Virus and Spyware Removal Guides, uninstall instructions

EasyPDFCombine Toolbar

What is hp.myway.com?

The EasyPDFCombine application is advertised as an application that allows users to combine PDF files, convert file formats, translate text, and access a dictionary. However, it functions as a browser hijacker (changes the browser's settings to promote a fake search engine).

Typically, apps like EasyPDFCombine can hijack  Internet Explorer, Google Chrome, and Mozilla Firefox browsers.

Also, it is common for them to be designed to collect various data. It is important to know that most users download and install browser hijacker unknowingly, for this reason EasyPDFCombine and other apps of this type are called potentially unwanted applications (PUAs).

   
BitKangoroo Ransomware

What is BitKangoroo?

Discovered by Lawrence Abrams, BitKangoroo is a ransomware-type virus that stealthily infiltrates systems and encrypts various data using AES-256 cryptography.

During encryption, this malware appends filenames with the ".bitkangoroo" extension (for example, "sample.jpg" is renamed to "sample.jpg.bitkangoroo"). Following successful encryption, BitKangoroo opens a pop-up window with a ransom-demand message.

   
Launchpage.org Redirect

What is launchpage.org?

Developers present launchpage.org as an improved Internet search engine that supposedly enhances the Internet browsing experience by generating better search results. Judging on appearance alone, launchpage.org barely differs from Yahoo, Bing, Google, and other legitimate search engines.

Therefore, many users believe that launchpage.org is also legitimate and useful. In fact, this rogue site gathers various information relating to users' Internet browsing activity. Furthermore, developers promote launchpage.org via rogue download/installation set-ups that modify web browser settings without permission.

   
ThunderCrypt Ransomware

What kind of malware is ThunderCrypt?

ThunderCrypt is a ransomware-type virus distributed via fake Adobe Flash Player updates. Once infiltrated, ThunderCrypt encrypts various data using RSA-2048 (asymmetric) cryptography.

Unlike other ransomware, this virus does not append names of compromised files with any extension. Following successful encryption, ThunderCrypt opens a pop-up window containing a ransom-demand message.

   
Searchy.online Redirect

What is searchy.online?

Developers present searchy.online as an Internet search engine that significantly enhances the browsing experience by generating improved results.

Judging on appearance alone, searchy.online may appear legitimate and useful, however, developers promote it by employing rogue download/installation set-ups that hijack web browsers and modify various options without consent. Furthermore, searchy.online continually records various information relating to users' Internet browsing activity.

   
ActionClassicGames Toolbar

What is hp.myway.com?

ActionClassGames is a deceptive application that supposedly allows users to play various addictive Flash games. Judging on appearance alone, this app may appear legitimate and useful, however, ActionClassGames is categorized as a Potentially Unwanted Application (PUA) and a browser hijacker.

There are three main reasons for these negative associations: 1) stealth installation without consent; 2) modification of web browser settings, and; 3) tracking of users' Internet browsing activity.

   
Extractor Ransomware

What is Extractor?

Discovered by malware security researcher, xXToffeeXx, Extractor is a ransomware-type virus. Once infiltrated, Extractor encrypts various files and appends the names of each compromised file with the ".xxx" extension.

For example, "sample.jpg" is renamed to "sample.jpg.xxx". Extractor then creates a text file ("ReadMe_XXX.txt"), placing it in each folder containing the encrypted files.

   
Mikoyan Ransomware

What is Mikoyan?

Mikoyan is a ransomware-type virus developed using the .NET framework. Once infiltrated, Mikoyan encrypts various files using AES-256 cryptography. Depending on its variant, it appends the ".haters" or ".MIKOYAN" extension to the name of each encrypted file.

For instance, "sample.jpg" might be renamed to "sample.jpg.haters" or "sample.jpg.MIKOYAN". After successful file encryption, Mikoyan opens a pop-up window with a ransom-demand message.

   
Search-results.com Browser Hijacker

What is Search Results Toolbar?

Search Results Toolbar is a browser add-on, which adds various shortcuts to your Internet browsers (shortcuts to social networks, YouTube, eBay, online radio, etc.) While such add-ons might seem useful to many Internet users, there is a downside to having these toolbars installed on your computer: commonly, Search Results Toolbar comes bundled with free third party software.

This toolbar may have been inadvertently installed while you were installing iMesh or iLivid software, which is downloaded from Internet. The developers of this software use Search Results Toolbar to monetize their free software. Although monetizing free software is valid, the developers should have used more legitimate means.

   
Mystarting123.com Redirect

What is mystarting123.com?

Developers present mystarting123.com as an Internet search engine that significantly enhances the browsing experience by generating improved results.

Judging on appearance alone, mystarting123.com may appear legitimate and useful, however, developers promote this site by employing rogue download/installation set-ups that hijack web browsers and modify various options without consent. Furthermore, mystarting123.com continually records various information relating to users' Internet browsing activity.

   

Page 1938 of 2329

<< Start < Prev 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal