Step-by-Step Malware Removal Instructions

Sihclient.exe Virus
Trojan

Sihclient.exe Virus

sIHCLient.exe is a genuine Windows process that can be found running in Task Manager under the "SIH Client" name when the operating system starts fixing components required for automatic Windows updates. This genuine system file is placed in the "\Windows\System32\" folder. In many cases, cyber c

Macos-online-security-check.com POP-UP Scam (Mac)
Mac Virus

Macos-online-security-check.com POP-UP Scam (Mac)

macos-online-security-check[.]com is deceptive, scam website that is used to promote a potentially unwanted app (PUA) called Mac Cleanup Pro. Visitors are encouraged to download and install this app to remove viruses that this website has supposedly detected. In fact, this is a common scam that

Arberittertwa.info POP-UP Redirect
Adware

Arberittertwa.info POP-UP Redirect

arberittertwa[.]info is similar to many other web pages of this type such as vercallactont[.]com, butitereventwil[.]info, and refrebrepheon[.]info. This is a rogue website that causes redirects to other untrustworthy sites. People do not usually visit arberittertwa[.]info intentionally - the site

Cube Ransomware
Ransomware

Cube Ransomware

Discovered by Michael Gillespie, Cube is classified as a ransomware-type program. When a computer is infected, files become unusable. Cube is designed to encrypt data and keep it locked unless a ransom is paid. It also renames all encrypted files by adding the ".cube" extension. For example, "1.j

Game Jungle Browser Hijacker
Browser Hijacker

Game Jungle Browser Hijacker

The Game Jungle application is promoted as allowing users to access an extensive collection of free online games. People tend to download and install apps of this type unintentionally. Therefore, Game Jungle is categorized as a potentially unwanted app (PUA), a browser hijacker. Typically, apps o

Scranos Rootkit
Trojan

Scranos Rootkit

Scranos is a malicious rootkit driver that stealthily infiltrates the system and continually injects it with a number of high-risk payloads. Most of the payloads (injected malicious applications) are categorized as data stealers. I.e., they are designed to steal various personal information (e.g.,

Gotcha Ransomware
Ransomware

Gotcha Ransomware

Gotcha is a ransomware-type program discovered by Michael Gillespie. Like most programs of this type, it is used by cyber criminals to encrypt files stored on a victim's computer and keep them unusable unless a ransom is paid. It adds the ".gotcha" extension to every encrypted file. For example,

Azurewebsites.net POP-UP Scam
Phishing/Scam

Azurewebsites.net POP-UP Scam

Microsoft Azure Web Sites is a web-hosting platform based on cloud computing, a legitimate service developed by Microsoft. It supports multiple technologies and programming languages (such as .NET, PHP, node.js, Python, and so on). As part of creating a website, the site's URL is assigned a subdom

Zippyshare Virus
Adware

Zippyshare Virus

Zippyshare is a file hosting service that can be used on the zippyshare[.]com website. Users can upload files no larger than 500 megabytes and share them with other people. This service is provided by a legitimate, harmless website, however, its developers use advertising networks. Therefore, it

Apple.com-optimize.live POP-UP Scam (Mac)
Mac Virus

Apple.com-optimize.live POP-UP Scam (Mac)

apple.com-optimize[.]live is one of many scam websites on the internet. Scammers designed this site to trick visitors into believing that their computers are infected and encourage them to download a potentially unwanted application (PUA) called Cleanup My-Mac. Neither this website nor apps pro