Virus and Spyware Removal Guides, uninstall instructions

SampleCheck Adware (Mac)

What is SampleCheck adware?

SampleCheck generates revenue for its developer by displaying ads and promoting a specific website (fake search engine). Most users download and install advertising-supported software and browser hijackers like SampleCheck unknowingly. Thus, SampleCheck and similar apps are categorized as potentially unwanted applications (PUAs).

   
Covid-19 Stimulus Payment Email Scam

What is "Covid-19 stimulus payment Email Scam"?

"Covid-19 stimulus payment Email Scam" refers to a spam campaign. These scam emails claim to contain the receipt of a COVID-19 stimulus payment. Instead, the fake letters have a phishing file attached to them. This attachment attempts to trick users into disclosing their email account log-in credentials.

   
ANSR Email Virus

What is ANSR email virus?

The purpose of emails used to deliver malware is to trick recipients into opening a malicious file. Usually, these emails are disguised as letters from legitimate institutions, companies, or other entities. This particular malspam campaign is used to distribute a malicious VBS script.

   
Mp3convert.cc Suspicious Website

What is the mp3convert[.]cc website?

Mp3convert[.]cc is a rogue site capable of converting videos hosted on various online platforms (e.g., YouTube, Facebook, Instagram, etc.) to downloadable MP3 audio files. This website infringes copyright laws and endangers device/user safety.

Mp3convert[.]cc uses rogue advertising networks, which endorse untrustworthy and malicious webpages. Using these networks for monetizing sites is common. Hence, there are countless pages of this kind online; 1stkissmanga.comonlymp3.nety2convert.net, and rarbg.to are just some examples.

   
MME Ransomware

What is MME ransomware?

MME encrypts files and appends the ".MME" extension to their filenames (for example, it renames "1.jpg" to "1.jpg.MME", "2.jpg" to "2.jpg.MME"). MME also creates the "Read_Me.txt" file (a ransom note) containing instructions on how to contact the attackers.

   
TopADSBlockSearch Browser Hijacker

What is TopADSBlockSearch?

TopADSBlockSearch is a rogue browser extension. It modifies browsers and promotes the topadsblock.com fake search engine; due to this - it is categorized as a browser hijacker. Furthermore, the questionable methods used to distribute browser hijackers also classify them as PUAs (Potentially Unwanted Applications).

   
Stream-best-vid.com Ads

What is stream-best-vid[.]com website?

The purpose of stream-best-vid[.]com page is to get permission to show notifications and promote questionable websites. There are hundreds of pages like stream-best-vid[.]com (for example, financesurvey24[.]top, emoxan[.]xyz, arfanbajt[.]xyz). Users open them unintentionally.

   
Yt5s.com Suspicious Website

What is yt5s[.]com?

Yt5s[.]com is a rogue website allowing users to download audio and/or video from YouTube. Sites of this type infringe copyright laws; however, they also pose threats to their visitors. Yt5s[.]com employs rogue advertising networks, through which it promotes various untrustworthy and malicious websites.

There are thousands of rogue sites that are monetization in this manner on the Web; y2convert.net1337x.toyt1s.com1stkissmanga.com, and up-load.io are but a few examples.

   
Win 10 Tweaker Unwanted Application

What program is Win 10 Tweaker?

Win 10 Tweaker is a questionable Windows customization tool. Multiple antivirus scanners on VirusTotal detect the installer for Win 10 Tweaker as malicious. Therefore, it is strongly recommended not to trust this program. It is very likely that Win 10 Tweaker is promoted using questionable download sources.

   
Supersuso Ransomware

What is Supersuso ransomware?

Supersuso is a ransomware-type program. It is designed to encrypt data (lock files) and demand payment for the decryption.

During the encryption process, files are appended with the ".ICQ_SUPERSUSO" extension. For example, a file like "1.jpg" would appear as something similar to "1.jpg.ICQ_SUPERSUSO", and so on for all of the compromised files. Afterwards, a ransom note - "#Decrypt#.txt" - is created.

   

Page 756 of 2134

<< Start < Prev 751 752 753 754 755 756 757 758 759 760 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal