Virus and Spyware Removal Guides, uninstall instructions

ContentBenefits Adware (Mac)

What is ContentBenefits?

ContentBenefits is a potentially unwanted application (PUA) categorized as adware. It supposedly enhances the browsing experience and delivers other value and features. In fact, ContentBenefits serves intrusive advertisements and collects browsing data. Generally, people download and install adware (and other PUAs) inadvertently.

   
ThreadProperty Adware (Mac)

What is ThreadProperty?

ThreadProperty supposedly improves the browsing experience, however, it displays intrusive advertisements and gathers various information. Programs of this type are categorized as potentially unwanted applications (PUAs) and adware. Generally, people download and install adware inadvertently.

   
Grandoreiro Trojan

What is Grandoreiro?

Grandoreiro is the name of malicious software, a banking Trojan written in the Delphi programming language. It targets users in Brazil, Mexico, Spain and Peru. Cyber criminals attempt to infect computers with software of this type to generate revenue by misusing information stolen by programs such as Grandoreiro.

These Trojans steal banking-related information, and thus victims are exposed to risk of monetary loss. If your computer is infected with Grandoreiro (or other malicious programs), uninstall/remove it immediately.

   
CXK NMSL Ransomware

What is CXK NMSL?

Discovered by Germán Fernández, CXK NMSL is a malicious program classified as ransomware. One method used to distribute this malware is via Corona virus-themed email spam campaigns. Additionally, the malicious executable of CXK NMSL (which initiates the infection) can be similarly disguised (e.g. as "important information" concerning the aforementioned virus).

CXK NMSL ransomware is designed to encrypt the data of infected systems and demand a ransom to be paid for decryption. During the encryption process, all affected files are appended with the ".cxk_nmsl" extension. For example, a file originally titled "1.jpg" would appear as "1.jpg.cxk_nmsl" following encryption.

After this process is finished, a ransom message in Chinese ("CXK-NMSL-README.txt") is created. Furthermore, CXK NMSL displays various error messages, opens the browser, and redirects to a video on the bilibili video sharing website. It also opens a media player and auto-plays a song.

   
Polleryou Ransomware

What is Polleryou?

Polleryou (also known as Rentyr) was discovered by S!Ri. This ransomware encrypts victims' files, however, unlike most programs of this type it does not append any extension to filenames. Polleryou changes the desktop wallpaper and creates a ransom message within a text file named "Read-me22.txt".

This file contains instructions about how to contact Polleryou's developers and pay the ransom (i.e., to purchase a decryption tool from them).

   
Mp3converter.to Suspicious Website

What is mp3converter[.]to?

mp3converter[.]to allows visitors to download YouTube videos converted to MP3 and MP4 formats, however, this page uses rogue advertising networks and redirects users of its video conversion service to other untrusted websites. Do not use the services of these websites. Furthermore, it is illegal to download videos from YouTube.

   
Encryptedsearch.org Redirect

What is Encryptedsearch.org?

Encrypted Search is a browser hijacker, advertised as a web searching tool with reinforced privacy measures. It is supposedly capable of encrypting search queries, traces of which it deletes after thirty minutes of inactivity. This hijacking application modifies browsers and promotes its fake search engine (encryptedsearch.org).

Additionally, it monitors users' browsing activity and gathers information wrangled from it. Most users install this rogue app inadvertently, therefore it is classified as a PUA (potentially unwanted application). It is noteworthy, that Encrypted Search is often installed alongside other browser hijackers or is otherwise promoted by them.

   
Prometey Ransomware

What is Prometey?

Similar to AnteFrigus, Prometey is malicious software classified as ransomware. It operates by encrypting data and demanding payment for decryption. During the encryption process, all affected files are appended with an extension, consisting of a random character string.

For example, a filename such as "1.jpg" would be similar to "1.jpg.caacbbcc". After this process is complete, a ransom message with the format "CLICK_HERE-[random_string].txt" (e.g. "CLICK_HERE-caacbbcc.txt") is dropped into every affected folder.

   
SystemSpot Adware (Mac)

What is SystemSpot?

SystemSpot is classified as adware and a Potentially Unwanted Application (PUA). Although it is promoted as providing fast searches, improved search results, etc., this app actually diminishes the browsing experience. SystemSpot adware delivers intrusive advertisements, which affect browsing and have harmful capabilities.

Its classification as a PUA is due to the application's dubious proliferation techniques. I.e., most users download/install this PUA unintentionally. Furthermore, most of these unwanted applications (including adware) can track browsing-related data.

   
Protect My Search Daily Browser Hijacker

What is Protect My Search Daily?

Protect My Search Daily supposedly prevents users from visiting untrusted, harmful websites, however, this app is categorized as a potentially unwanted application (PUA), a browser hijacker. PUAs promote the addresses of fake search engines by changing browser settings and collecting browsing data.

This particular app promotes protectmysearchdaily.com. People usually download and install apps such as Protect My Search Daily inadvertently. Furthermore, this browser hijacker is promoted through the set-ups of other similar applications. Therefore, Protect My Search Daily is often installed together with another browser hijacker.

   

Page 1434 of 2329

<< Start < Prev 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal