Virus and Spyware Removal Guides, uninstall instructions

MacFly Pro Unwanted Application (Mac)

How to remove MacFly Pro from Mac?

What is MacFly Pro?

MacFly Pro is advertised as a simple and powerful app that that improved Mac maintenance. However, it is likely that this app is promoted using questionable methods. In other words, there is a possibility that there could be users who would download and install MacFly Pro unknowingly. Apps that users install on their computers inadvertently are called potentially unwanted applications (PUA).

   
TypicalInput Adware (Mac)

How to remove TypicalInput from Mac?

What is TypicalInput?

TypicalInput is classified as adware because it generates ads. Although, it can be called a browser hijacker as well. It is because it promotes a fake search engine (its address) by changing browser settings without user's permission. Additionally, it is likely that this app collects browsing data and/or other information. It is uncommon for apps like TypicalInput (adware, browser hijackers) to be downloaded and installed by users intentionally. For this reason they are called potentially unwanted applications (PUAs).

   
Search Lovely Browser Hijacker

Search Lovely browser hijacker removal instructions

What is Search Lovely?

Apps like Search Lovely are classified as browser hijackers because they change browser settings to force users to visit a certain address (use a certain fake search engine). This particular app promotes tailsearch.com. Another common issue with browser hijackers is that they collect browsing-related and/or other information. In most cases users download and install apps like Search Lovely unknowingly, therefore, they are categorized as potentially unwanted applications.

   
Rubly Ransomware

Rubly ransomware removal instructions

What is Rubly?

Rubly encrypts files and displays a ransom note in a pop-up window. Also, it renames every encrypted file by appending the ".rubly" extension to its filename. For instance, it renames a file named "1.jpg" to "1.jpg.rubly", "2.jpg" to "2.jpg.rubly", and so on. Rubly is a part of the Jigsaw ransomware family.

   
Aol Ransomware

Aol ransomware removal instructions

What is Aol ransomware?

Aol is the name of ransomware that belongs to the family of ransomware called Dharma. It encrypts files and renames them. Also, it creates the "FILES ENCRYPTED.txt" file and displays a pop-up window - ransom notes. Aol renames files by adding victim's ID, astra2eneca@aol.com email address and appending the ".aol" extension. For example, it renames "1.jpg" to "1.jpg.id-C279F237.[astra2eneca@aol.com].aol", "2.jpg" to "2.jpg.id-C279F237.[astra2eneca@aol.com].aol", and so on.

   
JSSLOADER RAT

JSSLOADER virus removal guide

What is JSSLOADER?

JSSLOADER is the name of a Remote Access Trojan (RAT) that is capable of exfiltrating data, executing commands, downloading other malware, auto-updating itself and preventing itself from being debugged (analyzed). It is known that JSSLOADER is mostly used by the group of cyber criminals called FIN7.

   
Hub Ransomware

Hub ransomware removal instructions

What is Hub ransomware?

Hub encrypts victim's files, renames every encrypted file by adding the victim's ID, crypthub@tuta.io email address and appending ".hub" extension. For example, it renames a file named "1.jpg" to "1.jpg.id-C279F237.[crypthub@tuta.io].hub", "2.jpg" to "2.jpg.id-C279F237.[crypthub@tuta.io].hub", and so forth. Also, it displays a pop-up window and creates the "FILES ENCRYPTED.txt", both of them contain instructions on how to contact ransomware developers. Hub belongs to the Dharma ransomware family.

   
SampleConsole Adware (Mac)

How to remove SampleConsole from Mac?

What is SampleConsole?

SampleConsole generates advertisements, modifies browser's settings/promotes a fake search engine and collects sensitive information. It functions as adware, browser hijacker and data collector. It is uncommon for apps like SampleConsole to be downloaded and installed by users intentionally, for this reason they are categorized as potentially unwanted applications (PUAs).

   
Crazy Ransomware

Crazy ransomware removal instructions

What is Crazy ransomware?

The Crazy ransomware belongs to the VoidCrypt ransomware family. It blocks access to files by encrypting them, renames every encrypted file and creates the "!INFO.HTA" file that is designed to open a pop-up window that contain a ransom note. Crazy renames files by adding the crazykillerusakk@hotmail.com email address, victim's ID and appending the ".crazy" extension. For example, it renames a file named "1.jpg" to "1.jpg.[crazykillerusakk@hotmail.com][VA7ZKYXEJ53UMRF].crazy", "2.jpg" to "2.jpg.[crazykillerusakk@hotmail.com][VA7ZKYXEJ53UMRF].crazy", and so on.

   
Finding Pro Browser Hijacker

Finding Pro browser hijacker removal instructions

What is Finding Pro?

Finding Pro browser hijacker that promotes the tailsearch.com address, a fake search engine. Typically, apps of this type promote fake search engines by changing certain browser settings without user's permission. Additionally, Finding Pro collects browsing history, although, it is possible that it targets other data as well. Most of the times users download and/or install browser hijackers unknowingly, for this reason Finding Pro and other apps of this type are called potentially unwanted applications (PUAs).

   

Page 9 of 1178

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal