Virus and Spyware Removal Guides, uninstall instructions

ValidGeneration Adware (Mac)

What is ValidGeneration?

ValidGeneration is classified as adware and a browser hijacker. This app serves advertisements and promotes z6airr.com and adjustablesample.com (fake search engine addresses) by changing browser settings. Furthermore, it can read sensitive information from browsers.

Generally, users download adware-type apps/browser hijackers inadvertently. Therefore, ValidGeneration and other apps of this type are categorized as potentially unwanted applications (PUAs).

   
AssistiveFile Adware (Mac)

What is AssistiveFile?

AssistiveFile is a rogue application classified as adware, which also has browser hijacker characteristics. Following successful infiltration, it delivers intrusive ad campaigns and makes alterations to browser settings to promote fake search engines. Adware and browser hijackers typically have data tracking capabilities, which are used to monitor users' browsing activity.

Due to the dubious techniques employed to proliferate AssistiveFile, it is classified as a Potentially Unwanted Application (PUA).

   
# (Xorist) Ransomware

What is # (Xorist)?

# ransomware is a part of the Xorist ransomware family. This ransomware changes the desktop wallpaper and displays a pop-up window - both contain a ransom message. It also creates "ВЕРНУТЬ ИНФОРМАЦИЮ.txt" text files (other ransom messages) in folders that contain encrypted files.

Note that victims who do not have the Russian language installed see a pop-up window containing gibberish text. Additionally, # ransomware renames all encrypted files by appending ".#" as their new extensions. For example, "1.jpg" is renamed to "1.jpg.#", "2.jpg" to "2.jpg.#", and so on.

   
AdjustableProduct Adware (Mac)

What is AdjustableProduct?

AdjustableProduct is an adware-type app, which might also function as a browser hijacker. It serves advertisements and could be capable of changing browser settings to promote a fake search engine. Additionally, it might also collect certain information.

Typically, users download and install apps such as AdjustableProduct unintentionally and, therefore, they are categorized as potentially unwanted applications (PUAs).

   
Kolz Ransomware

What is Kolz?

Kolz belongs to the Djvu ransomware family. It renames encrypted files by appending a unique extension and creating the "_readme.txt" text file/ransom message in all folders that contain encrypted files. Kolz renames files by appending the ".kolz" extension. For example, "1.jpg" is renamed to "1.jpg.kolz", "2.jpg" to "2.jpg.kolz", and so on.

   
Bl9c98vcvv Ransomware

What is the Bl9c98vcvv ransomware?

Bl9c98vcvv is a malicious program belonging to the Xorist ransomware family. This malware encrypts files stored on infected systems in order to demand payment for decryption. During the encryption process, all affected files are appended with the ".Bl9c98vcvv" extension.

For example, a file originally named something like "1.jpg" would appear as "1.jpg.Bl9c98vcvv" following encryption. Once this process is complete, ransom messages are created in a pop-up window and "HOW TO DECRYPT FILES.txt" text files, which are dropped into compromised folders.

The ransom-demand messages are identical and appear in both English and Portuguese.

   
Allsearch App Browser Hijacker

What is Allsearch App?

Allsearch App is rogue software classified as a browser hijacker. Following successful installation, browser hijackers make modifications to browser settings to promote fake search engines. In some cases, Allsearch App operates in this manner to promote tailsearch.com.

This browser hijacker also has data tracking capabilities, which are employed to monitor users' browsing activity. Due to the dubious techniques used to proliferate Allsearch App, it is also classified as a Potentially Unwanted Application (PUA).

   
PowerSmash Browser Hijacker

What is PowerSmash?

The PowerSmash browser hijacker is designed to change certain browser settings to smashapps.net (a fake search engine) and collect browsing-related information. Browser hijackers are categorized as potentially unwanted applications (PUAs), since users often download and install them inadvertently.

   
Anon (DemonWare) Ransomware

What is Anon?

Anon has identical appearance to another ransomware program called DemonWare.

There is just one main difference between them: Anon does not encrypt files as it implies. Typically, malware of this type encrypts files, renames them, and issues ransom messages, however, this ransomware just creates a ransom message (within "README.txt") and displays another in a pop-up window.

   
IStreamSearch Browser Hijacker

What is IStreamSearch?

IStreamSearch is rogue software designed to make modifications to browser settings to promote istreamsearch.com (a fake search engine). Due to this, IStreamSearch is classified as a browser hijacker. Furthermore, this browser hijacker also has data tracking capabilities, which are used to monitor users' browsing activity.

Due to the dubious methods used to proliferate IStreamSearch, it is classified as a Potentially Unwanted Application (PUA).

   

Page 1037 of 2106

<< Start < Prev 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal