Step-by-Step Malware Removal Instructions

Maze Ransomware
Ransomware

Maze Ransomware

Discovered by Jérôme Segura, Maze is a ransomware-type program. People who have computers infected with Maze cannot access their files/data - the program encrypts files and keeps them in that state until a ransom is paid. Furthermore, it renames all encrypted files by adding a random extension to

KPOT Stealer
Trojan

KPOT Stealer

Discovered by Jorge Mieres, KPOT is a high-risk trojan designed to steal various personal information. This malware is typically distributed using fake web browser updaters (more information), however, this trojan was previously distributed using spam email campaigns. KPOT can be purchased for $1

Windows Hard Disk Is At High Risk POP-UP Scam
Phishing/Scam

Windows Hard Disk Is At High Risk POP-UP Scam

"Windows hard disk is at high risk" is a technical support scam that is promoted on a deceptive website. Scam websites of this type are used to extort money from unsuspecting people by tricking them into paying for unnecessary software or services. Typically, people do not visit websites of this

Beets Ransomware
Ransomware

Beets Ransomware

Discovered by Jakub Kroustek, Beets is the name of a malicious program classified as ransomware and which is part of the Dharma ransomware family. Ransomware developers use these programs to encrypt victims' data and force them to purchase a decryption tool/key. Beets renames each encrypted file

Rezuc Ransomware
Ransomware

Rezuc Ransomware

This ransomware belongs to the Djvu family and was discovered by Michael Gillespie. Rezuc is one of many ransomware-type programs that encrypts victims' files and blocks access to them until a ransom is paid (a decryption tool/key is purchased). Typically, when files are encrypted, their filenames

Phobos (.help) Ransomware
Ransomware

Phobos (.help) Ransomware

Discovered by GrujaRS, Phobos (.help) is a part of the Phobos ransomware family. The cyber criminals who designed this malicious program use it to encrypt data and force victims to pay a ransom. Like most ransomware-type programs, Phobos (.help) renames each encrypted file. In this case, it chang

mBytes Clean Pro Unwanted Application
Potentially unwanted application

mBytes Clean Pro Unwanted Application

mBytes Clean Pro developers present this app as a system optimization tool that can be used to scan the operating system, clean items that affect computer performance, remove threats that make computers vulnerable to malicious attacks, and so on. In fact, mBytes Clean Pro is categorized as a pote

2k19sys Ransomware
Ransomware

2k19sys Ransomware

Belonging to Paradise ransomware family, 2k19sys is high-risk ransomware discovered by malware researcher mol69. It is designed to stealthily infiltrate computers and encrypt most stored data, thereby making it unusable. During encryption, 2k19sys appends filenames with the victim's unique ID, dev

Your Computer, Email And Smartphone Are Hacked Email Scam
Phishing/Scam

Your Computer, Email And Smartphone Are Hacked Email Scam

"Your computer, email and smartphone are hacked" is a typical scam that is proliferated through emails. Typically, scammers use this technique to extort money from unsuspecting people by threatening to expose compromising photos or videos of them . Do not trust spam campaigns such as "Your comput

Bitcoin Collector Virus
Trojan

Bitcoin Collector Virus

Bitcoin Collector is a malicious program promoted as a tool that allows users to earn from $15 to $45 (in Bitcoins) per day, free and automatically. This program supposedly operates as a cryptocurrency generator, however, its real purpose is to distribute malware. Bitcoin Collector spreads india2