Virus and Spyware Removal Guides, uninstall instructions

DefaultAnalog Adware (Mac)

What is DefaultAnalog?

DefaultAnalog is an adware-type application with browser hijacker traits. Following successful installation, it delivers intrusive advertisement campaigns, modifies browser settings and promotes fake search engines. On Safari browsers, this app promotes 0yrvtrh.com, whilst on Google Chrome, search.adjustablesample.com.

Furthermore, most adware-type apps and browser hijackers collect browsing-related information. Since most users download/install DefaultAnalog inadvertently, it is classified as a Potentially Unwanted Application (PUA).

   
ApocalypseClipper Malware

What is ApocalypseClipper?

ApocalypseClipper is clipper malware that targets cryptocurrency wallet addresses. I.e., it hijacks cryptocurrency transactions by replacing wallet addresses entered by users with those owned by the cyber criminals behind ApocalypseClipper. This malware is for sale on a hacker forum and costs the equivalent of 549.99 rubles.

   
Groooboor Trojan

What is the Groooboor Trojan?

Groooboor is malicious software classified as a backdoor Trojan. This malware open a "backdoor" for other malicious programs to infiltrate. I.e., Groooboor can download/install additional malware. This type of malware can infect systems with other types of Trojans, ransomware, cryptominers and other malicious software.

Groooboor has been observed being proliferated through infectious Microsoft Word documents, and is likely distributed via dangerous websites and/or spam campaigns.

   
CoronaCrypt0r Ransomware

What is CoronaCrypt0r?

Discovered by MalwareHunterTeam, CoronaCrypt0r is ransomware designed to encrypt files, change filenames, lock the computer screen and display a ransom message. It renames encrypted files by appending the ".Lock" extension to filenames.

For example, it would rename "1.jpg" to "1.jpg.Lock", "2.jpg" to "2.jpg.Lock", and so on. CoronaCrypt0r also displays a ransom message in a pop-up window.

   
Bitcoin Miner Scam

What is Bitcoin Miner Pro?

There are various cryptocurrency miners available for download on the internet, however, not all are legitimate. An example of a fake cryptocurrency miner is Bitcoin Miner Pro. Scammers behind these miners generate profit by tricking users into paying a withdrawal fee. You are strongly advised to research all cryptocurrency miners and ensure that they are legitimate before use.

   
SearchTheConverter Browser Hijacker

What is SearchTheConverter?

SearchTheConverter is a browser hijacker, which operates by making modifications to browser settings to promote searchtheconverter.com (a fake search engine). Additionally, this browser hijacker has data tracking capabilities, which are employed to monitor users' browsing habits.

Due to the dubious techniques used to proliferate searchtheconverter.com, it is classified as a Potentially Unwanted Application (PUA).

   
AssistiveModule Adware (Mac)

What is AssistiveModule?

The AssistiveModule application generates revenue for its developers by feeding users with various advertisements. Adware-type apps also track and record information, and this might also include AssistiveModule. In some cases, adware promotes fake search engine addresses by changing certain browser settings.

Commonly, users download and install apps such as AssistiveModule unintentionally and, for this reason, they are categorized as potentially unwanted applications (PUAs).

   
LogarithmicRecord Adware (Mac)

What is LogarithmicRecord?

LogarithmicRecord is an adware-type application with browser hijacker traits. This app runs intrusive advertisement campaigns and makes alterations to browser settings to promote a fake search engine. Additionally, most adware type apps and browser hijackers collect browsing-related information.

Due to the dubious methods used to proliferate LogarithmicRecord, it is classified as a Potentially Unwanted Application (PUA).

   
Talkline Communications Email Virus

What is Talkline Communications email virus?

Cyber criminals behind malspam campaigns attempt to trick recipients into executing a file designed to install malicious software. They attach the file to an email or send a website link designed to download it (or open a download page for the file). Typically, these emails are disguised as official and important, and sent from a legitimate company.

In this case, they send emails disguised as messages from Talkline Communications. Their main goal is to deceive users into opening a malicious document, which can be downloaded through the included website link and designed to install TrickBot.

   
POLÍCIA SEGURANÇA PÚBLICA Email Scam

What is the "POLÍCIA SEGURANÇA PÚBLICA" scam email?

"POLÍCIA SEGURANÇA PÚBLICA" is a scam email targeting Portuguese-speaking users. These deceptive messages are presented as notifications of a lodged virtual complaint sent by the "Electronic Police Station". Note that all information presented in these emails is false.

The "POLÍCIA SEGURANÇA PÚBLICA" scam messages contain links to websites containing malware.

   

Page 1285 of 2331

<< Start < Prev 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal