Virus and Spyware Removal Guides, uninstall instructions

Clicker Adware

What is Clicker adware?

As its name suggests, Clicker adware app (also known as Clickware) is categorized as ad-supporting software. If installed, apps of this type feed unsuspecting users with various intrusive, often deceptive ads and collect browsing-related information. They are known as potentially unwanted apps (PUAs), since most people download and install them accidentally or inadvertently.

   
Evengsitolightont.info POP-UP Ads

What is evengsitolightont[.]info?

evengsitolightont[.]info is yet another rogue website designed to display dubious content and redirect users to various untrustworthy sites. It shares many similarities with renropsitto.infopushnews.onlinepushmobilenews.com, and dozens of other similar websites.

Generally, users visit evengsitolightont[.]info inadvertently, as they are redirected by potentially unwanted applications (PUAs) and ads displayed on other rogue sites. PUAs infiltrate systems without users’ permission, gather information, and deliver intrusive advertisements.

   
Score Stars Browser Hijacker

What is portal.score-stars.com?

Score Stars (Score Stars New Tab) is a browser hijacker, a potentially unwanted application (PUA) designed to provide sports scores and results. Most people download and install apps of this type accidentally.

Once installed, Score Stars modifies browser settings and continually collects information relating to users' browsing habits. This app also promotes a fake search engine called portal.score-stars.com

   
CraniumCapacity Ads Adware

What is CraniumCapacity Ads?

CraniumCapacity ads (or simply CraniumCapacity) is an adware-type application, which serves people who have it installed on their systems with various advertisements and records their browsing habits. Few people install these apps on their browsers (or computers) intentionally - they are often tricked into downloading and installing them inadvertently.

   
Orboreshitert.info POP-UP Ads

What is orboreshitert[.]info?

Similar to pushmobilenews.com, renropsitto.info, ticeroftertal.info, and many others, orboreshitert[.]info is a rogue website designed to cause unwanted redirects and deliver dubious content. Most users arrive at orboreshitert[.]info inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements displayed by other rogue sites.

PUAs typically infiltrate computers without users' consent and, in addition to causing redirects, deliver intrusive advertisements and gather information relating to web browsing activity.

   
yG Ransomware

What is yG?

Discovered by Jakub Kroustek, yG belongs to the Dharma family and is a malicious program categozied as ransomware. Programs of this type encrypt data. Therefore, people who have computers infected with ransomware cannot access their files unless they purchase a decryption tool from specific ransomware developers.

yG creates a "RETURN FILES.txt" file and displays a pop-up window. It also renames all encrypted files by adding the ".yG" extension. For example, "1.jpg" might be renamed to "1.jpg.id-E857D00.[sysadmin@mail.fr].yG" (note that it also adds the email address and victim's ID into the filename).

   
Qbtex Ransomware

What is Qbtex?

Belonging to the Dharma ransomware family, Qbtex is high-risk ransomware discovered by Jakub Kroustek. As with most ransomware infections, Qbtex infiltrates the system and encrypts most stored files.

In doing so, this malware appends filenames with the ".qbtex" extension as well as the victim's unique ID and developer's email address (e.g., "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[1btc@decryption.biz].qbtex").

Compromised data immediately becomes unusable. Following successful encryption, Qbtex opens a pop-up window and stores a text file called "RETURN FILES.txt" on the desktop.

   
Codnat Ransomware

What is Codnat?

Discovered by Michael Gillespie, Codnat is a malicious program which belongs to the Djvu ransomware family. Cyber criminals who designed Codnat use it to encrypt files stored on infected computers and prevent victims from accessing them. This ransomware adds the ".codnat" extension to each encrypted file.

For example, "1.jpg" becomes "1.jpg.codnat". There is another variant of Codnat that adds the ".codnat1" extension. Codnat also creates a ransom message within  a text file called "_readme.txt".

   
Pirate Chick VPN Virus

What is Pirate Chick VPN?

Pirate Chick VPN is a malicious application that claims to be legitimate software that provides a VPN service. Pirate Chick VPN is free for anyone to download on its official website, however, developers also proliferate it using a deceptive marketing method called "bundling". The purpose of Pirate Chick VPN is to inject systems with additional malware.

   
Free Streamz Browser Hijacker

What is feed.free-streamz.com?

Free Streamz is a browser app that supposedly allows users to listen to thousands of free live radio stations directly from their browsers. This may seem to be a useful tool to listen to music, however, this app is also classified as a browser hijacker, a potentially unwanted app (PUA).

Developers promote it using a deceptive method ('bundling') and most people download and install Free Streamz inadvertently. When installed, it changes browser settings (thereby promoting the feed.free-streamz.com fake search engine) and gathers browsing-related data.

   

Page 1627 of 2329

<< Start < Prev 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal