Virus and Spyware Removal Guides, uninstall instructions

Madek Ransomware

Madek ransomware removal instructions

What is Madek?

Madek is a high-risk ransomware infection discovered by Michael Gillespie. It belongs to Djvu - a family of ransomware-type infections. Immediately after infiltrating, Madek compromises stored data by encrypting and thereby rendering it unusable. In addition, Madek renames each file by adding ".madek" appendix (e.g., "sample.jpg" is renamed to "sample.jpg.madex" and so forth). Once encryption is over, Madek generates a text file ("_readme.txt") and drops its copies in all existing folders.

   
Gehad Ransomware

Gehad ransomware removal instructions

What is Gehad?

Belonging to Djvu ransomware family, Gehad is a high-risk infection designed to encrypt data and keep it that way unless a ransom is paid. While encrypting, Gehad appends each filename with ".gehad" extension (thus, its name). After successful encryption, Gehad generates "_readme.txt" file and drops a copy in every existing folder. This ransomware was firstly discovered by Michael Gillespie.

   
Extenbro Trojan

Extenbro virus removal guide

What is Extenbro?

Extenbro is a trojan-type application designed to modify system's DNS settings in IPv4 protocol. Cyber criminals proliferate this malware by using a "bundling" method, meaning that Extenbro infiltrates computers during installation of other programs.

   
Hidden Bee Malware

Hidden Bee virus removal guide

What is Hidden Bee?

Hidden Bee (also known as Hidden Mellifera) is a trojan-type infection designed to mine cryptocurrency and, therefore, decrease system's performance. This malware infiltrates computers without user's consent. Research results show that cyber criminals spread this malware by using Popcash advertising network, as well as Underminer Exploit Kit (EK).

   
1BTC Ransomware

1BTC ransomware removal instructions

What is 1BTC?

1BTC is yet another variant of a high-risk ransomware called Dharma. As with its predecessor, 1BTC encrypts most of stored files and appends each filename with victim's unique ID, developers' email address and ".1BTC" extension. I.e., "sample.jpg" would be renamed to something like "sample.jpg.id-1E857D00.[btcdecoding@foxmail.com].1BTC". Following successful encryption, 1BTC opens a pop-up window and drops "RETURN FILES.txt" text file on victim's desktop. 1BTC was firstly discovered by Jakub Kroustek.

   
V6cye Ransomware

V6cye ransomware removal instructions

What is V6cye?

V6cye is a ransomware-type infections that belongs to Snatch ransomware family. This malware is designed to encrypt data and to make ransom demands. While encrypting, V6cye adds ".v6cye" appendix to each filename. Additionally, V6cye drops "RESTORE_V6CYE_FILES.txt" text file on victim's desktop. This ransomware was firstly discovered by Michael Gillespie.

   
Berosuce Ransomware

Berosuce ransomware removal instructions

What is Berosuce?

Discovered by Michael Gillespie, Berosuce is yet another ransomware from Djvu family. As with other malware from this family, Berosuce encrypts most of encrypted data. It also appends filenames with ".berosuce" extension (e.g., "sample.jpg" would be renamed to "sample.jpg.berosuce" and so on so forth). Encrypted data instantly becomes unusable. After successful encryption, Berosuce generates a text file named "_readme.txt" and drops its copies in all existing folders.

   
Gloyah.net Ads

Gloyah[.]net redirect removal instructions

What is gloyah[.]net?

gloyah[.]net is a website related to adf.ly website. Adf.ly is a legitimate website that provides URL-shortening service. The users of this service get paid for shortening URLs and promoting them because each visitor is presented with a 5-second advertisement before he/she can reach the actual target (website). gloyah[.]net is one of the websites promoted by adf.ly.

   
Spaces.app Adware (Mac)

How to remove Spaces from Mac?

What is Spaces?

Identical to Spotlight.app, Spaces (also known as Spaces.app) is a rogue adware-type application that promotes a searchbaron.com fake web search engine. This application is designed to monitor user's web browsing activity and to redirect users to searchbaron.com whenever they enter a search query. Spaces usually infiltrates computers without user's consent.

   
Actor Ransomware

Actor ransomware removal instructions

What is Actor?

Belonging to Phobos ransomware family, Actor is a high-risk malware discovered by GrujaRS. After successful infiltration, Actor encrypts most of stored files and appends filenames with ".Actor" extension, as well as developers' email address and victim's unique ID. For example a file named "1.jpg" would be renamed to something like "1.jpg.id[1E857D00-2224].[zoye1596@msgden.net].actor". Once data is encrypted, Actor generates two files ("info.txt" and "info.hta"), dropping them on victim's on desktop.

   

Page 1 of 755

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global virus and spyware activity level today:

Medium threat activity
Medium

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal