Step-by-Step Malware Removal Instructions

Bigdata Ransomware
Ransomware

Bigdata Ransomware

Discovered by dnwls0719, Bigdata belongs to the GlobeImposter ransomware. Bigdata encrypts files, changes their filenames and generates a ransom message. It renames all encrypted files by appending the ".bigdata" extension. For example, a file named "1.jpg" would become "1.jpg.bigdata", and so on.

China Ransomware
Ransomware

China Ransomware

Discovered by dnwls0719, China is a malicious program classified as ransomware. Systems infected with this malware suffer data encryption and users receive ransom demands for decryption. During the encryption process, all affected files are appended with the ".China" extension. For example, a fil

OBERONBOOSTER Unwanted Application
Potentially unwanted application

OBERONBOOSTER Unwanted Application

The OBERONBOOSTER program is advertised as an operating system optimization tool, however, it is distributed through various download/installation set-ups. Many people unintentionally download and install programs that are included in the set-ups of other programs. Therefore, OBERONBOOSTER is clas

I Infected Your Computer With My Private Trojan Email Scam
Phishing/Scam

I Infected Your Computer With My Private Trojan Email Scam

"I infected your computer with my private trojan" is a scam email using the 'sextortion' scam model. This message attempts to blackmail recipients with videos of their sexual activity (the videos are nonexistent). The scammers claim that they have obtained this compromising material via malware th

Thefastpush.com Ads
Notification Spam

Thefastpush.com Ads

thefastpush[.]com is one of many untrusted websites designed to redirect visitors to other pages of this kind or load dubious content. It is similar to place-web[.]com, fast-push[.]com, supposercality[.]pro and many other web pages. Typically, people do not visit these websites intentionally - br

Max Utilities Unwanted Application
Potentially unwanted application

Max Utilities Unwanted Application

Max Utilities is categorized as a Potentially Unwanted Application (PUA), and yet endorsed as software capable of cleaning operating systems and optimizing performance. Amongst its advertised capabilities are removal of Windows Registry errors and temporary files, Windows history cleaning, file pr

Adobe Document Cloud E-Signing Email Virus
Phishing/Scam

Adobe Document Cloud E-Signing Email Virus

Cyber criminals often attempt to deceive users into installing malware on the operating system by sending emails that contain malicious attachments (or website links that download the malicious files). Their main goal is to trick recipients into opening the dangerous files, which install malicious

InLog Browser Adware
Adware

InLog Browser Adware

From the same developers as the Inlog Optimizer PUA (Potentially Unwanted Application), InLog is a rogue browser and based on a legitimate, open-source project called Chromium. While promoted as genuine software, using it significantly diminishes the browsing experience. It operates as adware and

SERVO99 Ransomware
Ransomware

SERVO99 Ransomware

Based on other ransomware named Hakbit, SERVO99 (also known as BSJB) was discovered by James. SERVO99 encrypts files, changes the desktop wallpaper and drops a ransom message in all folders that contain encrypted data. It renames encrypted files by appending the ".crypted" extension to filenames.

8800 Ransomware
Ransomware

8800 Ransomware

Discovered by malware researcher, Raby, 8800 is a malicious program belonging to the Dharma ransomware family. This malware is designed to encrypt the data of infected systems and demand payment for decryption. During the encryption process, all affected files are renamed according to the followi