Virus and Spyware Removal Guides, uninstall instructions

Sihclient.exe Virus

What is sihclient.exe?

sIHCLient.exe is a genuine Windows process that can be found running in Task Manager under the "SIH Client" name when the operating system starts fixing components required for automatic Windows updates. This genuine system file is placed in the "\Windows\System32\" folder.

In many cases, cyber criminals use this name and disguise malicious programs (processes) as sihclient.exe. Therefore, various anti-virus programs often recognize the legitimate SIHCLient.exe process as a threat and provide users with 'false positive' results.

   
Macos-online-security-check.com POP-UP Scam (Mac)

What is "macos-online-security-check[.]com"?

macos-online-security-check[.]com is deceptive, scam website that is used to promote a potentially unwanted app (PUA) called Mac Cleanup Pro. Visitors are encouraged to download and install this app to remove viruses that this website has supposedly detected. In fact, this is a common scam that displays a fake virus alert. It should not be trusted.

People are often redirected to these websites by PUAs already installed on their browsers or computers. PUAs feed users with ads and gather information relating to browsing activity.

   
Arberittertwa.info POP-UP Redirect

What is arberittertwa[.]info?

arberittertwa[.]info is similar to many other web pages of this type such as vercallactont[.]com, butitereventwil[.]info, and refrebrepheon[.]info. This is a rogue website that causes redirects to other untrustworthy sites.

People do not usually visit arberittertwa[.]info intentionally - the site is opened by potentially unwanted apps (PUAs) that are installed on computers or browsers. PUAs often infiltrate systems without users' knowledge (they install them inadvertently). In addition to unwanted redirects, most PUAs feed users with advertisements and gather data relating to browsing activity.

   
Cube Ransomware

What is Cube?

Discovered by Michael Gillespie, Cube is classified as a ransomware-type program. When a computer is infected, files become unusable.

Cube is designed to encrypt data and keep it locked unless a ransom is paid. It also renames all encrypted files by adding the ".cube" extension. For example, "1.jpg" becomes "1.jpg.cube". Details about how to recover files are provided in a ransom message within a text file called "READ_ME.txt". This file can be found in each folder that contains encrypted data.

   
Game Jungle Browser Hijacker

What is feed.game-jungle.com?

The Game Jungle application is promoted as allowing users to access an extensive collection of free online games. People tend to download and install apps of this type unintentionally. Therefore, Game Jungle is categorized as a potentially unwanted app (PUA), a browser hijacker.

Typically, apps of this type modify browser settings and record data. Additionally, Game Jungle promotes a fake search engine called feed.game-jungle.com.

   
Scranos Rootkit

What is Scranos?

Scranos is a malicious rootkit driver that stealthily infiltrates the system and continually injects it with a number of high-risk payloads. Most of the payloads (injected malicious applications) are categorized as data stealers. I.e., they are designed to steal various personal information (e.g., account credentials, browsing history, cookies, etc.).

Scranos also injects several payloads that manipulate browsers and accounts on social networks. The presence of Scranos can thus lead to serious privacy issues, identity theft, financial loss, a diminished browsing experience, and installation of dangerous malware.

   
Gotcha Ransomware

What is Gotcha?

Gotcha is a ransomware-type program discovered by Michael Gillespie. Like most programs of this type, it is used by cyber criminals to encrypt files stored on a victim's computer and keep them unusable unless a ransom is paid. It adds the ".gotcha" extension to every encrypted file.

For example, "1.jpg" becomes "1.jpg.gotcha". It also creates a ransom message within a text file called "!GOTCHA!.txt", which it places in each folder that contains encrypted files.

   
Azurewebsites.net POP-UP Scam

What kind of page is azurewebsites[.]net?

Microsoft Azure Web Sites is a web-hosting platform based on cloud computing, a legitimate service developed by Microsoft. It supports multiple technologies and programming languages (such as .NET, PHP, node.js, Python, and so on). As part of creating a website, the site's URL is assigned a subdomain of azurewebsites[.]net.

In various for-pay tiers, a website can be assigned one or more custom domains, however, this service is often misused by scammers and malware (malicious software) distributors. In this particular case, it is misused to promote a tech-support scam.

   
Zippyshare Virus

What is Zippyshare?

Zippyshare is a file hosting service that can be used on the zippyshare[.]com website. Users can upload files no larger than 500 megabytes and share them with other people. This service is provided by a legitimate, harmless website, however, its developers use advertising networks.

Therefore, it is full of ads that might cause unwanted downloads, installations, and redirects to dubious pages. Furthermore, files and applications stored on this site may be harmful.

   
Apple.com-optimize.live POP-UP Scam (Mac)

What is "apple.com-optimize[.]live"?

apple.com-optimize[.]live is one of many scam websites on the internet. Scammers designed this site to trick visitors into believing that their computers are infected and encourage them to download a potentially unwanted application (PUA) called Cleanup My-Mac.

Neither this website nor apps promoted through it should be trusted. Furthermore, most people do not visit apple.com-optimize[.]live intentionally - they are redirected to it by other PUAs that they have installed on their computers or browsers. Additionally, PUAs often serve users with ads and collect data.

   

Page 1606 of 2297

<< Start < Prev 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal