Step-by-Step Malware Removal Instructions

Dharma-Gif Ransomware
Ransomware

Dharma-Gif Ransomware

Discovered by Jakub Kroustek, Dharma-Gif is another variant of Dharma ransomware. This malicious program is designed to encrypt data stored on a computer and allows developers to blackmail victims by demanding ransom payments. Dharma-Gif renames all encrypted files by adding the ".id-[victim's_ID

DUNIHI Virus
Trojan

DUNIHI Virus

DUNIHI (also known as Houdini) is high-risk virus designed to infiltrate the system, modify registry settings, and continually self-distribute itself by infiltrating removable drives. This malware allows cyber criminals to perform various actions remotely. Therefore, infiltrated systems are at ver

GandCrab 5.1 Ransomware
Ransomware

GandCrab 5.1 Ransomware

Discovered by TMMalAnalyst, GandCrab 5.1 is a new variant of the GANDCRAB ransomware family. This is a high-risk virus designed to encrypt data and deliver a ransom message within the "[victim's_ID]-DECRYPT.txt" file on modified desktop wallpapers. The new text file is placed in all existing fold

Obfuscated Ransomware
Ransomware

Obfuscated Ransomware

First discovered by Michael Gillespie, Obfuscated is a malicious program classified as ransomware. Like most computer infections of this type, it is designed to lock users' files by encryption and encourage victims to pay a ransom for a decryption tool. Obfuscated renames the filenames of each en

NRSMiner Malware
Trojan

NRSMiner Malware

The NRSMiner tool is a 'cryptominer' used to mine cryptocurrency using various computer resources, including the Central Processing Unit (CPU). This particular miner is designed to mine Monero cryptocurrency using XMRIG. Cyber criminals distribute NRSMiner using the EternalBlue exploit kit, which

Googleapis.com Virus
Phishing/Scam

Googleapis.com Virus

googleapis.com is a legitimate service (API) provided by Google, however, many cyber criminals (scammers) use it to promote various 'tech' (technical) support scams. The purpose of these scams is to extort money from innocent people by tricking them into paying for certain services or products. g

AOL Email Scam
Phishing/Scam

AOL Email Scam

"AOL Email Scam" is another spam email campaign used by cyber criminals. Unlike most of these campaigns, which attempt to trick users into downloading/installing malware or sending money to cyber criminals, "AOL Email Scam" attempts to trick them into entering AOL email account credentials. This

Ppam Ransomware
Ransomware

Ppam Ransomware

Discovered by Petrovic, Ppam is a high-risk computer infection classified as ransomware. Most ransomware-type programs are designed to encrypt data (blocking access to it) and display ransom-demand messages. In this case, Ppam creates a ransom message within the "Restore-My-Files.txt" file, placin

Jundmd@cock.li Ransomware
Ransomware

Jundmd@cock.li Ransomware

jundmd@cock.li is another ransomware-type virus discovered by malware security researcher, Petrovic. Once infiltrated, jundmd@cock.li encrypts most stored data and appends filenames with the ".jundmd@cock.li!!" extension. For example, "sample.jpg" becomes "sample.jpg.jundmd@cock.li!!". Following

GootKit Trojan
Trojan

GootKit Trojan

GootKit (also known as talalpek, Trojan.GootKit or Xswkit) is a trojan-type malicious computer program. Like many other trojans, GootKit steals various personal, confidential information. Once installed, it also acts as a 'backdoor' allowing cyber criminals to access and control a computer remote