Virus and Spyware Removal Guides, uninstall instructions

Multy App Browser Hijacker

What is Multy App?

Multy App is a browser hijacker endorsed as a multi-purpose tool that supposedly provides quick access to services such as search engines, encyclopedias, email, social networking and social media, e-commerce and online stores. In fact, Multy App operates by modifying browsers to promote searchmulty.com (a fake search engine).

Additionally, this browser hijacker has data tracking capabilities, which it employs to monitor users' browsing activity. Most users install Multy App inadvertently, and therefore it is also categorized as a Potentially Unwanted Application (PUA).

   
Corona-Virus-Map.com Trojan

What is Corona-Virus-Map.com?

Despite its name, Corona-Virus-Map.com is not the address of a website - it is the name of a malicious program classified as a Trojan (or more specifically, a "backdoor" Trojan). This type of malware causes chain infections by stealthily downloading and installing additional malicious programs.

Corona-Virus-Map.com is presented as software that allows users to view the progress/spread of the Corona virus epidemic in real time. In fact, this Trojan proliferates AZORult malware.

   
G3treal0ne.space POP-UP Scam (Mac)

What is g3treal0ne[.]space?

g3treal0ne[.]space is an untrusted website that redirects visitors to other web pages of this kind. For example, it leads visitors to pages that promote various software 'cracking' tools, rogue installers (e.g., fake Adobe Flash Player installers), potentially unwanted applications (PUAs), and other dubious sites.

Therefore, never trust g3treal0ne[.]space or websites that are opened through it. Note that sites such as g3treal0ne[.]space are usually opened through dubious web pages, deceptive advertisements or Potentially Unwanted Programs (PUAs) that are installed on browsers and/or operating systems.

   
Gtf Ransomware

What is the Gtf ransomware?

Discovered by Jakub Kroustek, Gtf is a malicious program belonging to the Dharma ransomware family. It operates by encrypting the data of infected systems to demand payment for decryption tools/software.

During the encryption process, all affected files are renamed according to the following pattern: original filename, unique ID, cyber criminals' email address and the ".GTF" extension. For example, "1.jpg" would appear as something similar to "1.jpg.id-1E857D00.[grandtheftfiles@aol.com].GTF", and so on.

Another varaint of Gtf ransomware appends ".[getthefiles2@protonmail.ch].gtf" extension. After this process is complete, a text file ("FILES ENCRYPTED.txt") is created on the desktop and a pop-up window is displayed.

   
BrowserProduct Adware (Mac)

What is the BrowserProduct adware?

BrowserProduct is supposedly designed to improve the browsing experience. In fact, this application delivers intrusive advertisements and is, therefore, classified as adware. Additionally, most apps of this type have data tracking capabilities.

Due to the dubious proliferation methods used to promote this rogue software, BrowserProduct is also classed as a Potentially Unwanted Application (PUA).

   
Deranvizes POP-UP Scam (Mac)

What are the Deranvizes websites?

Deranvizes is a deceptive website group promoting various online scams. Web pages from this group have been observed promoting the "Dear Safari User, You Are Today's Lucky Visitor" scheme, however, they might also promote other scams.

Few users enter these websites intentionally - they are redirected to them by intrusive advertisements or Potentially Unwanted Applications (PUAs) already installed on the system.

   
InnovativeShare Adware (Mac)

What is InnovativeShare?

The InnovativeShare application is supposedly designed to improve the browsing experience, however, it is categorized as adware and displays intrusive advertisements. These apps often gather information. Generally, users download and install adware unintentionally.

Therefore, InnovativeShare and other, similar apps are classified as potentially unwanted applications (PUAs).

   
Ostap Downloader

What is Ostap?

Ostap is a JavaScript downloader used by cyber criminals to spread TrickBot, a trojan-type malicious programs that steals various personal, sensitive information. Cyber criminals use the details generate revenue in various ways. If you believe that your computer is infected with Ostap downloader (dropper) or Trickbot, remove these malicious programs immediately.

   
JavaEncrypt Ransomware

What is JavaEncrypt?

Discovered by Jirehlov, JavaEncrypt (also known as JavaLocker) is malicious software classified as ransomware. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption. During the encryption process, all compromised files are appended with the ".javaencrypt" or ".javalocker" extension.

For example, following encryption, a file such as "1.jpg" would appear as "1.jpg.javaencrypt" or "1.jpg.javalocker". After this process is complete, a ransom message within the "readmeonnotepad.javaencrypt" file is dropped into every compromised folder.

   
I Know A Lot More Things About You Email Scam

What is "I Know A Lot More Things About You"?

There are many examples of spam campaigns on the internet. Cyber criminals/scammers proliferate them to deceive unsuspecting recipients into transferring certain sums of money (cryptocurrency).

They claim that they used the recipient's webcam to record humiliating videos (or webcam photos) and threaten to proliferate this content, unless the recipient pays within a specific period. These emails are bogus and should never be trusted.

   

Page 1414 of 2329

<< Start < Prev 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal