Step-by-Step Malware Removal Instructions

NEMTY REVENGE 2.0 Ransomware
Ransomware

NEMTY REVENGE 2.0 Ransomware

NEMTY REVENGE 2.0 ransomware is malicious software discovered by Michael Gillespie. People with files encrypted by ransomware cannot regain access without the use of a decryption key. To obtain the key, victims are urged to pay a ransom to the cyber criminals who designed NEMTY REVENGE 2.0. This

Sundayfunny POP-UP Scam (Mac)
Mac Virus

Sundayfunny POP-UP Scam (Mac)

Sundayfunny is a family of scam web sites designed to promote untrustworthy applications. This variant advertises Smart Mac Booster, which is classified as a Potentially Unwanted Application (PUA). Websites of this type operate using scare tactics to trick visitors into downloading/installing th

ABAT Ransomware
Ransomware

ABAT Ransomware

Discovered by dnwls0719, ABAT is a new variant of Matrix ransomware. Malware of this type encodes data so that victims are unable to access their files without using decryption methods. Typically, they are encouraged to purchase decryption tools from the cyber criminals who designed the ransomware

FuxSocy ENCRYPTOR Ransomware
Ransomware

FuxSocy ENCRYPTOR Ransomware

Discovered by Vitali Kremez, FuxSocy ENCRYPTOR is malicious software, classified as ransomware. This malware emulates Cerber ransomware. It operates by encrypting data and demanding ransom payments for decryption. During FuxSocy ENCRYPTOR encryption, each file is renamed with a randomized filename

CCryptor Ransomware
Ransomware

CCryptor Ransomware

CCryptor is ransomware-type software that encrypts files using the AES-256 encryption algorithm and creates a ransom message (within the "README!!!.txt" file). It also renames all encrypted files by changing extensions to ".ccryptor". For example, "1.jpg" becomes "1.jpg.ccryptor". To regain acces

Hdmr Ransomware
Ransomware

Hdmr Ransomware

Discovered by GrujaRS, Hdmr (also known as GO-SPORT) is a ransomware infection. This malicious software is designed to encrypt victims' data and demand ransom payments for decryption. During the encryption process, all files are renamed using the ".hdmr" extension. For example, "1.jpg" becomes "1

Xxxinstant Ransomware
Ransomware

Xxxinstant Ransomware

Xxxinstant is malicious software designed to block access to data by encryption. Victims cannot use their files unless they decode them with decryption software, which can purchased from the cyber criminals who designed Xxxinstant. This ransomware is a new variant of another ransomware infection c

PhobosImposter Ransomware
Ransomware

PhobosImposter Ransomware

Discovered by MalwareHunterTeam, PhobosImposter is malicious software categorized as ransomware. It also emulates Phobos ransomware. PhobosImposter is designed to encrypt data and keep it locked, until a ransom is paid. During the encryption process, all files are renamed with the ".phobos" extens

Qbit System Care Unwanted Application
Potentially unwanted application

Qbit System Care Unwanted Application

Qbit System Care (or Qbit ~System Care) is a potentially unwanted application (PUA) designed to clean, optimize, and speed up Windows computers. It is categorized as a PUA due to the method that developers use to distribute it - they include Qbit System Care into the set-ups of other programs. Ty

Apple.com-mac-optimizer.live POP-UP Scam (Mac)
Mac Virus

Apple.com-mac-optimizer.live POP-UP Scam (Mac)

apple.com-mac-optimizer[.]live is a scam website, which uses scare-tactics to trick people into installing the Cleanup My Mac application. When accessed, it alerts visitors of various threats it has detected and promotes the app to eliminate them. Note that no website can detect infections/issue