Step-by-Step Malware Removal Instructions

Oscar Venom Ransomware
Ransomware

Oscar Venom Ransomware

Oscar Venom is a ransomware-type program discovered by MalwareHunterTeam and is a new variant of Jigsaw ransomware. As with most computer infections of this type, Oscar Venom encrypts data and displays a ransom-demand message. In this case, the message is available in English, German, Turkish, an

Apple Support Alert POP-UP Scam (Mac)
Mac Virus

Apple Support Alert POP-UP Scam (Mac)

Identical to "VIRUS ALERT FROM APPLE", "Apple Support Alert" is a fake error message delivered by deceptive websites. Research shows that many users arrive at these sites inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements displayed on othe

Dharma-Gif Ransomware
Ransomware

Dharma-Gif Ransomware

Discovered by Jakub Kroustek, Dharma-Gif is another variant of Dharma ransomware. This malicious program is designed to encrypt data stored on a computer and allows developers to blackmail victims by demanding ransom payments. Dharma-Gif renames all encrypted files by adding the ".id-[victim's_ID

DUNIHI Virus
Trojan

DUNIHI Virus

DUNIHI (also known as Houdini) is high-risk virus designed to infiltrate the system, modify registry settings, and continually self-distribute itself by infiltrating removable drives. This malware allows cyber criminals to perform various actions remotely. Therefore, infiltrated systems are at ver

GandCrab 5.1 Ransomware
Ransomware

GandCrab 5.1 Ransomware

Discovered by TMMalAnalyst, GandCrab 5.1 is a new variant of the GANDCRAB ransomware family. This is a high-risk virus designed to encrypt data and deliver a ransom message within the "[victim's_ID]-DECRYPT.txt" file on modified desktop wallpapers. The new text file is placed in all existing fold

Obfuscated Ransomware
Ransomware

Obfuscated Ransomware

First discovered by Michael Gillespie, Obfuscated is a malicious program classified as ransomware. Like most computer infections of this type, it is designed to lock users' files by encryption and encourage victims to pay a ransom for a decryption tool. Obfuscated renames the filenames of each en

NRSMiner Malware
Trojan

NRSMiner Malware

The NRSMiner tool is a 'cryptominer' used to mine cryptocurrency using various computer resources, including the Central Processing Unit (CPU). This particular miner is designed to mine Monero cryptocurrency using XMRIG. Cyber criminals distribute NRSMiner using the EternalBlue exploit kit, which

Googleapis.com Virus
Phishing/Scam

Googleapis.com Virus

googleapis.com is a legitimate service (API) provided by Google, however, many cyber criminals (scammers) use it to promote various 'tech' (technical) support scams. The purpose of these scams is to extort money from innocent people by tricking them into paying for certain services or products. g

AOL Email Scam
Phishing/Scam

AOL Email Scam

"AOL Email Scam" is another spam email campaign used by cyber criminals. Unlike most of these campaigns, which attempt to trick users into downloading/installing malware or sending money to cyber criminals, "AOL Email Scam" attempts to trick them into entering AOL email account credentials. This

Ppam Ransomware
Ransomware

Ppam Ransomware

Discovered by Petrovic, Ppam is a high-risk computer infection classified as ransomware. Most ransomware-type programs are designed to encrypt data (blocking access to it) and display ransom-demand messages. In this case, Ppam creates a ransom message within the "Restore-My-Files.txt" file, placin