Virus and Spyware Removal Guides, uninstall instructions

Twisted Search Browser Hijacker

What is Twisted Search?

Twisted Search, also known as TwistedSearch, is software promoted as supposedly improving web searches. In fact, it operates by making alterations to browser settings to promote feed.twistedsearch.com, a fake search engine. Therefore, it is classified as a browser hijacker.

Furthermore, it has data tracking capabilities, common to software within this classification. Twisted Search has dubious proliferation methods, and so it is also classified as a Potentially Unwanted Application (PUA).

   
Booster Search Browser Hijacker

What is Booster Search?

Booster Search (also known as BoosterSearch) is an application designed to improve the browsing experience. In fact, this is a browser hijacker which promotes feed.boostersearch.com (the address of a fake search engine) by modifying browser settings and gathering various information.

In most cases, people downloaded and install browser hijackers inadvertently and, therefore, they are categorized as potentially unwanted applications (PUAs).

   
DECP Ransomware

What is DECP?

DECP belongs to the Matrix ransomware family. This ransomware renames files by replacing filenames with the deccrypasia@yahoo.com email address, a random string of characters and the ".DECP" extension. For example, it renames a file named "1.jpg" to "[deccrypasia@yahoo.com].aiRtzELK-qb6kitil.DECP", and so on.

DECP also creates the "#DECP_README#.rtf" file containing a ransom message and drops various files onto the victim's desktop. This ransomware not only encrypts files but also deletes Shadow Copies.

   
Bekapro.xyz POP-UP Scam (Mac)

What is bekapro[.]xyz?

bekapro[.]xyz is a scam website that makes deceptive claims to trick visitors into downloading and installing an untrusted or possibly malicious piece of software. The site states that users' devices have been compromised by viruses and advises them to remove the threats using a specific application.

No website can detect threats or issues present on a system. Few users access bekapro[.]xyz or similar web pages intentionally - most are redirected to them by intrusive advertisements or Potentially Unwanted Applications (PUAs) already infiltrated into the device.

   
Best Classified Ads Promos Adware

What is Best Classified Ads Promos?

Best Classified Ads Promos is categorized as adware, since it runs intrusive advertisement campaigns. This app delivers unwanted, deceptive and even dangerous ads. Furthermore, it has data tracking capabilities, which are employed to monitor users' browsing activity.

Best Classified Ads Promos has dubious proliferation methods, and therefore many users install it unintentionally. For these reasons, it is classified as a Potentially Unwanted Application (PUA).

   
RekenSom Ransomware

What is RekenSom?

RekenSom is a ransomware-type program that was discovered by dnwls0719.

Unlike most programs of this type, RekenSom not only encrypts files but also deletes some of them. It renames all encrypted files by using the "Encrypted[a_number_of_dashes].som" pattern (for example, it renames "1.jpg" to "Encrypted-------.som", etc.) and displays a ransom message in a pop-up window.

Another variant of RekenSom was discovered by WebSecurityIT. This variant encrypts files and renames them by changing their filenames to a random string of characters and appending the ".RekenSom" extension.

   
TaskBrowser Adware (Mac)

What is TaskBrowser?

TaskBrowser supposedly improves the browsing experience, however, this adware-type application feeds users with ads and gathers information. In most cases, users download and install adware inadvertently. Therefore, apps of this type are categorized as potentially unwanted applications (PUAs).

   
ExclusiveAction Adware (Mac)

What is ExclusiveAction?

There are many adware-type applications on the internet, including ExclusiveAction, which is part of the AdLoad adware family. It is designed to feed users with various advertisements. Research shows that ExclusiveAction also operates as a browser hijacker to promote the address of a fake search engine.

Furthermore, it might also gather various information. Typically, people download and install adware inadvertently. Therefore, apps of this type are categorized as potentially unwanted applications (PUAs). Note that ExclusiveAction is distributed through a fake Adobe Flash Player installer.

   
AproditeSearch Adware (Mac)

What is AproditeSearch?

AproditeSearch is rogue software belonging to the AdLoad adware family. Following successful installation, it delivers various unwanted and dangerous advertisements. AproditeSearch also has browser hijacker qualities such as browser modification and bogus search engine promotion.

Furthermore, adware and browser hijackers usually have data tracking capabilities, which are used to monitor users' browsing activity.

Since AproditeSearch has dubious proliferation methods, it is categorized as a Potentially Unwanted Application (PUA). This app has been spread via fake Flash Player updaters, which are also used to proliferate ransomware, Trojans and other malware.

   
LeadingModuleSearch Adware (Mac)

What is LeadingModuleSearch?

Belonging to the AdLoad malware family, LeadingModuleSearch is an adware-type application that shares many similarities with browser hijackers. This app delivers intrusive ad campaigns and modifies browsers to promote fake search engines. Furthermore, most adware and browser hijackers monitor users' browsing activity.

Due to its dubious proliferation methods, it is also classified as a Potentially Unwanted Application (PUA). LeadingModuleSearch has been known to proliferate via fake Adobe Flash Player updaters and installers. Note that bogus software updaters/installers often spread adware, browser hijackers and other PUAs.

They can also infect systems with ransomware, Trojans and other malware.

   

Page 1230 of 2151

<< Start < Prev 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal