Virus and Spyware Removal Guides, uninstall instructions

Al Hafez Trading Company Email Virus

"Al Hafez Trading Company Email Virus" removal guide

What is "Al Hafez Trading Company Email Virus"?

"Al Hafez Trading Company Email Virus" is a scam that cyber criminals use with intention to spread the NanoCore remote access trojan (RAT). They send emails that contain a malicious Microsoft Office document and hope that someone will open it. Once opened, it causes download and installation of the aforementioned RAT. Having it installed might cause serious problems, for this reason we strongly recommend to ignore this email (scam).

Helper Ransomware

Helper ransomware removal instructions

What is Helper?

Helper is yet another ransomware-type infection discovered by Jakub Kroustek. As with most of other ransomware infections, Helper stealthily infiltrates computers and encrypt stored files, thereby making them unusable. While encrypting, Helper renames each file by appending a random string as an extension. For instance, Helper would rename "sample.jpg" to something like "sample.jpg.OOOKJYHCTVDF" and so on so forth. After successful encryption Helper generates a text file ("YOUR FILES ARE ENCRYPTED.TXT") and drops it on victim's desktop. This text file contains a ransom-demanding message.

Dotmap Ransomware

Dotmap ransomware removal instructions

What is Dotmap?

Dotmap is a malicious software categorized as ransomware. It encrypts data and forces its victims to pay a ransom (purchase a decryption tool/key). Dotmap belongs to Djvu ransomware family, it was discovered by Michael Gillespie. This ransomware changes names of encrypted files by adding ".dotmap" extension. For example, it renames a file named "1.jpg" to "1.jpg.dotmap" and so on. Instructions on how to decrypt data (ransom note) can be found in "_readme.txt" file, it should be placed in folders that contain encrypted files.

Mamba Ransomware

Mamba ransomware removal instructions

What is Mamba?

Discovered by GrujaRS, Mamba is an updated variant of a high-risk ransomware called Phobos. After successful infiltration, Mamba encrypts stored files and appends filenames with ".mamba" extension, as well as victim's unique ID and developers' email address. For instance, a file named "sample.jpg" would be renamed to something like "[1E857D00-1130].[].mamba". Encrypted files instantly become unusable. Mamba is also designed to drop "info.txt" text file on victim's desktop and to display a pop-up window ("info.hta" html application).

PC Regcleaners Virus

PC Regcleaners virus removal guide

What is PC Regcleaners?

PC Regcleaners (other known variants are named Regcleanerz and Regcleaners) is promoted as a system/computer optimization program which supposed to make its user's computer cleaner and to start faster. According to its developers, it includes tools such as registry cleaner, memory booster and junk cleaner. However, after installation it runs as a Trojan.Clicker, a tool that is being used to engage in click fraud.

Registry Cleaner Virus

Registry Cleaner virus removal guide

What is Registry Cleaner?

As the name suggests, Registry Cleaner is a program that supposed to clean/fix system registry. According to its developers this program is capable of boosting memory and cleaning junk files too. The problem is that Registry Cleaner only seems to be a legitimate program. In reality it works as a malicious program, a Trojan.Clicker that is used perform a click fraud. POP-UP Ads

Gotwidores[.]info redirect removal instructions

What is gotwidores[.]info?

gotwidores[.]info is yet another rogue website designed to deliver unreliable content, as well as cause redirects to potentially malicious websites. gotwidores[.]info is virtually identical to,, evengsitolightont[.]info, and dozens of other rogue sites. As a rule, users visit gotwidores[.]info inadvertently - they get redirected by either potentially unwanted applications (PUAs) or intrusive ads delivered by other rogue sites. Potentially unwanted apps usually infiltrate computers without asking for a permission and, aside from causing redirects, they also deliver intrusive advertisements and gather various information.

PC Boost Pro Virus

PC Boost Pro virus removal guide

What is PC Boost Pro?

PC Boost Pro is promoted as a registry cleaner, memory booster and junk cleaner. Simply said, its developers present it as a tool designed to make computers faster and cleaner. What they do not mention is that PC Boost Pro is actually a malicious program known as Trojan.Clicker. This is a tool that cyber criminals use for a click fraud.

CVE-2019-1663 Email Scam

"CVE-2019-1663" removal guide

What is "CVE-2019-1663"?

"CVE-2019-1663" is the name of a sextortion scam that is used to blackmail people by threatening them to leak humiliating/compromising photos. In order to prevent it, recipients are encouraged to pay a particular amount of money (cryptocurrency). There are many emails of this type, none of them should be trusted. If received, they should be ignored and deleted.

Racoon Stealer Spyware

Racoon Stealer virus removal guide

What is Racoon Stealer?

Racoon Stealer is a high-risk trojan-type application that stealthily infiltrates the system and collects a variety of personal information. Having this trojan installed on your computer might lead to various issues. It is also worth mentioning that cyber criminals offer this trojan's services in various hacker forums. Hence, any wannabe cyber criminal can purchase a subscription and generate revenue by misusing stolen data.


Page 6 of 723

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>