Step-by-Step Malware Removal Instructions

iRansom Ransomware
Ransomware

iRansom Ransomware

iRansom is file encryption ransomware first discovered by Michael Gillespie. Following infiltration, iRansom encrypts files and appends the ".Locked" extension to the name of each encrypted file. For example, "sample.jpg" is renamed to "sample.jpg.Locked". Following successful encryption, iRansom

Search.smokycap.com Redirect (Mac)
Mac Virus

Search.smokycap.com Redirect (Mac)

search.smokycap.com is a fake Internet search engine identical to search.fleecompliment.com, search.goldraiven.com, search.joyround.com, and a number of other sites. By offering improved search results, search.smokycap.com attempts to give the impression of legitimacy, however, developers promo

Search.fleecompliment.com Redirect (Mac)
Mac Virus

Search.fleecompliment.com Redirect (Mac)

Developers present search.fleecompliment.com as a legitimate Internet search engine that supposedly generates improved search results and, thereby enhancing the web browsing experience. Initially, this site may seem legitimate and useful, however, developers promote it using rogue software down

Search.goldraiven.com Redirect (Mac)
Mac Virus

Search.goldraiven.com Redirect (Mac)

search.goldraiven.com is a fake Internet search engine identical to search.wharkike.com, search.follysway.com, and search.joyround.com.  According to the developers, search.goldraiven.com significantly enhances the web browsing experience by generating improved search results. Initially, this

Search.joyround.com Redirect (Mac)
Mac Virus

Search.joyround.com Redirect (Mac)

Identical to search.wharkike.com and search.follysway.com, search.joyround.com is a deceptive website claiming to be a legitimate Internet search engine that significantly enhances the browsing experience by generating improved search results. Judging on appearance alone, search.joyround.com ma

CerberTear Ransomware
Ransomware

CerberTear Ransomware

CerberTear is a new variant of Cerber - a high-risk ransomware-type virus based on Hidden Tear (an open-source ransomware project). CerberTear was firstly discovered by Karsten Hahn. Following infiltration, CerberTear encrypts files using asymmetric cryptography. Unlike its previous version, howe

DummyLocker Ransomware
Ransomware

DummyLocker Ransomware

DummyLocker is a ransomware-type virus discovered by Karsten Hahn. Following system infiltration, DummyLocker encrypts files using AES-256 cryptography and appends the ".dCrypt" extension to the name of each encrypted file (e.g., "sample.jpg" becomes "sample.jpg.dCrypt"). Following successful enc

Gremit Ransomware
Ransomware

Gremit Ransomware

Gremit is a ransomware-type virus which encrypts files stored on the system. During encryption, Gremit appends file names with the ".rnsmwr" extension (e.g., "sample.jpg" is renamed to "sample.jpg.rnsmwr"). A pop-up window containing a ransom-demand message is then displayed. The Gremit messag

Your Computer May Be At Risk Scam
Adware

Your Computer May Be At Risk Scam

"Your Computer May Be At Risk" is a fake error message displayed by a number of deceptive potentially unwanted programs (PUPs, such as "PC Clean Plus", "PC Purifier", etc.) By offering a variety of 'useful features', PUPs often trick users into believing that they are legitimate programs. In fact

Esmeralda Ransomware
Ransomware

Esmeralda Ransomware

Identical to Kangaroo, Esmeralda is an updated version of Apocalypse ransomware. Following infiltration, Esmeralda encrypts various files and appends the ".encrypted" extension to the name of each encrypted file. For instance, "sample.jpg" becomes "sample.jpg.encrypted". A pop-up window is then d