Step-by-Step Malware Removal Instructions

Double Your BTC Email Scam
Phishing/Scam

Double Your BTC Email Scam

"Double Your BTC" is a spam campaign, a mass-scale operation during which deceptive emails are sent by the thousand. These messages promote a scam website promising to double the BTC (Bitcoin cryptocurrency) recipients invest in it. Note that all of the information provided by "Double Your BTC" e

Wallet Secure POP-UP Scam
Phishing/Scam

Wallet Secure POP-UP Scam

"Wallet Secure" is a scam promoted on various deceptive web pages. The scheme is presented as a service designed to store and securely connect digital wallets. through the "Wallet Secure" scam - victims' wallet credentials are extracted, which are then used to gain access and control over the wall

Alienlock Ransomware
Ransomware

Alienlock Ransomware

Typically, users who have their computers infected with ransomware cannot access their files because they are encrypted. Malware of this type blocks access to files and displays a ransom message (or creates one in a text/other file). Alienlock not only encrypts files but also renames them by appe

Instant Safe Web Browser Hijacker
Browser Hijacker

Instant Safe Web Browser Hijacker

Instant Safe Web is rogue software that is categorized as a browser hijacker. It modifies browser settings to promote the instantsafeweb.com bogus search engine. Additionally, most browser hijackers gather browsing-related information, and this is likely to include Instant Safe Web. Since most us

Your Lovely Tab Browser Hijacker
Browser Hijacker

Your Lovely Tab Browser Hijacker

Your Lovely Tab is a potentially unwanted application (PUA) that hijacks browsers by changing certain settings. The main purpose of browser hijackers is to promote fake search engines. Your Lovely Tab promotes quicknewtab.com in this way. Apps of this type are classified as PUAs because most user

NASAcry Ransomware
Ransomware

NASAcry Ransomware

Part of the Snatch ransomware family, NASAcry is a malicious program designed to encrypt data and demand payment for decryption. It operates by rendering victims' files inaccessible/useless and demanding ransoms for recovery. During the encryption process, files are renamed with a random characte

CRYPTBD Ransomware
Ransomware

CRYPTBD Ransomware

CRYPTBD is malicious software belonging to the MedusaLocker ransomware family. This malware operates by encrypting data and demanding payment for decryption. Files affected by CRYPTBD are rendered inaccessible, and victims receive ransom demands for access recovery. During the encryption process,

Searchfox.me Redirect (Mac)
Mac Virus

Searchfox.me Redirect (Mac)

searchfox.me is the address of a fake search engine that appears in browser settings after installation of a browser hijacker. The app that changes settings to promote searchfox.me is distributed via a fake installer designed to appear like the installer for Adobe Flash Player. Generally, users

Ro01.biz Ads
Notification Spam

Ro01.biz Ads

ro01[.]biz is a rogue website sharing common traits with appzery.com, finddealsdaily.com, liveads.net, and thousands of others. This page operates by delivering dubious content and redirecting visitors to other untrusted/malicious sites. Most users access these web pages unintentionally - they ar

Liz Ransomware
Ransomware

Liz Ransomware

Ransomware is a type of malware that blocks access to the computer (or files stored on it) by encryption. In order to unlock (decrypt) data, victims are required to pay a ransom. Liz ransomware encrypts files and renames them by adding the victim's ID, the lizardcrypt@tuta.io email address to the