Virus and Spyware Removal Guides, uninstall instructions

StreamsBros Browser Hijacker

What is StreamsBros?

StreamsBros hijacks browsers by changing certain settings to streamsbros.com (the address of a fake search engine). Commonly, apps of this type collect information relating to users' browsing habits. Users often download and install browser hijackers unintentionally and, therefore, StreamsBros is categorized as a potentially unwanted application (PUA).

   
StreamsMob Browser Hijacker

What is StreamsMob?

StreamsMob is dubious software categorized as a browser hijacker. It operates by modifying browsers to promote streamsmob.com (a bogus search engine). Most browser hijackers have data tracking capabilities, which are used to monitor users' browsing activity - it is highly likely that StreamsMob also has this functionality.

Due to the dubious methods employed to proliferate this browser hijacker, it is also classified as a Potentially Unwanted Application (PUA).

   
Fxmwtv Ransomware

What is Fxmwtv ransomware?

Belonging to the Snatch ransomware family, Fxmwtv encrypts files, changes their filenames and creates a ransom message. It renames encrypted files by appending the ".fxmwtv" extension to filenames. For example, it would rename a file called "1.jpg" to "1.jpg.fxmwtv", "2.jpg" to "2.jpg.fxmwtv", and so on.

This ransomware creates the "HOW TO RESTORE YOUR FILES.TXT" file (containing a ransom message) in all folders that hold encrypted files.

   
Secure (Sorena) Ransomware

What is Secure (Sorena) ransomware?

Discovered by dnwls0719, Secure (Sorena) is a ransomware-type program. Systems infected with this malware experience data encryption and users receive ransom demands for decryption. During the encryption process, all compromised files are appended with ".Id-[random_string].secure".

For example, a file originally named "1.jpg" would appear as something similar to "1.jpg.Id-KCQJMGNP.secure" following encryption. Once this process is complete, identical ransom messages within "HELP_DECRYPT_YOUR_FILES.tx" and "HELP_DECRYPT_YOUR_FILES.html" files are created.

   
Eco Search Browser Hijacker

What is Eco Search?

Eco Search browser hijacker is designed to promote the ecosearch.club address (fake search engine) by changing some of the browser settings and collect browsing-related information. It is common that users download and install browser hijackers unintentionally, therefore, apps of this type are categorized as potentially unwanted applications (PUAs).

   
Eknkfwovyzb Ransomware

What is Eknkfwovyzb ransomware?

Eknkfwovyzb is malicious software belonging to the Snatch ransomware family. This malware operates by encrypting data and demanding payment for decryption. During the encryption process, all compromised files are appended with the ".eknkfwovyzb" extension.

For example, a file originally named "1.jpg" would appear as "1.jpg.eknkfwovyzb", "2.jpg" as "2.jpg.eknkfwovyzb", and so on. After this process is complete, ransom messages within the "HOW TO RESTORE YOUR FILES.TXT" file are dropped into affected folders.

   
BlackKnight2020 Screenlocker

What is BlackKnight2020 screenlocker?

This screen locker was discovered  by xiaopao. BlackKnight2020 is malware that prevents victims from using the infected computer by locking the screen. It also displays a ransom message with instructions about how to pay for the code, which will supposedly unlock the screen.

   
Strong Ransomware

What is the Strong ransomware?

Discovered by MalwareHunterTeam, Strong is a malicious program categorized as ransomware. Systems infected with this malware experience data encryption and users receive ransom demands for decryption.

During the encryption process, all affected files are appended with "Drheshi@protonmail.com.[random_string]", which consists of the cyber criminals' email address and a random character string extension.

For example, a file originally named "1.jpg" would appear as something similar to"1.jpgDrheshi@protonmail.com.3tp2PDRJuaNSGk1c" following encryption. After this process is complete, a pop-up window is displayed that contains the ransom-demand message.

   
PromoteOptimization Adware (Mac)

What is PromoteOptimization?

PromoteOptimization is designed to serve advertisements, collect sensitive information, and promote z6airr.com and adjustablesample.com (addresses of fake search engines) by changing certain browser settings. In this way, it functions as adware and a browser hijacker.

In most cases, users download and install apps like PromoteOptimization unintentionally and, for this reason, they are classified as potentially unwanted applications (PUAs).

   
MessengerTime adware

What is MessengerTime?

MessengerTime is a deceptive program that supposedly allows users to read Facebook messages directly from the desktop. The appearance of this application might trick users into believing that MessengerTime is legitimate, however, it is developed by third parties and is not affiliated with Facebook.

Furthermore, MessengerTime delivers intrusive online advertisements and tracks internet browsing activity. For these reasons, it is categorized as a potentially unwanted adware-type program (PUP).

   

Page 1075 of 2125

<< Start < Prev 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal