Step-by-Step Malware Removal Instructions

Locky Imposter Ransomware
Ransomware

Locky Imposter Ransomware

First discovered by malware security researcher, dao ming si, Locky Imposter (also known as "PyLocky") is a ransom-type virus that imitates another high-risk ransomware infection called Locky.  After stealthily infiltrating the system, Locky Imposter encrypts data using the RSA and AES encryption

Instagram2go Adware
Adware

Instagram2go Adware

Instagram2go is a deceptive application that claims to allow use of the Instagram social network directly from the desktop. This functionality may seem legitimate and useful, however, this app is likely to infiltrate systems without permission. Furthermore, it delivers intrusive advertisements an

Client Requirements Email Virus
Phishing/Scam

Client Requirements Email Virus

"Client Requirements Email Virus" is another spam email campaign similar to Order Confirmation Email Virus, BID PURCHASE DOCUMENT Email Virus, and many others. Cyber criminals use this campaign to proliferate high-risk malware called LokiBot. As usual, criminals send thousands of deceptive emails

Super Clean Pro 2018 Unwanted Application
Potentially unwanted application

Super Clean Pro 2018 Unwanted Application

Super Clean Pro 2018 is a dubious application that developers present as high-end system optimization/cleaning software. Judging on appearance alone, Super Clean Pro 2018 may seem legitimate and useful, however, developers promote this app using a deceptive marketing method called "bundling". The

PEGASUS SPYWARE ACTIVATED Scam (Mac)
Mac Virus

PEGASUS SPYWARE ACTIVATED Scam (Mac)

Displayed by a deceptive website, "PEGASUS SPYWARE ACTIVATED" is a fake error similar to "Immediately Call Apple Support", "APPLE SECURITY BREACH", "AppleCare And Warranty", and many others. Users often visit this website inadvertently - they are redirected by various potentially unwanted progra

Cassetto Ransomware
Ransomware

Cassetto Ransomware

Cassetto is a ransomware-type virus discovered by MalwareHunterTeam. Immediately after infiltration, Cassetto encrypts most stored files and appends filenames with the ".cassetto" extension. For instance, "sample.jpg" is renamed to "sample.jpg.cassetto". Once encrypted, files immediately become u

Cortana.exe Crypto Miner Virus
Trojan

Cortana.exe Crypto Miner Virus

Cortana.exe is a cryptocurrency-mining trojan that stealthily infiltrates the system and utilizes resources (specifically, CPU) to mine Monero cryptocurrency. Note that Cortana.exe is actually a renamed executable of XMRIG, a legitimate cryptocurrency-mining tool. Since Cortana.exe is used to mine

Trojan.gen.npe.2 Virus
Trojan

Trojan.gen.npe.2 Virus

Trojan.gen.npe.2 is a generic name for specific malware. It is malicious and poses a significant threat to computer safety. In the past, Symantec anti-virus suite treated legitimate (clean) files as Trojan.gen.npe.2 malware. This type detection is called a 'false positive'. False positives

Found 4 Virus POP-UP Scam
Phishing/Scam

Found 4 Virus POP-UP Scam

"Found 4 Virus" is a fake error similar to VIRUS ALERT FROM MICROSOFT, Critical System Error: x679Qs5m, and many others. The error is displayed by various websites that users often visit inadvertently - they are redirected by potentially unwanted applications (PUAs) or intrusive advertisements de

Windows Operating System Alert POP-UP Scam
Phishing/Scam

Windows Operating System Alert POP-UP Scam

"Windows Operating System Alert" is a fake error message similar to Found 4 Virus, Error DT00X2, ERROR 268d3x8938, and many others. It is delivered by various dubious websites. In most cases, users visit these sites inadvertently - they are redirected by potentially unwanted applications (PUAs) or