Virus and Spyware Removal Guides, uninstall instructions

Jerry_glanville Ransomware

What is Jerry_glanville ransomware?

Jerry_glanville (also known as Balaclava) ransomware was discovered by dnwls0719. Like many other programs of this type, it encrypts files, changes filenames and creates a ransom message. Jerry_glanville renames files by appending the "jerry_glanville_data@aol.com" email address to filenames.

For example, it renames "1.jpg" to "1.jpg.jerry_glanville_data@aol.com", and so on. It creates a ransom message within the "HOW_TO_RECOVERY_FILES.txt" file, which contains instructions about how to contact the cyber criminal who designed Jerry_glanville.

   
Alldaystream.club Ads

What is alldaystream[.]club?

Sharing many common traits with soonersupor.probiglocateriod.proyaarileads.com and countless others, alldaystream[.]club is a rogue website that displays deceptive and dubious content, and also generates redirects to other untrusted and malicious pages.

Sites such as alldaystream[.]club are typically accessed unintentionally - most visitors enter them via redirects caused by intrusive ads or Potentially Unwanted Applications (PAUs) already infiltrated into the system. Note that these apps do not need explicit permission to be installed onto devices.

Following successful infiltration, PUAs cause redirects, run intrusive advertisement campaigns and monitor/record browsing-related information.

   
Sphinx Ransomware

What is Sphinx?

Sphinx was discovered by GrujaRS. This ransomware encrypts files, changes filenames and creates a ransom message. Sphinx renames encrypted files by changing the original filename to a string of random characters and the extension to ".sphinx".

For example, it would rename "1.jpg" to "0vKy3QAmBD.sphinx", "2.jpg" to "1ZCM60EUIb.sphinx", "3.jpg" to "9Y4NZBVf2m.sphinx", and so on. Sphinx creates a ransom message in a text file named "# README #.txt".

   
Microsoft Support.exe POP-UP Scam

What is Microsoft Support.exe?

There are many tech supports scams on the internet that display errors and virus notifications. Typically, the scammers behind them attempt to deceive unsuspecting visitors into paying for software and/or remote technical services, which will supposedly help them to fix the errors and remove viruses, etc.

In this particular case, scammers attempt to trick people into providing remote access to their computers via legitimate software called Remote Utilities

In fact, they have configured the appearance of these programs to appear as if they are designed by Microsoft. Do not to trust this scam web page, download software through it, or contact the scammers via the number provided.

   
Directions Tab Browser Hijacker

What is Directions Tab?

Directions Tab is a browser hijacker endorsed as a tool for easy access to various maps, routes and driving directions, however, following installation, it modifies browser settings to promote directionstab.com, a fake search engine. Additionally, Directions Tab can track browsing-related data and collect sensitive information derived from it.

Few users install this software intentionally. Due to the dubious methods used to proliferate Directions Tab, it is also categorized as a Potentially Unwanted Application (PUA). Note that Directions Tab is often distributed together with another PUA called Safeplex Search.

   
Delicious Online Recipes Browser Hijacker

What is Delicious Online Recipes?

Delicious Online Recipes is a rogue application advertised as a tool for easy access to various popular food recipe websites. It is classified as a browser hijacker due to the modifications it makes to browsers to promote a fake search engine (search.deliciousonlinerecipestab.com).

Software within this classification commonly has data tracking capabilities, which are used to monitor users' browsing activity. Since most users install Delicious Online Recipes inadvertently, it is also classed as a Potentially Unwanted Application (PUA).

   
Mp3juices.cc Suspicious Website

What kind of page is mp3juices[.]cc?

mp3juices[.]cc offers download of audio files in the .mp3 format from a chosen source (website). Note that mp3juices[.]cc should not be trusted or used, since it employs rogue advertising networks. In summary, people who use this website are redirected to various other untrusted sites.

   
Access Gov Docs Tab Browser Hijacker

What is Access Gov Docs Tab?

Access Gov Docs Tab is a browser hijacker advertised as a tool for quick access to various governmental documents (e.g. IRS forms). It operates by altering browser settings to promote search.haccessgovdocs.com, a fake search engine. Additionally, it monitors users' browsing activity and gathers sensitive information derived from it.

Due to the dubious methods used to proliferate Access Gov Docs Tab, it is also classified as a Potentially Unwanted Application (PUA). Note that Access Gov Docs Tab is often distributed together with Encrypted Search, another PUA.

   
Easy Template Finder Browser Hijacker

What is Easy Template Finder?

Easy Template Finder is a browser hijacker endorsed as a tool for easy access to various templates. It operates by making modifications to browsers to promote fake search engines (search.easytemplatefindertab.com or search.heasytemplatefinder.com).

Furthermore, it has data tracking capabilities, which are used to monitor users' browsing habits. Since most users install Easy Template Finder unintentionally, it is also categorized as a Potentially Unwanted Application (PUA). Easy Template Finder is often distributed together with another PUA called Encrypted Search.

   
Your Search Tool Browser Hijacker

What is Your Search Tool?

Your Search Tool is a rogue application supposedly capable of improving the browsing experience and providing quick access to email services. This app is classified as a browser hijacker and a Potentially Unwanted Application (PUA). It is classed as a hijacker due to the modifications it makes to browsers to promote a fake search engine (search.yoursearchtool.com).

Additionally, Your Search Tool has data tracking capabilities, which are employed to monitor users' browsing activity. Note that people often install this software unintentionally.

   

Page 1427 of 2329

<< Start < Prev 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal