Virus and Spyware Removal Guides, uninstall instructions

Mobsearches.com Redirect

What is mobsearches.com?

Developers present mobsearches.com as an Internet search engine that generates improved results and, therefore, enhances the browsing experience. Judging on appearance alone, mobsearches.com barely differs from Google, Yahoo, Bing, and other legitimate search engines.

Therefore, many users believe that mobsearches.com is also legitimate and useful. Bear in mind, however, that developers promote this site by employing rogue download/installation set-ups designed to hijack web browsers and modify various settings without consent. Furthermore, it continually records various information relating to users' Internet browsing activity.

   
HPWombat Browser Hijacker

What is HPWombat?

HPWombat is a deceptive application that infiltrates systems without permission. Following successful infiltration, HPWombat stealthily modifies web browser settings and continually records various information relating to users' Internet browsing activity. For these reasons, this app is categorized as a potentially unwanted program (PUP) and a browser hijacker.

   
Login Security Alert Scam

What is Login Security Alert?

"Login Security Alert!!!: Your Login Credentials At Risk" is a fake error message displayed by a malicious website. Users are redirected to this site by various rogue applications that infiltrate systems without consent. Therefore, these apps are categorized as potentially unwanted programs (PUPs).

As well as causing unwanted redirects, they deliver intrusive online advertisements and continually record various user-system information relating to Internet browsing activity.

   
MetroWhiz Toolbar

What is hp.myway.com?

Developed by Mindspark Interactive Network, MetroWhiz is a rogue application that supposedly allows users to check public transport schedules. On initial inspection, MetroWhiz may appear legitimate and useful, however this app often infiltrates systems without user consent.

Furthermore, it stealthily modifies web browser settings in order to promote a fake search engine, and it continually tracks users' Internet browsing activity. For these reasons, MetroWhiz is categorized as a potentially unwanted application (PUA) and a browser hijacker.

   
Iwantmyfiles Ransomware

What is iwantmyfiles?

Discovered by security researcher, Jakub Kroustek, iwantmyfiles is a ransomware-type virus that stealthily encrypts various data.

Unlike other ransomware, iwantmyfiles does not rename or append extensions to encrypted files. Following successful encryption, the virus opens a pop-up window and creates a text file ("READ_ME.txt"), placing it on the desktop. Both contain identical ransom-demand messages.

   
Lockify Ransomware

What is Lockify?

First discovered by malware security researcher, Michael Gillespie, Lockify is a virus based on an open source ransomware project called Hidden Tear.

Once infiltrated, Lockify encrypts various data using AES cryptography. This malware appends filenames with the ".lockify" extension (for example, "sample.jpg" is renamed to "sample.jpg.lockify"). After successfully encrypting files, Lockify places a "readme.HTA" file in each folder containing encrypted data.

   
DirectionsOnline Toolbar

What is hp.myway.com?

Developed by Mindspark Interactive Network, DirectionsOnline is a deceptive application that supposedly allows users to use GPS functions.

Judging on appearance alone, DirectionsOnline might seem legitimate and useful, however, this app is categorized as a potentially unwanted program (PUP) and a browser hijacker. There are three main reasons for these negative associations: 1) stealth installation without consent; 2) modification of web browser settings, and; 3) tracking of Internet browsing activity.

   
PEC 2017 Ransomware

What is PEC 2017?

Discovered by xXToffeeXx, PEC 2017 is a ransomware-type virus distributed via spam emails containing a fake CV attachment, which installs malware by employing a CVE-2017-0199 exploit. Once infiltrated, PEC 2017 encrypts various data using AES-256 cryptography.

During encryption, PEC 2017 appends the ".pec" extension to the name of each compromised file. The virus then creates an HTML file ("AIUTO_COME_DECIFRARE_FILE.html"), placing it in each folder containing encrypted files.

   
WiseFolderLock Adware

What is WiseFolderLock?

WiseFolderLock is a deceptive application that supposedly allows users to lock various folders. Judging on appearance alone, WiseFolderLock may appear legitimate and useful, however, this app infiltrates systems without consent.

Furthermore, it delivers intrusive online advertisements and records information relating to users' Internet browsing activity. For these reasons, WiseFolderLock is categorized as a potentially unwanted program (PUP) and a browser hijacker.

   
UpdateAdmin Adware

What is UpdateAdmin?

UpdateAdmin is a rogue application claiming to provide various useful features. Although this functionality may seem legitimate, UpdateAdmin is categorized as a potentially unwanted program (PUP) or adware.

One of the reasons for these negative associations is a deceptive software marketing method called 'bundling' used to install UpdateAdmin on systems without users' permission. Bundling is a way to stealthily distribute third party applications together with regular software.

Therefore, users often install this adware inadvertently with free software downloadable on freeware download websites. After infiltration, UpdateAdmin generates various intrusive online advertisements (banner, pop-up, etc.) that often redirect to bogus websites, thereby exposing your computer to risk of infection.

   

Page 1742 of 2131

<< Start < Prev 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal