Step-by-Step Malware Removal Instructions

Mordor Ransomware
Ransomware

Mordor Ransomware

Mordor is a ransomware-type virus discovered by MalwareHunterTeam. This malware is a based on an open source ransomware project called Hidden Tear. Cyber criminals edit Hidden Tear source code and attempt to generate revenue by providing Mordor as a RaaS (Ransomware-as-a-Service). Mordor is distr

Restore@protonmail.ch Ransomware
Ransomware

Restore@protonmail.ch Ransomware

Restore@protonmail.ch is an new version of Fantom ransomware. Once infiltrated, restore@protonmail.ch encrypts files using asymmetric cryptography. As with Fantom, restore@protonmail.ch also displays a fake Windows Update screen during file encryption. Furthermore, this ransomware renames encrypt

OzozaLocker Ransomware
Ransomware

OzozaLocker Ransomware

OzozaLocker is a ransomware-type virus that infiltrates the system and encrypts various data. During encryption, OzozaLocker appends the ".locked" extension to the name of each encrypted file. For instance, "sample.jpg" is renamed to "sample.jpg.locked". A text file ("HOW TO DECRYPT YOU FILES.txt

Combotab.com Redirect
Browser Hijacker

Combotab.com Redirect

Developers present combotab.com as an search engine that generates improved results and, therefore, enhances the Internet browsing experience. Judging on appearance alone, combotab.com may seem legitimate and useful, however, this site gathers various information relating to Internet browsing act

Ranion Ransomware
Ransomware

Ranion Ransomware

Ranion is a ransomware virus promoted as a RaaS (Ransomware-as-a-Service) in the Dark Web. This malware is designed to encrypt various data using the AES encryption algorithm. Following successful encryption, Ranion opens a pop-up window containing a ransom-demand message. The message states t

NM4 Ransomware
Ransomware

NM4 Ransomware

NM4 is ransomware-type malware discovered by Michael Gillespie. This virus stealthily infiltrates systems and encrypts various data using the AES and RSA encryption algorithms. During encryption, this malware appends names of encrypted files with the ".NM4" extension. Following successful encrypt

Jokers House Ransomware
Ransomware

Jokers House Ransomware

First discovered by security researcher, Michael Gillespie, Jokers House is another variant of ransomware-type malware called Jigsaw. Once infiltrated, Jokers House encrypts files using AES cryptography. During encryption, Jokers House appends filenames with the ".Contact_TarineOZA@Gmail.com_" ext

Seekdns.com Redirect
Browser Hijacker

Seekdns.com Redirect

seekdns.com is a deceptive website that falsely claims to be an Internet search engine that generates improved results. Judging on appearance alone, seekdns.com may appear legitimate and useful, however, this site records various user-system information relating to browsing activity. Furthermore,

MapFinderz Toolbar
Browser Hijacker

MapFinderz Toolbar

MapFinderz is a deceptive application that falsely claims to provide access to various maps and other GPS-related functions. On initial inspection, MapFinderz may appear legitimate and useful, however, this app usually infiltrates systems without consent. In addition, it modifies browser settings

My1tab.com Redirect
Browser Hijacker

My1tab.com Redirect

my1tab.com is a deceptive website that supposedly generates improved search results and, therefore, enhances the Internet browsing experience. On initial inspection, my1tab.com may appear legitimate and useful, however, developers promote this site by employing rogue download/installation set-ups