Uninstall them and click OK to save these changes.
Access your website securely from any location
When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.
The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login.
VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.
Backup files for the later use, in case of the malware attack
Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.
It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.
When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.