Virus and Spyware Removal Guides, uninstall instructions

Mp3pro.xyz Suspicious Website

What is mp3pro[.]xyz?

mp3pro[.]xyz is an untrustworthy website presented as a YouTube video to MP3 converter. Its conversion services infringe copyright laws, however, it might also use rogue advertising networks, which is common to pages of this type. Visitors to mp3pro[.]xyz might find that they are redirected to various other dubious or dangerous sites.

You are strongly advised against visiting/using mp3pro[.]xyz or other similar sites.

   
SmartToolboxSearch Adware (Mac)

What is SmartToolboxSearch?

The AdLoad adware family includes a number of adware-type applications, including SmartToolboxSearch. Adware programs serve various advertisements, which is the case with this particular app, but SmartToolboxSearch also promotes a fake search engine. It might also gather information.

In most cases, users download and install adware unintentionally. Therefore, these apps are also known as potentially unwanted applications (PUAs). Note that SmartToolboxSearch is installed and distributed through a fake Adobe Flash Player installer.

   
NEFILIM Ransomware

What is NEFILIM?

NEFILIM is a malicious program categorized as ransomware. It operates by encrypting the files of infected systems in order to demand payment for decryption tools/software. During the encryption process, all compromised files are appended with the ".NEFILIM" extension.

For example, a file originally named something like "1.jpg" would appear as "1.jpg.NEFILIM" following encryption. Once this process is complete, a ransom message within "NEFILIM-DECRYPT.txt" is created on the victims' desktops.

   
View Live News Promos Adware

What is View Live News Promos?

View Live News Promos is one of many applications that feeds users with advertisements.

Apps of this type are categorized as adware and potentially unwanted applications (PUAs), since people usually download and install them inadvertently. These adware-type apps also operate as information tracking tools - they collect information relating to users' browsing habits and other data.

   
Protected-connection.com POP-UP Scam (Mac)

What is protected-connection[.]com?

protected-connection[.]com is one of many deceptive, untrusted websites that often tricks visitors into downloading and installing software. These web pages display notifications stating that the device (computer, mobile telephone or other device) is infected with viruses and encourage visitors to remove threats with various applications.

Websites such as protected-connection[.]com should never be trusted, even if they advertise legitimate software. They are commonly opened through dubious ads/web pages or installed potentially unwanted apps (PUAs).

   
Check My Email Tab Browser Hijacker

What is Check My Email Tab?

Check My Email Tab is a rogue application classified as a browser hijacker and a Potentially Unwanted Application (PUA). It is advertised as a tool for easy access to email accounts, but operates by making modifications to browsers to promote a fake search engine (search.hcheckmyemail.co or hp.hcheckmyemail.co).

Additionally, Check My Email Tab has data tracking capabilities, which are employed to gather information relating to users' browsing activity. Since most users install this app unintentionally, it is classified as a PUA. Check My Email Tab is often distributed together another PUA called Hide My History.

   
Mapssrchpro Browser Hijacker

What is Mapssrchpro?

mapssrchpro is one of many browser hijackers that promote addresses of fake search engines by changing certain browser settings.

This app promotes srchbar.com in this manner. Furthermore, apps of this type often gather information. Browser hijackers are classified as potentially unwanted applications (PUAs), since people tend to download and install them inadvertently.

   
Teslarvng Ransomware

What is Teslarvng?

Discovered by Ravi, Teslarvng belongs to the Ouroboros ransomware family. It encrypts files, renames them, and provides victims with instructions about how to contact the developers (and other details). Teslarvng renames files by adding the de-crypt@foxmail.com email address and appending ".teslarvng" to filenames.

For example, it would change "1.jpg" to "1.jpg.[de-crypt@foxmail.com].teslarvng", and so on. It also creates ransom messages within the "HELP.txt" and "How To Recover.txt" files.

   
Windows Was Blocked Due To Questionable Activity POP-UP Scam

What is "Windows Was Blocked Due To Questionable Activity"?

"Windows Was Blocked Due To Questionable Activity" is yet another scam message used to extort money from unsuspecting users. Delivered by deceptive websites, the message states that the system has been blocked and encourages users to immediately contact 'tech support' via a telephone number provided.

 In fact, these claims are false and you should never call this number. Furthermore, redirects to websites that deliver the "Windows Was Blocked Due To Questionable Activity" message might indicate the presence of Potentially Unwanted Applications (PUAs) on the system.

   
ProcessLocator Adware (Mac)

What is the ProcessLocator adware?

ProcessLocator is a rogue application categorized as adware and a Potentially Unwanted Application (PUA). It is promoted as supposedly improving the browsing experience by providing accurate search results, fast searches and so on. In fact, this app diminishes the browsing experience.

ProcessLocator operates by delivering intrusive advertisement campaigns. It is classified as a PUA, since most users download and install it unintentionally. Furthermore, software within the adware and PUA categories usually has data tracking capabilities, which are employed to monitor users' browsing activity.

   

Page 1214 of 2132

<< Start < Prev 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal