Virus and Spyware Removal Guides, uninstall instructions

UpdateAdmin Adware (Mac)

What is UpdateAdmin?

UpdateAdmin is designed to serve advertisements, promote 6v5f3l.com and search.basicgeneration.com (fake search engines), and collect sensitive information. This app functions as adware and a browser hijacker.

Typically, users do not download or install UpdateAdmin or similar apps intentionally and, for this reason, they are classified as potentially unwanted applications (PUAs). Developers attempt to trick users into installing UpdateAdmin via a fake installer for Adobe Flash Player.

   
MixedFin Browser Hijacker

What is MixedFin?

MixedFin is a typical browser hijacker, which promotes a fake search engine and forces users to visit this address under certain conditions. It also collects browsing-related information. Most users download and install MixedFin and other browser hijackers inadvertently and, therefore, the programs are classified as potentially unwanted applications (PUAs).

   
ELDAOSLA Ransomware

What is ELDAOSLA?

ELDAOSLA is a part of the Phobos ransomware family. It encrypts files, modifies their filenames, creates the "info.txt" text file (a ransom message) and displays a pop-up window (another ransom message). ELDAOSLA renames files by adding victims' IDs, ICQ username owned by its developers, and appending ".ELDAOSLA" as the file extension.

For example, "1.jpg" is renamed to "1.jpg.id[C279F237-3058].[ICQ_KONSKAPISA].ELDAOSLA", "2.jpg" to "2.jpg.id[C279F237-3058].[ICQ_KONSKAPISA].ELDAOSLA", and so on.

   
PowerSuite Unwanted Application (Mac)

What is PowerSuite?

PowerSuite is advertised as a tool that frees up disk space, and removes junk and duplicate files and unwanted applications, however, it is likely that developers use dubious methods to distribute this program (e.g., a marketing method called "bundling"). Therefore, PowerSuite is categorized as a potentially unwanted application (PUA).

   
Hard2decrypt Ransomware

What is Hard2decrypt?

Hard2decrypt is ransomware that encrypts and renames files, and creates a ransom message for each encrypted file. It renames encrypted files by appending the ".hard2decrypt" extension. More precisely, "1.jpg" is renamed to "1.jg.hard2decrypt", "2.jpg" to "2.jg.hard2decrypt", and so on.

Ransom messages created by Hard2decrypt are named according to the names of the encrypted files. For example, if an encrypted file is named "1.jg.hard2decrypt", its associated ransom message is named "1.jpg.hard2decrypt_readme", and the associated ransom message for a file named "2.jg.hard2decrypt" would be named "2.jpg.hard2decrypt_readme", and so on.

Note that Hard2decrypt is a new variant of WastedLocker ransomware.

   
IMovieSearch Browser Hijacker

What is IMovieSearch?

IMovieSearch promotes imoviesearch.com, the address of a fake search engine. Like most apps of this type, it achieves this by changing certain browser settings. IMovieSearch also collects browsing data. Note that browser hijackers are classified as potentially unwanted applications (PUAs), since most users download and install them inadvertently.

   
CURATOR Ransomware

What kind of malware is CURATOR?

CURATOR ransomware encrypts victims' files, modifies the name of each encrypted file by appending its extension, and creates a ransom message (text file) in all folders that contain encrypted files.

It renames files by appending ".CURATOR" to filenames. For example, "1.jpg" is renamed to "1.jpg.CURATOR", "2.jpg" to "2.jpg.CURATOR", and so on. The ransom message created by CURATOR appears in a text file named "!=HOW_TO_DECRYPT_FILES=!.txt".

   
Search.basicgeneration.com Redirect (Mac)

What is search.basicgeneration.com?

search.basicgeneration.com appears in browser settings after installation of adware/browser hijackers (for example, ExecutiveOperation). This is a fake search engine that does not generate any unique results. Apps that promote fake search engines serve ads and collect various user-system information.

They are, therefore, categorized as potentially unwanted applications (PUAs).

   
ExecutiveOperation Adware (Mac)

What is ExecutiveOperation?

The ExecutiveOperation application functions as adware, a browser hijacker, and as a data collector. It serves advertisements, promotes two fake search engines by changing browser settings, and gathers private, sensitive information.

Generally, users download and install ExecutiveOperation and similar apps inadvertently and, for this reason, they are categorized as potentially unwanted applications (PUAs). ExecutiveOperation is distributed via fake installer that is disguised as an installer for Adobe Flash Player.

   
Windows Error Code: WIN.DLL0151930 POP-UP Scam

What is Windows Error Code: WIN.DLL0151930?

Technical support scam websites such as this one often trick unsuspecting visitors into believing that their computers are infected with a virus or multiple viruses (or that some other problem exists) and into calling the provided number.

Once contacted, scammers behind such web pages attempt to trick callers into paying for unnecessary software and services, or providing remote access to their computers. Therefore, this and other similar websites should be ignored.

   

Page 1226 of 2337

<< Start < Prev 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal