Step-by-Step Malware Removal Instructions

Cameras And A Mic Start Recording Email Scam
Phishing/Scam

Cameras And A Mic Start Recording Email Scam

Scammers use the "Cameras and a mic start recording" spam campaign/scam to trick people into transferring cryptocurrency funds to them. They claim that they have recorded a compromising video of the recipient and threaten to share it with other people unless their demands are met. This spam campai

Bitrep Trojan
Trojan

Bitrep Trojan

Bitrep (also known as Trojan: Win32/Bitrep.A) is a trojan-type infection that infiltrates the system and performs various malicious tasks. Note that trojans of this type infiltrate computers stealthily, without users' consent. Cyber criminals often proliferate them using other trojans (chain infec

Registry Mechanic Virus
Trojan

Registry Mechanic Virus

The Registry Mechanic program supposedly allows computers to run faster and also cleans them. According to the developers, it can improve computer performance by removing junk files, fixing and cleaning the registry, and optimizing browsers. In fact, this is a malicious program known as Trojan.Cli

Microsoft Cleaner Virus
Trojan

Microsoft Cleaner Virus

Microsoft Cleaner is promoted as a program that cleans junk files, boosts memory, cleans and fixes the registry, optimizes browsers, and so on. Developers present it as a legitimate system optimization tool, however, it also operates as a Trojan.Clicker, a malicious program used to perform 'click

DDOS Ransomware
Ransomware

DDOS Ransomware

Discovered by Jakub Kroustek, DDOS is yet another ransomware infection from the Dharma family. DDOS is designed to stealthily infiltrate the system and encrypt most stored files. During encryption, DDOS renames each file by appending the ".DDOS" extension plus the victim's unique ID and developer'

Bible Verses Browser Hijacker
Browser Hijacker

Bible Verses Browser Hijacker

Bible Verses is promoted as a useful app that provides verses from the Bible, however, it is actually a potentially unwanted application (PUA) that operates as a browser hijacker. It promotes search.hbible-verses.app, a dubious (fake) search engine by making changes to browser settings. It also c

PLUT Ransomware
Ransomware

PLUT Ransomware

The PLUT program was discovered by Jakub Kroustek and belongs to the Dharma ransomware family. This software is used to encrypt data and block access to it until a ransom is paid. Ransomware victims are forced to purchase a decryption tool/key. Furthermore, PLUT adds the ".PLUT" extension to every

Jack Ransomware
Ransomware

Jack Ransomware

Jack is high-risk ransomware that belongs to a family of ransomware infections called Dharma. This malware was first discovered by cyber security researcher, Jakub Kroustek. After successful infiltration, Jack encrypts most stored data and appends filenames with the ".jack" extension plus the vict

Search.privatesearch.online Redirect
Browser Hijacker

Search.privatesearch.online Redirect

The search.privatesearch.online website operates as a search engine, however developers promote it using a browser hijacker called Private Browsing by Safely. Browser hijackers are categorized as potentially unwanted applications (PUAs). The search engines that they promote are generally useless

Wesker Encrypter Ransomware
Ransomware

Wesker Encrypter Ransomware

Wesker Encrypter is malicious software (ransomware) that prevents victims from accessing their files by encoding them with strong encryption. Therefore, victims cannot access files unless a cryptocurrency ransom is paid. Unlike most programs of this type, Wesker Encrypter does not rename any encr