Virus and Spyware Removal Guides, uninstall instructions

Smashtab Browser Hijacker

Smashtab browser hijacker removal instructions

What is Smashtab?

Smashtab is a piece of rogue software, classified as a browser hijacker. Following successful installation, it makes changes to browser settings - to promote - a fake search engine. Additionally, Smashtab has data tracking abilities, which are used to spy on users' browsing activity. Due to the questionable methods used to distribute browser hijackers, they are deemed to be PUAs (Potentially Unwanted Applications).

Beijing Ransomware

Beijing ransomware removal instructions

What is Beijing ransomware?

Beijing is a typical ransomware: it encrypts files, appends its extension to the filenames of all encrypted files and creates a ransom note with instructions on how to contact its developers. It renames encrypted files by appending the ".beijing" extension to their filenames. For instance, it renames "1.jpg" to "1.jpg.beijing", "2.jpg" to "2.jpg.beijing", and so on. Beijing creates a ransom note (the "!RECOVER.txt" text file) in all folders that contain encrypted files. This ransomware is another variant of the LeakTheMall ransomware.

Montana Ransomware

Montana ransomware removal instructions

What is the Montana ransomware?

Montana is a variant of the LeakTheMall ransomware. This malicious program is designed to encrypt data and demand payment for the decryption. During the encryption process, all of the affected files are appended with the ".montana" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.montana" - following encryption. Once this process is complete, ransom notes titled - "!HELP!.txt" - are dropped into compromised folders. Ads

Alltopposts[.]com redirect removal instructions

What is alltopposts[.]com?

Pages like alltopposts[.]com should not be trusted. Typically, they get opened by browsers that have some potentially unwanted application (PUA) installed on them, through deceptive ads or other untrustworthy pages. Either way, users do not open/visit them intentionally. A couple of examples of other pages like alltopposts[.]com are reightpainf[.]top, content4you[.]net and mylot[.]com. It is worthwhile to mention that PUAs can be designed not only to promote unreliable sites but also to serve ads and/or collect various data.

PDF Mighty Unwanted Application

PDF Mighty removal instructions

What is PDF Mighty?

PDF Mighty is a piece of rogue software, endorsed as a tool capable of converting files (e.g. Microsoft Office documents) into the PDF format. However, due to the dubious methods used to distribute this application, it is classified as a PUA (Potentially Unwanted Application). One of the primary purposes of PDF Mighty is to promote the SearchMighty browser hijacker. Furthermore, PUAs often have unmentioned heinous abilities and the advertised features - are rarely operational.

FileConvertGiant Unwated Application

FileConvertGiant removal instructions

What is FileConvertGiant?

FileConvertGiant is advertised as the most comprehensive file converter that works with a wide range of file types including various documents, archive files, spreadsheets, audio and video files. However, this app is categorized as potentially unwanted application (PUA) because of the method that is used to distribute this software. Also, the installer for FileConvertGiant includes an offer to install MySearchGiant - a browser hijacker (another PUA). It is advised not to download and install neither FileConvertGiant, MySearchGiant or other PUAs.

LeakTheMall Ransomware

LeakTheMall ransomware removal instructions

What is LeakTheMall ransomware?

LeakTheMall is a ransomware-type malicious program. Its discovery is credited to Amigo-A. Systems infected with this malware have their data encrypted and receive ransom demands for the decryption tools. During the encryption process, files are appended with the ".crypt" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.crypt", "2.jpg" as "2.jpg.crypt", and so forth. After this process is complete, ransom-demanding messages - "ReadMe.txt" - are dropped into affected folders.

Clay Ransomware

Clay ransomware removal instructions

What is Clay?

Clay was discovered by xiaopao. It encrypts files and provides instructions on how to pay a ransom, contact its developers and some other details. Unlike other malware of this type, Clay does not rename encrypted files (it does not append any extension to their filenames). It displays its ransom note in a pop-up window.

PromoteQueue Adware (Mac)

How to remove PromoteQueue adware from Mac?

What is PromoteQueue?

PromoteQueue is a rogue application. It is classified as adware and it possesses browser hijacker traits. Following successful infiltration, PromoteQueue runs intrusive advert campaigns and makes modifications to browser settings - in order to promote fake search engines. Most adware-types and browser hijackers spy on users' browsing activity, and it is highly likely that this app does so as well. Due to the questionable techniques used to distribute PromoteQueue, it is also considered to be a PUA (Potentially Unwanted Application).

LiveSportSearch Browser Hijacker

LiveSportSearch browser hijacker removal instructions

What is LiveSportSearch?

LiveSportSearch is designed to hijack browsers by changing some of their settings to - the address of a fake search engine. Another thing that this browser hijacker is designed to do is to collect browsing-related information. Most of the times users download and install apps like LiveSportSearch unknowingly, therefore, they are categorized as potentially unwanted applications (PUAs).


Page 1 of 1113

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal