Virus and Spyware Removal Guides, uninstall instructions

Searchbaron.com Redirect (Mac)

What is searchbaron.com?

searchbaron.com is a deceptive website that supposedly enhances the browsing experience by generating improved search results. In fact, this site is promoted using various rogue applications that typically infiltrate computers without users' consent. Furthermore, searchbaron.com and most rogue apps are likely to record information relating to browsing activity.

   
Login To My Emails Pro Browser Hijacker

What is Login To My Email?

Login To My Email (also known as Login To My Emails Pro) is presented as a legitimate application that supposedly allows users to access their email accounts.

The appearance of the associated website (search.hlogintomyemailpro.com) suggests that this application is legitimate and useful, however, Login To My Email is likely to infiltrate computers without users' consent. Furthermore, it promotes a fake search engine (search.hlogintomyemailpro.com) and gathers information relating to browsing activity.

   
YOUR_LAST_CHANCE Ransomware

What is YOUR_LAST_CHANCE?

First discovered by malware researcher, GrujaRS, YOUR_LAST_CHANCE is an updated variant of high-risk ransomware called Nemesis. As with its predecessor, YOUR_LAST_CHANCE encrypts most stored files and renames them. This variant appends filenames with the victim's unique ID and ".YOUR_LAST_CHANCE" extension (hence the ransomware's name).

For example, "sample.jpg" might be renamed to a filename such as "sample.jpg.id_3057868259_.YOUR_LAST_CHANCE". Additionally, YOUR_LAST_CHANCE automatically opens a temporary text file ("temp000000.txt") and generates another text file called "_RESTORE FILES_.txt" and stores a copy in every existing folder.

   
CROWN Ransomware

What is CROWN?

CROWN is yet another high-risk ransomware discovered by Petrovic. As with most of these infections, CROWN stealthily infiltrates computers and encrypts stored files. In doing so, CROWN adds the ".CROWN" extension (hence its name) to each filename.

Encrypted data immediately becomes unusable. Furthermore, CROWN changes the desktop wallpaper and stores two files on the desktop: "Decrypter.exe" (which displays a pop-up window) and "HOW TO DECRYPT FILES.txt".

   
Qulab Stealer

What is Qulab?

Qulab is high-risk malware written in the AutoIt scripting language. The purpose of this malware is to steal various personal details. Note that the presence of Qulab can cause a number of problems including serious privacy issues, financial loss, etc.

   
Dqb Ransomware

What is Dqb?

Dqb is yet another ransomware infection discovered by Jakub Kroustek. It is quite advanced and belongs to the Dharma malware family. After successful infiltration, Dqb encrypts most stored data using RSA-1024 cryptography and renames each file by appending the victim's unique ID, developer's email address, and ".dqb" extension.

For example, "1.jpg" might be renamed to a filename such as "1.jpg.id-1E857D00.[btcdecoding@qq.com].dqb". After successful encryption, Dqb generates a text file ("RETURN FILES.txt", which is placed on the desktop) and opens a pop-up window.

   
Edchargina.pro Ads

What is edchargina[.]pro?

edchargina[.]pro is a rogue website that is virtually identical to nanoadexchange.com, chainthorn.com, chanelets-aurning.com, and many others. It displays dubious content and redirects users to other dubious sites.

Research shows that many users visit edchargina[.]pro inadvertently, since they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements delivered by other rogue websites. PUAs infiltrate computers without users' consent. In addition to enforcing redirects, they record user-system information and deliver intrusive advertisements.

   
Save Ransomware

What is Save ransomware?

First discovered by malware security researcher, safety, Save is yet another high-risk ransomware infection from the Dharma family.

Following successful infiltration, Save encrypts most stored files and appends filenames with the victim's unique ID, the developers' email address, and the ".save" extension (e.g., "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[seavays@aol.com].save".

Additionally, Save opens a pop-up window and stores the "RETURN FILES.txt" text file on the desktop.

   
NameSync Adware (Mac)

What is NameSync?

Identical to GeneralNetSearch, Resourcetools, GlobalTechSearch, and a number of others, NameSync is an adware-type application that claims to enhance the browsing experience. Initially, NameSync may seem legitimate, however, this app typically infiltrates systems without permission. In addition, it delivers intrusive advertisements and causes unwanted browser redirects.

   
GoBotKR Malware

What is GoBotKR?

GoBotKR is high-risk trojan-type infection that entered the scene in May, 2018. It is essentially an updated version of another trojan called GoBot2, which is written in the Go programming language. GoBotKR opens a 'backdoor' for cyber criminals to access and remotely control the infected machine.

Research shows that this malware is distributed using torrent websites and targets mainly South Korean users. The presence of this infection on your system can lead to various issues and, therefore, it should be eliminated immediately.

   

Page 1397 of 2135

<< Start < Prev 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal