Virus and Spyware Removal Guides, uninstall instructions

Wbxd Ransomware

Wbxd ransomware removal instructions

What is Wbxd?

Wbxd belongs to the Djvu ransomware family. It encrypts files and modifiy their filenames by appending the ".wbxd" extension. For example, after encryption a file named "1.jpg" is renamed to "1.jpg.wbxd", "2.jpg" is renamed to "2.jpg.wbxd", and so on. Also, this ransomware creates a ransom note ("_readme.txt" text file) that contains instructions on how to contact ransomware developers, price of a decryption (and some other details), it creates that note in every folder that contains encrypted files.

   
SkillApplication Adware (Mac)

How to remove SkillApplication from Mac?

What is SkillApplication?

SkillApplication generates unwanted ads, changes browser settings and possibly collects browsing-related and/or other data. Therefore, this app is classified not only as adware but also as a browser hijacker. In most cases users download and install apps of this type unknowingly, therefore, SkillApplication is categorized as potentially unwanted application (PUA). It is worthwhile to mention that this app is distributed via fake Adobe Flash Player installer.

   
LiveRadioSearch Browser Hijacker

LiveRadioSearch browser hijacker removal instructions

What is LiveRadioSearch?

LiveRadioSearch promotes the liveradiosearch.com address, a fake search engine. Like most apps of this type, LiveRadioSearch promotes that address by changing browser settings without user's permission. Moreover, it gathers browsing-related data. Usually users download and install browser hijackers unintentionally/unknowingly, for this reason LiveRadioSearch is categorized as potentially unwanted application (PUA).

   
Aulmhwpbpzi Ransomware

Aulmhwpbpzi ransomware removal instructions

What is Aulmhwpbpzi?

Aulmhwpbpzi belongs to the Snatch ransomware family. It encrypts and renames files by appending its extension (".aulmhwpbpzi") to their filenames. For example, it renames a file named "1.jpg" to "1.jpg.aulmhwpbpzi", "2.jpg" to "2.jpg.aulmhwpbpzi". Aulmhwpbpzi creates a ransom note, the "HOW TO RESTORE YOUR FILES.TXT" file as well. This file can be found in all folders that contain encrypted files.

   
Bestpeacheu.com POP-UP Scam (Mac)

How to remove apps that pages like bestpeacheu[.]com promote?

What is bestpeacheu[.]com?

Typically, websites like bestpeacheu[.]com are promoted via various shady websites, dubious ads or potentially unwanted applications (PUAs). In other words, users do not visit them intentionally. Typically, the main purpose of pages like bestpeacheu[.]com is to trick visitors into downloading some PUA.

   
Private Deep Browser Hijacker

Private Deep browser hijacker removal instructions

What is Private Deep?

Typically, apps that are classified as a browser hijackers change browser settings without user's permission, they change them to an address of some fake search engine. Private Deep promotes the keysearchs.com address. Also, it collects browsing history. It is not common that users download and install browser hijackers intentionally, therefore, Private Deep is categorized as potentially unwanted application (PUA).

   
M88P Ransomware

M88P ransomware removal instructions

What is M88P?

M88P encrypts files and changes the filename of every encrypted file by replacing it with the marco88Polo@criptext.com email address, a string of random characters and the ".M88P" extension. For example, it renames a file named "1.jpg" to "[Marco88Polo@criptext.com].2dTJHVkP-KGU2jY25.M88P", "2.jpg" to "[Marco88Polo@criptext.com].3cKYFElO-BFT4hT32.M88P", and so on. M88P creates a ransom note (the "#README_M88P#.rtf" file) in all folders that contain encrypted files. This ransomware belongs to the ransomware family called Matrix.

   
Fast2captcha.com Ads

Fast2captcha[.]com redirect removal instructions

What is fast2captcha[.]com?

Fast2captcha[.]com is more or less similar to myniceposts[.]com, fastsolvecaptcha[.]com, kersatur[.]online and a great number of other pages. It is worthwhile to mention that users do not visit such pages intentionally, usually they get opened by installed potentially unwanted applications (PUAs), through other shady pages or via unreliable advertisements.

   
DHL Failed Delivery Notification Email Virus

DHL Failed Delivery Notification email virus removal guide

What is DHL Failed Delivery Notification email virus?

One of the popular ways that cyber criminals use to deliver malware is to send emails that contain some malicious attachment or a download link for malicious file. Usually such emails are disguised official, important letters from legitimate companies, organizations. The main purpose of these emails is to trick recipients into opening a malicious file that is designed to install malware. This particular email is disguised as a delivery notification from DHL, it has a malicious archive file attached to it that contains a installer for Agent Tesla.

   
TeslaRVNG1.5 Ransomware

TeslaRVNG1.5 ransomware removal instructions

What is TeslaRVNG1.5?

TeslaRVNG1.5 belongs to the Ouroboros ransomware family. This ransomware encrypts files and renames them by prepending victim's ID, tesla369@cock.li email address and appending ".teslarvng1.5" extension to their filenames. For example, it renames a file named "1.jpg" to "id[7vvnbvnj].[tesla369@cock.li].1.jpg.teslarvng1.5", "2.jpg" to "id[7vvnbvnj].[tesla369@cock.li].2.jpg.teslarvng1.5", and so on. Also, it creates a ransom note (the "teslarvng1.5.hta" file) and displays it in a pop-up window.

   

Page 8 of 1180

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal