Virus and Spyware Removal Guides, uninstall instructions

INHORSEWETRUST Ransomware

What is INHORSEWETRUST ransomware?

INHORSEWETRUST is the name of a malicious program, which is designed to encrypt data and demand payment for the decryption. In other words, this malware renders files unusable and asks victims to pay - to recover access/use of their data.

During the encryption process, files are appended with "INHORSEWETRUST". For example, a file like "1.jpg" would appear as "1.jpgINHORSEWETRUST", and so on for all of the affected files. After the completion of this process, ransom notes - "#Decrypt#.txt" - are created.

   
InstaQuick Adware

What kind of application is InstaQuick?

InstaQuick is a rogue application, endorsed as a tool for desktop access to the Instagram social media platform. This piece of software is classified as adware due to running intrusive advertisement campaigns.

In other words, InstaQuick delivers various ads. Additionally, most adware-types have data tracking abilities, which are used to spy on users' browsing activity and collect sensitive/private information extracted from it.

Due to the questionable techniques employed in InstaQuick's distribution, it is also categorized as an unwanted application.

   
Thewowfeed.com Ads

What is thewowfeed[.]com?

Typically, websites such as thewowfeed[.]com promote other untrusted web pages or load dubious content. In any case, you should never trust sites of this type. They are usually opened by installed potentially unwanted applications (PUAs), through deceptive advertisements or other dubious web pages. I.e., users do not often visit pages such as thewowfeed[.]com intentionally. Examples of other, similar sites are hipermovies[.]icu, gdanstum[.]net and vviewpoint[.]biz.

   
Time4news.net Ads

What is time4news[.]net?

Time4news[.]net is a rogue site designed to load dubious content and/or get redirected to other webpages (likely, untrustworthy or malicious ones). The Web is full of similar pages; subordingry.websitecaptchadecode.com, and contentgate.xyz - are just a few examples.

Users seldom access rogue sites intentionally. Most enter them via redirects caused by suspicious webpages, intrusive advertisements, installed PUAs (Potentially Unwanted Applications). These apps can infiltrate systems without express user permission.

   
TopSearchConverters Browser Hijacker

What is TopSearchConverters?

TopSearchConverters is a rogue browser extension promoting the topsearchconverters.com fake search engine. Due to this behavior, it is classified as a browser hijacker. Furthermore, TopSearchConverters likely collects browsing-related data. Due to the questionable methods used to distribute browser hijackers, they are also categorized as PUAs (Potentially Unwanted Applications).

   
FickerStealer Malware

What is FickerStealer?

FickerStealer is a malicious program categorized as a stealer. It extracts (steals) various sensitive and private information from infected devices. FickerStealer malware targets Windows Operating Systems: Windows XP through to Windows 10. Since the developers of this malicious program offer it for sale online, how it is proliferated depends on the cyber criminals using it.

   
Gooolag Ransomware

What is Gooolag ransomware?

Gooolag is the name of a malicious program classified as ransomware. It operates by encrypting data and demanding ransoms for the decryption. In simple terms, the files affected by Gooolag become inaccessible, and victims are asked to pay - to restore access to their data.

During the encryption process, files are appended with the ".crptd" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.crptd", "2.jpg" as "2.jpg.crptd", and so forth. After this process is complete, a ransom note - "How To Restore Your Files.txt" - is dropped onto the desktop.

   
ProStreamSearch Browser Hijacker

What is ProStreamSearch?

ProStreamSearch is a browser hijacker. It modifies browser settings to promote (by causing redirects to) the prostreamsearch.com fake search engine. Additionally, ProStreamSearch likely spies on users' browsing habits, as that is typical of such software. Due to the dubious techniques used to distribute browser hijackers, they are also classified as PUAs (Potentially Unwanted Applications).

   
BiggyLocker Ransomware

What is BiggyLocker ransomware?

BiggyLocker is a piece of malicious software categorized as ransomware. It is designed to encrypt data and demand payment for the decryption. In other words, this ransomware renders files unusable and asks victims to pay a ransom - to restore access and user of the data.

During the encryption process, affected files are appended with the ".$big$" extension. For example, a file initially named something like "1.jpg" would appear as "1.jpg.$big$", "2.jpg" as "2.jpg.$big$", and so on. After this process is complete, a ransom note - "read_me.txt" - is dropped onto the desktop.

   
JanusLocker Ransomware

What is JanusLocker ransomware?

JanusLocker is a new variant of the ByteLocker ransomware. It operates by encrypting files in order to demand payment for the decryption. In other words, the affected files are rendered inaccessible, and victims are asked to pay a ransom - to restore access to their data.

During encryption, files are appended with the ".HACKED", yet after this process is completed - the added extension is no longer present. To elaborate, while JanusLocker is encrypting data, a file titled "1.jpg" would appear as "1.jpg.HACKED" - but the original filename ("1.jpg") returns once the file is fully encrypted.

Afterwards, this ransomware displays a ransom note in a pop-up window. At the time of research, JanusLocker was a decryptable malware, and victims may still be able to recover their data (more information below).

   

Page 1067 of 2383

<< Start < Prev 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal