Step-by-Step Malware Removal Instructions

Search.basicgeneration.com Redirect (Mac)
Mac Virus

Search.basicgeneration.com Redirect (Mac)

search.basicgeneration.com appears in browser settings after installation of adware/browser hijackers (for example, ExecutiveOperation). This is a fake search engine that does not generate any unique results. Apps that promote fake search engines serve ads and collect various user-system informa

ExecutiveOperation Adware (Mac)
Mac Virus

ExecutiveOperation Adware (Mac)

The ExecutiveOperation application functions as adware, a browser hijacker, and as a data collector. It serves advertisements, promotes two fake search engines by changing browser settings, and gathers private, sensitive information. Generally, users download and install ExecutiveOperation and

Windows Error Code: WIN.DLL0151930 POP-UP Scam
Phishing/Scam

Windows Error Code: WIN.DLL0151930 POP-UP Scam

Technical support scam websites such as this one often trick unsuspecting visitors into believing that their computers are infected with a virus or multiple viruses (or that some other problem exists) and into calling the provided number. Once contacted, scammers behind such web pages attempt to

Vpsh Ransomware
Ransomware

Vpsh Ransomware

Vpsh is a malicious program and part of the Djvu ransomware family. Typically, ransomware is designed to encrypt data, rename each encrypted file by appending its extension, and create and/or display a ransom message. Vpsh appends the ".vpsh" extension to filenames. For example, after encryption,

Pro Search Browser Hijacker
Browser Hijacker

Pro Search Browser Hijacker

Browser hijacking apps promote fake search engines. In this case, Pro Search promotes tailsearch.com. Furthermore, these rogue apps also track and record data. Commonly, users download and install browser hijackers inadvertently and, therefore, Pro Search is categorized as a potentially unwanted a

v315 Ransomware
Ransomware

v315 Ransomware

This ransomware belongs to the Jigsaw ransomware family and functions like many other malicious programs of this type: it encrypts files, modifies their filenames and generates a ransom message. Note that v315 renames files by appending the ".v315" extension to filenames. For example, "1.jpg" is

Mhcadd Ransomware
Ransomware

Mhcadd Ransomware

Mhcadd belongs to the family of ransomware called Snatch. It is designed to encrypt victims' files, append its extension to their filenames, and generate a ransom message. Mhcadd appends the ".mhcadd" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.mhcadd", "2.jpg" to "2.jpg.mhca

Connect Ransomware
Ransomware

Connect Ransomware

Connect is a variant of Bondy ransomware. This variant encrypts files, appends its extension to their filenames and creates a ransom message in all folders that contain encrypted files. Connect renames appends the ".Connect" extension to the filenames of encrypted files. For example, "1.jpg" is r

Microsoft Security Alert Scam
Adware

Microsoft Security Alert Scam

"Microsoft Security Alert" is a fake error similar to Suspicious Connection, Firewall Breach Detected, Your Computer Is In Blocked State, and many others. "Microsoft Security Alert" is displayed by a malicious website that users often visit inadvertently - they are redirected by various potentiall

United Nations Online Lotto Email Scam
Phishing/Scam

United Nations Online Lotto Email Scam

Like most lottery scams, this one attempts to trick recipients into believing that they have won a large sum of money in a lottery. Commonly, scammers behind such scams attempt to extort money from unsuspecting recipients by asking them to pay processing fees or transfer charges. They usually dis