Step-by-Step Malware Removal Instructions

Zoh Ransomware
Ransomware

Zoh Ransomware

First discovered by Jakub Kroustek and belonging to the Dharma family, Zoh is high-risk ransomware which stealthily infiltrates systems and encrypts most stored data by compromising files. During encryption, Zoh appends filenames with the victim's unique ID, developer's email address and .zoh exte

Youtube Lottery Email Scam (Mac)
Mac Virus

Youtube Lottery Email Scam (Mac)

"Youtube Lottery" Email Scam (Mac) is used to trick people into believing that they have won a YouTube lottery. The main goal of this scam is to encourage recipients to send their full names, addresses, mobile telephone numbers, and other information to scammers. Since this is merely a scam and

Robotcaptcha.info POP-UP Redirect
Adware

Robotcaptcha.info POP-UP Redirect

Robotcaptcha.info is a rogue website very similar to pushnotificationsite[.]com, pushnotificationapp[.]com, digitalsmirror[.]com, and many others. It is designed to lead visitors to other untrustworthy sites. Typically, people do not visit robotcaptcha.info willingly - they are redirected by poten

Smartpackagetracker.com Redirect
Browser Hijacker

Smartpackagetracker.com Redirect

smartpackagetracker.com is a fake search engine that supposedly enhances the browsing experience by generating improved results. Judging on appearance alone, smartpackagetracker.com may seem legitimate and useful, however, this site is promoted using a browser-hijacking app called Smart Package Tr

Wscript.exe Virus
Trojan

Wscript.exe Virus

The wscript.exe file belongs to the Microsoft Windows Operating System. Note that wscript.exe is also known as Windows Script, a service that provides the Windows system with scripting abilities. Unfortunately, cyber criminals often use the names of legitimate processes and files to disguise malwa

Svchost.exe Virus
Trojan

Svchost.exe Virus

svchost.exe is the generic name of a legitimate Microsoft Windows process that can be found running in the Task Manager. Typically, there is more than one Service Host process running at once, since separate processes handle separate groups of services. For example, one svchost.exe process might

Ghost (Jamper) Ransomware
Ransomware

Ghost (Jamper) Ransomware

First discovered by malware security researcher, Sandor Nemes, Ghost (Jamper) is new variant of high-risk ransomware called Jamper. Once infiltrated, Ghost (Jamper) encrypts most stored files and appends filenames with a random string, probably comprising the victim's unique ID (e.g., "sample.jpg

DDT Ransomware
Ransomware

DDT Ransomware

Discovered by Michael Gillespie, DDT is part of GlobeImposter, a family of ransomware-type programs. Like most programs of this type, DDT encrypts files stored on computers and keeps them locked unless a ransom is paid (victims purchase a decryption tool that can decode files encrypted by DDT). I

Heroset Ransomware
Ransomware

Heroset Ransomware

The Heroset program belongs to the Djvu ransomware family and was discovered by Michael Gillespie. The main purpose of Heroset is to encrypt files (rendering them unusable) and force victims to pay a ransom (in effect, purchase a decryption tool).  Heroset places the "_readme.txt" file (containin

Euclid Ransomware
Ransomware

Euclid Ransomware

Discovered by Michael Gillespie, Euclid is high-risk ransomware designed to encrypt most stored files, thereby rendering them unusable. During encryption, Euclid appends filenames with the ".euclid" extension. For instance, "sample.jpg" is renamed to "sample.jpg.euclid". Euclid also delivers a ra