Virus and Spyware Removal Guides, uninstall instructions

Gohomego.com Redirect

What is gohomego.com?

gohomego.com is a fake Internet search engine similar to searchfunmoods.com. According to the developers, this site significantly enhances the Internet browsing experience by generating improved search results.

In fact, developers promote gohomego.com via rogue software installers that hijack web browsers and modify various settings. Furthermore, gohomego.com continually monitors users' Internet browsing activity.

   
Myprivatesearch.com Redirect

What is myprivatesearch.com?

Myprivatesearch.com is a fake Internet search engine that supposedly enhances the Internet browsing experience by generating improved search results. Judging on appearance alone, myprivatesearch.com barely differs from Google, Yahoo, Bing, and other similar search engines.

Therefore, many users believe that myprivatesearch.com is also legitimate. In fact, it is promoted via rogue software downloaders and installers that stealthily modify web browser settings. In addition, myprivatesearch.com continually records information relating to users' Internet browsing activity.

   
Ads by Trezaa

What is Trezaa?

Trezaa is adware-type application that falsely claims to enhance the web browsing experience by providing notifications of special deals/discounts on various online stores, enabling comparison shopping, and enabling other similar functionality. These features may seem legitimate, however, this application is categorized as a potentially unwanted program (PUP).

After successful infiltration on systems without users’ consent, Trezaa collects information relating to web browsing activity and generates intrusive online advertisements.

   
Search.fulltabsearch.com Redirect

What is search.fulltabsearch.com?

Developers present search.fulltabsearch.com as a legitimate Internet search engine that generates improved search results, provides quick access to various popular websites, selection of different themes, and provides other similar features.

Many users believe that search.fulltabsearch.com is legitimate and useful, however, developers promote it using rogue software download/installation set-ups that hijack web browsers and modify various options without consent. Furthermore, search.fullsearchtab.com continually tracks Internet browsing activity.

   
ZeroCrypt Ransomware

What is ZeroCrypt?

ZeroCrypt is a ransomware-type virus that encrypts various files using asymmetric cryptography. This malware was devised to be a task in the ZeroNight 2016 hacker competition. To complete the task, participants were challenged to crack the encryption. In fact, research shows that criminals often spread this malware only to generate revenue.

During encryption, ZeroCrypt appends the ".zn2016" extension to the name of each compromised file (for example, "sample.jpg" becomes "sample.jpg.zn2016"). After encrypting the files, ZeroCrypt generates a text file ("ZEROCRYPT_RECOVER_INFO.txt"), which contains a ransom-demand message, and places it on the desktop.

   
ISHTAR Ransomware

What is ISHTAR?

ISHTAR is a ransomware-type virus that encrypts files using asymmetric cryptography. This malware is designed to prepend the "ISHTAR-" string to the name of each encrypted file. For instance, "sample.jpg" becomes "ISHTAR-sample.jpg". Once files are successfully encrypted, ISHTAR creates a "README-ISHTAR.txt" file and places it on the desktop.

   
Versiegelt Ransomware

What is Versiegelt?

Versiegelt is a new variant of .Fun (Jigsaw) ransomware-type malware. Following infiltration, Versiegelt encrypts files using AES cryptography.

During encryption, this ransomware appends the ".versiegelt" extension to the name of each file. For example, "sample.jpg" becomes "sample.jpg.versiegelt". Following successful encryption, Versiegelt opens a pop-up window with a ransom-demand message.

   
Alcatraz Locker

What is Alcatraz Locker?

Alcatraz Locker is ransomware-type virus designed to encrypt files using AES-256 cryptography. During encryption, Alcatraz Locker appends the ".Alcatraz" extension to the name of each encrypted file. For instance, encrypted "sample.jpg" is renamed to "sample.jpg.Alcatraz".

Once files are encrypted, Alcatraz Locker creates an HTML file ("ransomed.html") and places it on the desktop.

   
Searchisweb.com Redirect

What is searchisweb.com?

searchisweb.com is a fake Internet search engine identical to miyake-inc.com, doseofhealthy.com, chinimplants.website, and many others. Judging on appearance alone, searchisweb.com may seem identical to Google, Yahoo, Bing and other legitimate Internet search engines.

Therefore, users often believe that searchisweb.com is also legitimate. In fact, this rogue site gathers various information relating to users' Internet browsing activity. Furthermore, developers promote it via deceptive software download/installation set-ups that hijack web browsers and modify various options without consent.

   
Hao.7654.com Redirect

What is hao.7654.com?

hao.7654.com is a fake Internet search engine similar to hao.360.cn. By falsely claiming to generate improved search results and providing quick access to various popular websites, hao.7654.com attempts to give the impression of legitimacy.

In fact, developers promote this site via deceptive software download/installation tools that hijack web browsers and modify various options. In addition, hao.7654.com monitors users' Internet browsing activity.

   

Page 1807 of 2139

<< Start < Prev 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal