Virus and Spyware Removal Guides, uninstall instructions Redirect redirect removal instructions

What is is a fake search engine that is very similar to other search engines of this type such as,, and a great number of others. It supposed to be a useful search engine, to provide its users with fast searches, accurate search results and so on. However, main purpose of such search engines is to collect browsing-related information. Besides, is promoted using rogue downloaders/installers that are designed to modify browser's settings.

CMG Ransomware

CMG ransomware removal instructions

What is CMG?

CMG is a malicious program that is categorized as ransomware. Its developers (cyber criminals) use it to blackmail people, in other words, to encrypt data and make ransom demands. Once data is encrypted, it cannot be accessed/used. CMG is a computer infection that belongs to GlobeImposter ransomware family and it was discovered by Michael Gillespie. It adds the ".{CALLMEGOAT@PROTONMAIL.COM}CMG" extension to every encrypted file. If a file before encryption was named "1.jpg", then after it CMG will rename that file to "1.jpg.{CALLMEGOAT@PROTONMAIL.COM}CMG" and so on. It generates a ransom note, the "decrypt_files.html" HTML file that can be found in folders with encrypted files.

L1LL Ransomware

L1LL ransomware removal instructions

What is L1LL?

L1LL is another ransomware-type virus discovered by Michael Gillespie. After successfully infiltrating the system, L1LL encrypts most of stored data and appends filenames with ".L1LL" extension (e.g., "sample.jpg" is renamed to "sample.jpg.L1LL". Encrypted data instantly becomes unusable. Following successful encryption, L1LL generates a text file ("help.txt") and drops a copy in every existing folder.

Prus Ransomware

Prus ransomware removal instructions

What is Prus?

Prus is a ransomware-type virus that belongs to Rotor malware family. It was firstly discovered by a malware security researcher, Michael Gillespie. After successful infiltration, Prus encrypts stored data using AES-128 and RSA-2048 encryption algorithms. In addition, Prus appends each filename with developers' email address and ".prus" extension. For instance, "sample.jpg" is renamed to "sample.jpg!!!!    !!!.prus" and so on so forth. Encrypted data instantly becomes unusable. Following successful encryption, Prus drops a text file ("informprus.txt") in every folder containing encrypted files.

Kittens New Tab Browser Hijacker redirect removal instructions

What is

Developers promote Kittens new tab as an app that allows its users to search the web, access their bookmarks and applications using a customized homepage/search engine. It is possible to change its background picture by choosing from more than 30 HD pictures. One way or another, it is presented as a useful application with various features. Nevertheless, this app is classified as a browser hijacker, a potentially unwanted application (PUA). Most people download and install apps of this type unintentionally. Besides, Kittens new tab promotes a questionable (fake) search engine, It also changes browser's settings and collects information about its users browsing habits.

bRcrypT Ransomware

bRcrypT ransomware removal instructions

What is bRcrypT?

There are many various ransomware-type programs like bRcrypT that are used to encrypt data and make ransom demands. This particular ransomware creates a ransom note, a text file called "FILES ENCRYPTED.txt" (its victims should be able to find it in every folder that contains encrypted files). Like most programs of this type, bRcrypT renames every encrypted file, it adds the ".bRcrypT" extension. For example, it renames a file named "1.jpg" to "1.jpg.bRcrypT" and so on. This high-risk computer infection was discovered by Michael Gillespie. Redirect redirect removal instructions

What is

Similar to,, and many others, is a fake web search engine that, according to the developers, enhances web browsing experience by generating improved results, as well as providing quick access to various popular websites. On initial inspection, might actually seem appropriate and handy. However, users must be informed that developers promote this site by using rogue download/installation setups designed to modify web browsers' options without consent. In addition, continually records information relating to user's web browsing activity.

Electronic Materials Involving Underage Children Email Scam

"Electronic materials involving underage children" removal guide

What is "Electronic materials involving underage children"?

"Electronic materials involving underage children" is presented as an email from Central Intelligence Agency (CIA) regarding some international pedophilia case. The main purpose of this email is to trick its recipients into believing that they are one of the suspects, and that some of their personal information is also at risk. In order to avoid any problems, people who received this email are urged to pay a particular amount of cryptocurrency. This is a typical scam that is used to make threats and swindle people out of their money. We strongly recommend not to trust this or any other similar email.

H-Worm RAT Virus

H-WORM virus removal guide

What is H-WORM?

H-WORM is a remote access tool (RAT) developed using VBScript. Research results show that this trojan was developed by a crook who goes by the name of Houdini. At the time of research, H-WORM was mainly distributed using email spam campaigns. This tool also has a USB-spreading function implemented. Yet at the time of research this function wasn't working properly.

Azero Ransomware

Azero ransomware removal instructions

What is Azero?

Azero is yet another ransomware that belongs to Dharma malware family. It was firstly discovered by a malware security researcher, Jakub Kroustek. Just like other variants of Dharma, Azero encrypts stored files and appends filenames with ".azero" extension, alongside with cyber criminals' email address and victim's unique ID. For instance, "sample.jpg" is renamed to something like "[].azero", and so forth. This malware is also designed to open a pop-up window and drop a text file ("FILES ENCRYPTED.txt") on victim's desktop.


Page 3 of 689

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>