Virus and Spyware Removal Guides, uninstall instructions

Qbaa Ransomware

What is Qbaa ransomware?

Qbaa is a piece of malicious software belonging to the Djvu ransomware family. Our researchers discovered a sample of this ransomware on VirusTotal.

After analyzing it, we found that this malicious program encrypts files and appends their filenames with the ".qbaa" extension. For example, a file initially named "1.jpg" appears as "1.jpg.qbaa", "2.jpg" as "2.jpg.qbaa", and so on for all of the affected files. Once the encryption is completed, Qbaa creates a ransom note titled "_readme.txt".

   
Fopa Ransomware

What kind of malware is Fopa?

Our team has discovered the Fopa ransomware (which is part of the Djvu family) while examining malware samples submitted to VirusTotal. The purpose of Fopa is to encrypt files. Also, it renames all encrypted files by appending the ".Fopa" extension and creates the "_readme.txt" file containing contact and payment information (a ransom note).

An example of how Fopa renames files: it renames "1.jpg" to "1.jpg.fopa", "2.png" to "2.png.fopa", and so forth.

   
reL Ransomware

What kind of malware is reL?

We detected the reL ransomware variant (which belongs to the Dharma ransomware family) while checking the samples submitted to VirusTotal. We found that reL encrypts files and appends the victim's ID, release@techmail.info email address, and the ".reL" extension to filenames. Also, it displays a pop-up window and creates the "info.txt" file (ransom notes).

An example of how reL renames files: it changes "1.jpg" to "1.jpg.id-9ECFA84E.[release@techmail.info].reL", "2.png" to "2.png.id-9ECFA84E.[release@techmail.info].reL", and so forth.

   
Protecthub.xyz Ads

5What kind of website is protecthub[.]xyz?

Protecthub[.]xyz displays deceptive content to fraudulently promote legitimate software and asks for permission to show notifications. Additionally, it might be designed to redirect visitors to other shady websites. Our team has discovered protecthub[.]xyz while examining sites that use rogue advertising networks.

   
Data Shield for Chrome Browser Hijacker

What kind of application is Data Shield for Chrome?

Data Shield for Chrome is a browser hijacker designed to promote search.wiseghostapp.com - a fake search engine. It hijacks a web browser by changing its settings. Our malware researchers have found Data Shield for Chrome on a deceptive website promoted via other sites that use questionable advertising networks.

   
Read-new-post.com Ads

What kind of page is read-new-post[.]com?

Read-new-post[.]com displays deceptive content to get permission to feed visitors with shady advertisements. It also redirects to untrustworthy pages. We have discovered it while inspecting pages that use rogue advertising networks (illegal movie streaming pages, torrent sites, etc.).

   
Detectvid.com Ads

What kind of page is detectvid[.]com?

Detectvid[.]com is a rogue webpage that we discovered during a routine inspection of shady sites. It is designed to trick visitors into enabling its spam browser notifications and cause redirects to other untrustworthy/malicious websites. Users typically enter such pages via redirects caused by sites using rogue advertising networks.

   
Masterofkeeps.xyz Ads

What kind of page is masterofkeeps[.]xyz?

We discovered the masterofkeeps[.]xyz webpage while researching untrustworthy sites. This rogue page loads deceptive content, pushes browser notification spam, and redirects visitors to other unreliable/hazardous websites. Most users enter sites like masterofkeeps[.]xyz through others that use rogue advertising networks.

   
LKS Ransomware

What is LKS ransomware?

LKS is a piece of malicious software classified as ransomware that our research team discovered during a routine inspection of new submissions to VirusTotal. After analyzing this program, we determined that it belongs to the Phobos ransomware family.

Once a sample was executed on our test system, LKS encrypted files and changed their filenames. The renaming pattern consisted of the file's original name, a unique ID, the cyber criminals' email address, and the ".LKS" extension. For example, a file initially titled "1.jpg" appeared as "1.jpg.id[9ECFA84E-3314].[cvqwlkpmbc@aol.com].LKS". Afterwards, this ransomware displayed/created ransom notes in a pop-up window ("info.hta") and text file ("info.txt").

   
Your Windows 10 Is Infected With Viruses POP-UP Scam

What is the "Your Windows 10 is infected with viruses" pop-up?

During a routine inspection of rogue websites, our researchers discovered the masterofkeeps[.]xyz website, which in turn resulted in us learning of the "Your Windows 10 is infected with viruses" scam. This scheme makes false claims about visitors' devices being infected in order to gain and subsequently abuse users' trust. Typically, such scams are used to endorse untrustworthy/harmful software and/or obtain funds through fraud.

It must be emphasized that while "Your Windows 10 is infected with viruses" employs the names of genuine products/companies, it is in no way associated with either the Microsoft Corporation or McAfee Corp.

   

Page 860 of 2354

<< Start < Prev 851 852 853 854 855 856 857 858 859 860 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal