Virus and Spyware Removal Guides, uninstall instructions

Search.societycake.com Redirect (Mac)

What is search.societycake.com?

According to the developers, search.societycake.com is a "high-quality" Internet search engine that generates improved results, thereby enhancing the web browsing experience. On initial inspection, this site may seem similar to Google, Yahoo, Bing, and other search engines.

Therefore, many users believe that search.societycake.com is also legitimate and useful. In fact, it records various user-system information. In addition, developers promote search.societycake.com by employing rogue download/installation set-ups that modify browser options without consent.

   
Search Awesome Adware

What is Search Awesome?

Search Awesome is an updated version of adware-type applications Wajam and Social2Search. By offering 'improved search results' (including content shared by users' friends on social networks), Search Awesome attempts to give the impression of legitimacy.

In fact, this app is categorized as a potentially unwanted program (PUP) and adware. There are three main reasons for these negative associations: 1) installation without consent; 2) display of intrusive advertisements, and; 3) tracking of users' Internet browsing activity.

   
Buzzadexchange.com Redirect

What is buzzadexchange.com?

Identical to tradedoubler.com, mobileofferplace.site, mobytize.mobi, and many others, buzzadexchange.com is a rogue site designed to redirect to other suspicious websites. Research shows that users are often redirected to buzzadexchange.com by various potentially unwanted programs (PUPs).

These programs commonly infiltrate systems during installation of other software (the "bundling" method). In addition, they continually deliver intrusive online advertisements and record various user-system information.

   
Oxar Ransomware

What is Oxar?

Discovered by malware security researcher, Marcelo Rivero, Oxar is a ransomware-type virus based on an open-source ransomware project called Hidden Tear. Once infiltrated, Oxar encrypts various data. During encryption, this virus appends filenames with the ".OXR" extension.

For example, "sample.jpg" is renamed to "sample.jpg.OXR". Newer variants of this ransomware use .F*CK, .FDP, .PEDO and .ULOZ extensions for encrypted files. Following successful encryption, Oxar opens a pop-up window containing a ransom-demand message.

   
Search.mykotlerino.com Redirect (Mac)

What is search.mykotlerino.com?

search.mykotlerino.com is presented as a "top-notch" Internet search engine that significantly enhances the browsing experience by generating improved results.

Initially, search.mykotlerino.com may seem legitimate and useful, however, developers promote this site by employing rogue download/installation set-ups that hijack browsers and stealthily modify options. Furthermore, search.mykotlerino.com records various user-system information relating to browsing activity.

   
Myallsearch.com Redirect

What is myallsearch.com?

myallsearch.com is a fake Internet search engine virtually identical to go.myquery.net, searchprivacy.co, jp.salbin.com, and many others. According to the developers, myallsearch.com significantly enhances the Internet browsing experience by generating improved search results.

These claims often trick users into believing that myallsearch.com is legitimate and useful. In fact, developers employ deceptive software download/installation set-ups to promote this site. Furthermore, this fake Internet search engine continually gathers various information relating to Internet browsing activity.

   
FCP Ransomware

What is FCP?

FCP is a ransomware-type virus discovered by malware security researcher, Karsten Hahn. Once infiltrated, FCP supposedly encrypts stored data, however, unlike other ransomware-type viruses, this virus does not append filenames with an extension.

After successfully "encrypting" files, FCP creates four files ("Chinese_national_flag.png", "READ_ME_HELP_ME.png", "READ_ME_HELP_ME.txt", and "FCP Decryptor.exe"), placing them on the desktop. Both PNG files are automatically opened.

   
Search.poreskanaf.com Redirect (Mac)

What is search.poreskanaf.com?

Developers present search.poreskanaf.com as a "top-notch" Internet search engine that significantly enhances the browsing experience by generating improved results. Judging on appearance alone, this website barely differs from Google, Bing, Yahoo, and other legitimate search engines.

Therefore, many users believe that search.poreskanaf.com is also legitimate. In fact, it is promoted via rogue downloaders/installers that modify browser options without consent. Furthermore, search.poreskanaf.com continually gathers various information relating to users' Internet browsing activity.

   
Search.festovshade.com Redirect (Mac)

What is search.festovshade.com?

According to developers, search.festovshade.com is a "high-quality" Internet search engine that generates improved results and, therefore, enhances the browsing experience. On initial inspection, search.festovshade.com barely differs from Google, Bing, Yahoo, and other legitimate search engines.

Therefore, many users believe that this website is also legitimate. In fact, developers promote search.festovshade.com by employing rogue downloaders and installers. In addition, the site monitors browsing activity by gathering various user-system information.

   
BTCWare Ransomware

What is BTCWare?

Discovered by malware researcher, MalwareHunterTeam, BTCWare is an updated version of a ransomware-type virus called Crptxxx. This ransomware is distributed via a malicious application called "Rogers Hi-Speed Internet".

Once infiltrated, BTCWare encrypts files and appends filenames with the ".btcware" extension (e.g., "sample.jpg" is renamed to "sample.jpg.btcware"). Newer variants of this ransomware append .shadow, .payday, .wyvern, .nuclear, .aleta, .gryphon, .nopasaran, .blocking, .xfile, .master, .onyon, .theva, .cryptobyte or .cryptowin extensions to encrypted files.

BTCWare then creates an HTM file ("#_HOW_TO_FIX_!.hta.htm"), placing it on the desktop. Other variants of this ransomware use !#_RESTORE_FILES_#!.inf file to store their ransom demanding message.

   

Page 1654 of 2074

<< Start < Prev 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal