Step-by-Step Malware Removal Instructions

ScreenCapture.app Adware (Mac)
Mac Virus

ScreenCapture.app Adware (Mac)

Identical to Spaces.app and Spotlight.app, ScreenCapture (also known as ScreenCapture.app) is an adware-type application designed to promote the searchbaron.com fake search engine, which is designed to redirect users to bing.com by using the Amazon AWS service. This application typically infilt

Darus Ransomware
Ransomware

Darus Ransomware

First discovered by Michael Gillespie and belonging to the Djvu ransomware family, Darus is a high-risk ransomware infection that stealthily infiltrates computers to encrypt data. In doing so, Darus renames each compromised file by appending the ".darus" extension. For example, "sample.jpg" is re

Tocue Ransomware
Ransomware

Tocue Ransomware

Discovered by Michael Gillespie and belonging to the Djvu ransomware family, Tocue is a high-risk infection that stealthily infiltrates computers and encrypts most stored data, thereby rendering it unusable. Tocue also renames each compromised file by adding the ".tocue" extension (e.g., "sample.

Vusad Ransomware
Ransomware

Vusad Ransomware

First discovered by Michael Gillespie, Vusad is yet another ransomware from the Djvu family. The purpose of this ransomware is to encrypt data and keep it in that state unless a ransom is paid. During encryption, Vusad appends each filename with the ".vusad" extension (e.g., "sample.jpg" is rename

Gusau Ransomware
Ransomware

Gusau Ransomware

Gusau is high-risk ransomware that belongs to a family of viruses called Djvu. Following successful infiltration, Gusau encrypts most stored data rendering it unusable. Additionally, Gusau appends names of all encrypted files with the ".gusau" extension (hence the ransomware name). For example, "

Wacatac Trojan
Trojan

Wacatac Trojan

Wacatac (also known as Trojan:Win32/Wacatac) is a trojan-type infection that stealthily infiltrates computers and performs a number of malicious actions. Cyber criminals typically proliferate this malware using spam email campaigns and fake software 'cracks'. These trojans can do extensive

Guesswho Ransomware
Ransomware

Guesswho Ransomware

Discovered by GrujaRS, Guesswho is a high-risk ransomware infection (potentially, a new variant of Rapid ransomware), which stealthily infiltrates computers and encrypts most stored data. In doing so, Guesswho renames each encrypted file to a random string and appends the ".guesswho" extension. F

Madek Ransomware
Ransomware

Madek Ransomware

Madek is a high-risk ransomware infection discovered by Michael Gillespie and belonging to Djvu, a family of ransomware-type infections. Immediately after infiltration, Madek compromises stored data by encryption, thereby rendering it unusable. In addition, Madek renames each file by adding the "

Gehad Ransomware
Ransomware

Gehad Ransomware

First discovered by Michael Gillespie and belonging to the Djvu ransomware family, Gehad is a high-risk infection designed to encrypt data and keep it in that state unless a ransom is paid. During encryption, Gehad appends each filename with the ".gehad" extension (hence its name). After successf

Extenbro Trojan
Trojan

Extenbro Trojan

Extenbro is a trojan-type application designed to modify DNS system settings in the IPv4 protocol. Cyber criminals proliferate this malware using the "bundling" method, and thus Extenbro infiltrates computers during installation of other programs. The main purpose of Extenbro is to protect a