Virus and Spyware Removal Guides, uninstall instructions

AudioToAudio Toolbar

What is hp.myway.com?

Developed by Mindspark Interactive Network, AudioToAudio is a rogue application that supposedly allows conversion of various audio formats.

Many users believe that AudioToAudio is a legitimate and useful application, however, this application is classed as a browser hijacker and a potentially unwanted program (PUP). AudioToAudio infiltrates systems without users' permission, causes unwanted browser redirects, and continually gathers information relating to Internet browsing activity.

   
Help_you@india.com Ransomware

What is help_you@india.com?

help_you@india.com is regular ransomware-type malware originating from the Purge virus family. Research shows that help_you@india.com is designed to encrypt a variety of files stored on the system.

During encryption, help_you@india renames encrypted files using the "[7_random_letters].[help_you@india.com].[17_random letters_and_numbers].xtbl" pattern (e.g., bhaYgCM.help_you@india.com.CGzp76HGV832ajfbO.xtbl).

Following successful encryption, help_you@india.com creates a "How to restore files.hta" file (a pop-up window that informs victims of the encryption) and places it in each existing folder.

   
.Odin Ransomware

What is Odin?

Odin is a new version of Locky ransomware. Cyber criminals proliferate Odin via malicious script files attached to spam emails. Once the script is executed, a malicious encrypted file is downloaded, decrypted, and executed using a Windows program (Rundll32.exe).

This malicious file then encrypts and renames various files (for example, .doc, .ppt, .php, .html, etc.) stored on the computer.

Odin has identical behavior to its previous version (Locky), however, rather than adding a ".locky" or ".zepto" extension, this version appends ".odin". The files are renamed using the "[Victim ID]-[4 symbols]-[12 symbols].odin" pattern (e.g., "sample.jpg" might be renamed to "D56F3331-E80D-9E17-8D2A-1A11D40A6BD3.odin").

Following successful encryption, Odin creates three files ("_5_HOWDO_text.html", "_HOWDO_text.bmp" [set as the desktop wallpaper], and "_HOWDO_text.html") and places them on the desktop.

   
Usr0 Ransomware

What is Usr0?

Usr0 is a ransomware-type virus that infiltrates the system and encrypts a number of file types (e.g., .jpg, .doc, .ppt, etc.) stored on the infected system.

This ransomware adds the ".usr0" extension to the name of each encrypted file (e.g., "sample.jpg" is renamed to "sample.jpg.usr0"). Once files are encrypted, Usr0 creates a text file ("Важная информация.txt"), placing it on the desktop.

   
Help_dcfile Ransomware

What is help_dcfile?

Help_dcfile is a ransomware designed to encrypt files using asymmetric cryptography. During encryption, help_dcfile modifies the names of encrypted files using the "10_random_characters.xxx" pattern. For example, "sample.jpg" might be renamed to "Kf4lAyhpGm.xxx".

Once the files are encrypted, help_dcfile opens a window and creates a text file ("help_dcfile.txt", placed on the desktop), both containing a ransom-demand message.

   
Unblockupc Ransomware

What is Unblockupc?

Unblockupc is ransomware-type malware that stealthily infiltrates the system and encrypts files using AES-128 cryptography. Unlike other ransomware, Unblockupc does not change the names of encrypted files or add any type of extension.

Following successful encryption, Unblockpc generates a ransom-demand message containing a text file ("Files encrypted.txt", which is placed in each folder containing encrypted files) and changes the desktop wallpaper.

   
Slivnewbest.ru Redirect

What is slivnewbest.ru?

Identical to chromestart4.ru, climbon.top, mystartpage1.ru, and a number of other rogue sites, slivnewbest.ru/i/rt5.html is a fake Internet search engine that supposedly generates the most relevant search results. 

Many users believe that this website is legitimate and useful, however, developers promote slivnewbest.ru using rogue software download/installation set-ups designed to hijack web browsers (Internet Explorer, Google Chrome, and Mozilla Firefox) and stealthily modify various options.

In addition, slivnewbest.ru continually monitors users' Internet browsing activity by gathering various user/system data.

   
Climbon.top Redirect

What is climbon.top?

climbon.top is a fake Internet search engine identical to searchqq.com, ttczmd.com, blankpage3.ru, tavanero.info, and many other sites. By falsely claiming to generate the most relevant search results, climbon.top attempts to give the impression of legitimacy.

In fact, developers promote this site using rogue software downloaders/installers designed to modify Internet browser options without users' consent. Furthermore, climbon.top gathers information relating to users' Internet browsing activity.

   
Ad Expert Browser Adware

What is Ad Expert Browser?

Ad Expert Browser is a deceptive application that supposedly provides various information relating to online advertising. Ad Expert Browser may seem legitimate and useful, however, this application is categorized as adware and a potentially unwanted program (PUP).

There are three main reasons for these negative associations: 1) stealth installation without users' consent; 2) display of intrusive online advertisements, and; 3) monitoring of users' Internet browsing activity.

   
Searchqq.com Redirect

What is searchqq.com?

searchqq.com is a fake Internet search engine identical to searchiksa.com, chromestart4.ru, wzscnet.com, and many others. By falsely claiming to generate the most relevant search results, searchqq.com attempts to give the impression of legitimacy.

Be aware, however, that developers promote this site via deceptive software download and/or installation tools that stealthily modify web browser settings without consent. In addition, searchqq.com continually tracks users' Internet browsing activity by recording various user/system data.

   

Page 1950 of 2274

<< Start < Prev 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal