Step-by-Step Malware Removal Instructions

GOG Ransomware
Ransomware

GOG Ransomware

GOG is ransomware-type malware designed to encrypt files using RSA-4096 cryptography. During encryption, GOG appends the ".L0CKED" extension to the name of each file. For example, "sample.jpg" is renamed to "sample.jpg.L0CKED". Following successful encryption, GOG changes the desktop wallpaper an

Erebus Ransomware
Ransomware

Erebus Ransomware

Erebus is a ransomware-type virus distributed via malicious online advertisements. These ads redirect users to a Rig exploit kit server, which infects the computer system. After infiltration, Erebus encrypts various files using RSA-2048 cryptography. During encryption, Erebus renames files the fo

FirstRansomware Ransomware
Ransomware

FirstRansomware Ransomware

FirstRansomware is another malware infection based on an open-source ransomware project named "Hidden Tear". Following successful encryption, FirstRansomware encrypts files using symmetric cryptography (AES). In addition, this malware appends the ".locked" (or ".krzysioka") extension to the name o

OpenToYou Ransomware
Ransomware

OpenToYou Ransomware

OpenToYou is another ransomware-type virus that encrypts files and renames them by appending the ".-opentoyou@india.com" extension to the name of each encrypted file. For instance, "sample.jpg" is renamed to "sample.jpg.-opentoyou@india.com". Once files are encrypted, OpenToYou changes the deskto

Red Alert Ransomware
Ransomware

Red Alert Ransomware

Red Alert is a file-encryption virus based on Hidden Tear (an open-source ransomware project). Red Alert encrypts files using AES cryptography and appends the ".locked" extension to the name of each encrypted file. For example, "sample.jpg" is renamed to "sample.jpg.locked". Once files are encryp

EdgeLocker Ransomware
Ransomware

EdgeLocker Ransomware

EdgeLocker is ransomware-type malware that stealthily infiltrates the system and encrypts various files using RSA cryptography. EdgeLocker was first discovered by Lawrence Abrams and renames encrypted files by appending the ".edgel" extension to the name of each file. For instance, "sample.jpg" i

Antivirus 10 Fake Antivirus
Fake Antivirus

Antivirus 10 Fake Antivirus

Antivirus 10 is a malicious application claiming to be a legitimate anti-virus suite. It is distributed using a deceptive marketing method called "bundling" - stealth installation of potentially unwanted programs (PUPs) with regular software. Sample provided by security researcher Jiri Kropac. Cy

Rusificatory.ru Redirect
Browser Hijacker

Rusificatory.ru Redirect

rusificatory.ru is a fake Internet search engine that falsely claims to generate improved search results. The appearance of this deceptive website barely differs from Google, Bing, Yahoo, and other legitimate search engines. Therefore, many users believe that rusificatory.ru is also legitimate. I

MarineAquariumLite Toolbar
Browser Hijacker

MarineAquariumLite Toolbar

Developed by Mindspark Interactive Network, MarineAquariumLite is a deceptive application that supposedly allows users to create a custom virtual aquarium and set it as the screensaver. These claims often trick users into believing that MarineAquariumLite is legitimate and useful, however, this ap

Search.oriveg.com Redirect (Mac)
Mac Virus

Search.oriveg.com Redirect (Mac)

Identical to search.smokyashan.com, search.loloitos.com, search.kiboletshual.com, and many other sites, search.oriveg.com is a fake Internet search engine that supposedly enhances the Internet browsing experience by generating improved search results. The appearance of this website barely differ