Step-by-Step Malware Removal Instructions

TVPlusNewtab Browser Hijacker
Browser Hijacker

TVPlusNewtab Browser Hijacker

TVPlusNewtab is a browser hijacker, endorsed as a tool for easy access to movie trailers, TV series and celebrity content. It is also supposedly capable of allowing users to quickly view PDF documents. TVPlusNewtab operates by making modifications to browser settings in order to promote search.tvp

Ncrypt Ransomware
Ransomware

Ncrypt Ransomware

Ncrypt is a ransomware-type malware designed to encrypt victims' files. It was first discovered by a security researcher Michael Gillespie.  During encryption, this malware appends a ".NCRYPT" extension to the name of each file. For instance, "sample.jpg" is renamed to "sample.jpg.NCRYPT". After

CryptoLocker 5.1 Ransomware
Ransomware

CryptoLocker 5.1 Ransomware

CryptoLocker 5.1 is newly-discovered ransomware claiming to be the CryptoLocker virus. It is based on Hidden Tear - an open-source ransomware project. Following system infiltration, CryptoLocker 5.1 encrypts files using RSA-2048 cryptography and appends a ".locked" extension to the name of each en

FunSafeTab Browser Hijacker
Browser Hijacker

FunSafeTab Browser Hijacker

FunSafeTab is a browser hijacker, endorsed as a tool to increase user security when browsing. It operates by modifying web browser settings in order to promote search.funsafetabsearch.com - a fake search engine. Search.funsafetabsearch.com may appear legitimate and useful, however it is unable to

APT Ransomware
Ransomware

APT Ransomware

APT Ransomware v2.0 is a ransomware-type virus designed to encrypt files using RSA-4096 cryptography. This ransomware is based on a Hidden Tear project (so-called 'educational ransomware' that was released as Open Source in August 2015). APT appends a ".dll" extension to the name of each encrypted

Enigma Ransomware
Ransomware

Enigma Ransomware

Enigma is a ransomware-type virus that encrypts files using AES-128 cryptography. During encryption, Enigma appends a ".1txt" extension to the name of each encrypted file (a previous version of Enigma appended the ".enigma" extension). For example, "sample.jpg" is renamed to "sample.jpg.1txt". On

Login.hhtxnet.com Redirect
Browser Hijacker

Login.hhtxnet.com Redirect

login.hhtxnet.com is a rogue website claiming to be a legitimate Internet search engine. Developers promote this site via malicious javascript files that stealthily modify web browser settings without users' consent. Furthermore, login.hhtxnet.com continually gathers information relating to Intern

Comrade Circle Ransomware
Ransomware

Comrade Circle Ransomware

Comrade Circle is newly-discovered ransomware similar to Fantom. Following infiltration, Comrade Circle encrypts files and renames them using a "[6-16 random symbols].comrade" pattern. For instance, "sample.jpg" might be renamed to "sdf9K21a=G.comrade". Updated variants of this ransomware use .en

K0stia Ransomware
Ransomware

K0stia Ransomware

K0stia is a ransomware-type virus distributed via spam emails (with malicious .exe attachments claiming to be .pdf files). When these malicious files are opened, ransomware starts encrypting files using AES-256 cryptography. This virus appends a ".k0stia" extension to the name of each encrypted fi