Step-by-Step Malware Removal Instructions

Best Classified Ads Promos Adware
Adware

Best Classified Ads Promos Adware

Best Classified Ads Promos is categorized as adware, since it runs intrusive advertisement campaigns. This app delivers unwanted, deceptive and even dangerous ads. Furthermore, it has data tracking capabilities, which are employed to monitor users' browsing activity. Best Classified Ads Promos ha

RekenSom Ransomware
Ransomware

RekenSom Ransomware

RekenSom is a ransomware-type program that was discovered by dnwls0719. Unlike most programs of this type, RekenSom not only encrypts files but also deletes some of them. It renames all encrypted files by using the "Encrypted[a_number_of_dashes].som" pattern (for example, it renames "1.jpg" to "E

TaskBrowser Adware (Mac)
Mac Virus

TaskBrowser Adware (Mac)

TaskBrowser supposedly improves the browsing experience, however, this adware-type application feeds users with ads and gathers information. In most cases, users download and install adware inadvertently. Therefore, apps of this type are categorized as potentially unwanted applications (PUAs).

ExclusiveAction Adware (Mac)
Mac Virus

ExclusiveAction Adware (Mac)

There are many adware-type applications on the internet, including ExclusiveAction, which is part of the AdLoad adware family. It is designed to feed users with various advertisements. Research shows that ExclusiveAction also operates as a browser hijacker to promote the address of a fake search

AproditeSearch Adware (Mac)
Mac Virus

AproditeSearch Adware (Mac)

AproditeSearch is rogue software belonging to the AdLoad adware family. Following successful installation, it delivers various unwanted and dangerous advertisements. AproditeSearch also has browser hijacker qualities such as browser modification and bogus search engine promotion. Furthermore, a

LeadingModuleSearch Adware (Mac)
Mac Virus

LeadingModuleSearch Adware (Mac)

Belonging to the AdLoad malware family, LeadingModuleSearch is an adware-type application that shares many similarities with browser hijackers. This app delivers intrusive ad campaigns and modifies browsers to promote fake search engines. Furthermore, most adware and browser hijackers monitor us

Uzuvnkyh Ransomware
Ransomware

Uzuvnkyh Ransomware

Uzuvnkyh was discovered by GrujaRS and is based on another ransomware infection called HiddenTear. Uzuvnkyh encrypts files, modifies their filenames and creates a ransom message. It appends the ".encrypted" extension to the filename of every encrypted file (e.g., "1.jpg" would be renamed to "1.jpg

ATKL Ransomware
Ransomware

ATKL Ransomware

ATKL is malicious software belonging to the Matrix ransomware family. Systems infected with this program have their data encrypted and receive ransom demands for decryption. During the encryption process, all compromised files are renamed according to the following pattern: cyber criminals' email

GuLoader Malware
Trojan

GuLoader Malware

GuLoader (also known as CloudEyE) is a malware downloader used by cyber criminals to proliferate various Remote Access Trojans (RATs) and other Trojan-type programs. They use GuLoader to infect computers with malicious programs that can be used to steal sensitive information, infect computers with

ONION Ransomware
Ransomware

ONION Ransomware

ONION is a malicious program belonging to the Dharma ransomware family. It operates by encrypting data and demanding payment for decryption tools/software. During the encryption process, all affected files are renamed according to the following pattern: original filename, unique ID, cyber criminal