Virus and Spyware Removal Guides, uninstall instructions

Qbit Mac Cleaner Uwanted Application (Mac)

What is "Qbit Mac Cleaner"?

Qbit Mac Cleaner is a potentially unwanted application (PUA) that supposedly fixes and cleans Mac computers. Developers offer similar tools such as a Cache Manager, Logs Manager, and Trash manager, Rogue App Uninstaller, Browsing History Cleaner, and so on.

This app is promoted using a deceptive, scam website. Furthermore, PUAs are often distributed by including them into the set-ups of other software. People who have Qbit Mac Cleaner installed on their computers are usually tricked into it.

   
Theirsvendor.com POP-UP (Mac)

What is theirsvendor[.]com?

Most people who open theirsvendor[.]com arrive at the URL address accidentally. It is used in various rogue advertising campaigns.

For example, this address might be presented as a legitimate search result by various search engines. Once the result is clicked, however, it will open theirsvendor[.]com in a pop-up window, which then redirects users to a dubious website. Do not trust web pages that are used in dubious ad campaigns or on websites that are opened through them.

   
Get Coupons For Free Browser Hijacker

What is Get Coupons For Free?

Get Coupons For Free is a tool (an app) that supposedly provides easy access to various coupons directly from the browser's new tab page. We advise against the use of this app, since Get Coupons For Free promotes a fake search engine (search.hgetcouponsforfree.com) by changing browser settings.

Therefore, this app is categorized as a potentially unwanted application (PUA), a browser hijacker. Additionally, PUAs often gather information relating to users' browsing habits.

   
Onlinevideoconverter.com Virus

What is onlinevideoconverter[.]com?

onlinevideoconverter[.]com is presented as a YouTube downloader and converter, however, it can also be used to download (and convert) videos from Facebook, Instagram, Vimeo, and so on. It allows conversion and download in .mp3, .aac, .m4a, and other formats. Bear in mind, however, that downloading content from sites such as YouTube is illegal.

The onlinevideoconverter[.]com website uses advertisement networks - it displays ads that might cause redirects to other dubious pages. Note that using onlinevideoconverter[.]com might also lead to unwanted downloads and installations. We recommend that you avoid using websites of this type.

   
Trojan.Win32.Generic Virus

What is Trojan.Win32.Generic?

Trojan.Win32.Generic (also known as HEUR.Trojan.Win32.Generic) is a generic detection name. If the installed anti-virus suite has detected a threat that has a generic name such as this, this indicates that the system might be infected with a trojan, RAT, data stealer, ransomware, cryptocurrency miner, and/or similar high-risk virus.

All of these malicious programs can cause serious problems including data and financial losses. If your anti-virus software has detected Trojan.Win32.Generic (or HEUR.Trojan.Win32.Generic), we recommend that you run a full system scan and remove any detected threats immediately.

   
Html Ransomware

What is Html virus?

First discovered by Jakub Kroustek and belonging to the Dharma ransomware family, Html is a high-risk infection designed to infiltrate systems and encrypt most stored data. During encryption, Html appends filenames with the ".html" extension plus the user's unique ID and developer's email address.

For example, "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[paydra@cock.li].html".

Encrypted data becomes unusable and Html then opens a pop-up window and stores the "RETURN FILES.txt" text file on the desktop. Updated variants of this ransomware use ".[it125@protonmail.com].html", ".[niceday4u@protonmail.com].html", ".[vip76@protonmail.com].html", ".[payday@tfwno.gf].html" and ".[zanzibar65@mail.fr].html" extensions for encrypted files.

   
Gerosan Ransomware

What is Gerosan?

Gerosan is categorized as ransomware, malicious software that is designed to prevent victims from accessing the operating system/data until a ransom is paid. Ransomware encrypts files with a strong cryptography algorithm. Gerosan also changes filenames of encrypted files by adding the ".gerosan" extension.

For example, "1.jpg" becomes "1.jpg.gerosan". Like most ransomware-type programs, Gerosan creates a ransom message, in this case within a text file called "_readme.txt". This file can be found in all folders that contain encrypted data. Gerosan belongs to the Djvu ransomware family and was discovered by Michael Gillespie.

   
Your Photo Editor Browser Hijacker

What is Your Photo Editor?

Your Photo Editor is a deceptive application that claims to provide functionality allowing users to create various pictures. Initially, this app may seem legitimate and useful, however, Your Photo Editor is categorized as a potentially unwanted application (PUA) and a browser hijacker.

There are three main reasons for these negative associations: 1) installation without users' consent; 2) promotion of a fake search engine [search.hyourphotoeditor.net], and; 3) information tracking.

   
Stream2watch Suspicious Website

What is Stream2watch?

Stream2watch provides a streaming service that supposedly allows people to watch live sport free of charge. In fact, it delivers this service illegally. Developers provide this service on a website that uses rogue advertising networks.

People who use Stream2watch's website are served with deceptive advertisements that lead to other dubious web pages or cause unwanted download and installation of potentially unwanted apps (PUAs).

Additionally, this page asks visitors to show notifications. If allowed, these start feeding users with unwanted ads and notifications, and might also lead to unwanted downloads or installations.

   
Idp.alexa.51 Virus

What is idp.alexa.51?

idp.alexa.51 is a virus/threat detected specifically by Avira, Avast, and AVG anti-virus suites. This malware was first detected in 2016. Note that idp.alexa.51 is not regular malware: it can be an actual infection or a 'false positive'. Research results show that this threat often infiltrates the system during installation of various Flash games (e.g., Plants vs. Zombies, SeaMonkey, and similar).

   

Page 1609 of 2329

<< Start < Prev 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal