Step-by-Step Malware Removal Instructions

ExclusiveAction Adware (Mac)
Mac Virus

ExclusiveAction Adware (Mac)

There are many adware-type applications on the internet, including ExclusiveAction, which is part of the AdLoad adware family. It is designed to feed users with various advertisements. Research shows that ExclusiveAction also operates as a browser hijacker to promote the address of a fake search

AproditeSearch Adware (Mac)
Mac Virus

AproditeSearch Adware (Mac)

AproditeSearch is rogue software belonging to the AdLoad adware family. Following successful installation, it delivers various unwanted and dangerous advertisements. AproditeSearch also has browser hijacker qualities such as browser modification and bogus search engine promotion. Furthermore, a

LeadingModuleSearch Adware (Mac)
Mac Virus

LeadingModuleSearch Adware (Mac)

Belonging to the AdLoad malware family, LeadingModuleSearch is an adware-type application that shares many similarities with browser hijackers. This app delivers intrusive ad campaigns and modifies browsers to promote fake search engines. Furthermore, most adware and browser hijackers monitor us

Uzuvnkyh Ransomware
Ransomware

Uzuvnkyh Ransomware

Uzuvnkyh was discovered by GrujaRS and is based on another ransomware infection called HiddenTear. Uzuvnkyh encrypts files, modifies their filenames and creates a ransom message. It appends the ".encrypted" extension to the filename of every encrypted file (e.g., "1.jpg" would be renamed to "1.jpg

ATKL Ransomware
Ransomware

ATKL Ransomware

ATKL is malicious software belonging to the Matrix ransomware family. Systems infected with this program have their data encrypted and receive ransom demands for decryption. During the encryption process, all compromised files are renamed according to the following pattern: cyber criminals' email

GuLoader Malware
Trojan

GuLoader Malware

GuLoader (also known as CloudEyE) is a malware downloader used by cyber criminals to proliferate various Remote Access Trojans (RATs) and other Trojan-type programs. They use GuLoader to infect computers with malicious programs that can be used to steal sensitive information, infect computers with

ONION Ransomware
Ransomware

ONION Ransomware

ONION is a malicious program belonging to the Dharma ransomware family. It operates by encrypting data and demanding payment for decryption tools/software. During the encryption process, all affected files are renamed according to the following pattern: original filename, unique ID, cyber criminal

IPM Ransomware
Ransomware

IPM Ransomware

Discovered by Jakub Kroustek, IPM is a malicious program belonging to the Dharma ransomware family. It encrypts files and renames them by adding the victim's ID, decoding@qbmail.biz email address and appending the ".IPM" extension to filenames. For example, it changes a file named "1.jpg" to "1.j

Logic Search Browser Hijacker
Browser Hijacker

Logic Search Browser Hijacker

Logic Search is a potentially unwanted application (PUA), a browser hijacker supposedly designed to improve the browsing experience (provide accurate search results and other features). In fact, it promotes a fake search engine (feed.logic-search.com) by changing browser settings and gathering var

Increaseofprofit POP-UP Scam (Mac)
Mac Virus

Increaseofprofit POP-UP Scam (Mac)

"Increaseofprofit" is a group of deceptive websites, which promote various scams. They have been observed promoting "Dear Chrome User, Congratulations!" and "Latest version of Adobe Flash Player" schemes. Other scams might also be promoted via these sites. Few users access these deceptive web p