Step-by-Step Malware Removal Instructions

Covid-20 Ransomware
Ransomware

Covid-20 Ransomware

Covid-20 is not typical ransomware and does not encrypt or rename files. After installation, it restarts the computer and then displays a ransom message in full screen mode (preventing Windows from booting). Therefore, rather than preventing victims from accessing their files, it does not allow th

mylucky Tab Browser Hijacker
Browser Hijacker

mylucky Tab Browser Hijacker

Browser hijacking apps change browser settings without users' permission. They usually assign them to the addresses of fake search engines. Note that this particular app promotes tailsearch.com. It also collects browsing history and might gather other data as well. Browser hijackers are often dow

ElectroRAT Malware (Mac)
Mac Virus

ElectroRAT Malware (Mac)

ElectroRAT is a Remote Access Trojan (RAT) written in the Go programming language and designed to target Windows, MacOS, and Linux users. Cyber criminals behind ElectroRAT target mainly cryptocurrency users. This RAT is distributed via the trojanized Jamm, eTrader, and DaoPoker applications.

Australian Online Award Promo Email Scam
Phishing/Scam

Australian Online Award Promo Email Scam

In most cases, phishing emails are disguised as messages from banks, credit card companies, online shops, and other companies/organizations. Usually, scammers/cyber criminals who send these emails try to trick recipients into opening a website and, for example, to update their passwords to "avoid

yoAD Ransomware
Ransomware

yoAD Ransomware

yoAD belongs to the Dharma ransomware family. It encrypts victims' files and renames each encrypted file by adding the victim's ID, yourfiles1@cock.li email address, and appending the ".yoAD" extension. For example, yoAD would rename a file named "1.jpg" to "1.jpg.id-C279F237.[yourfiles1@cock.li].

Pornographic Alert POP-UP Scam
Adware

Pornographic Alert POP-UP Scam

This is a typical technical support scam website that displays a fake notification stating that the computer is infected and instructs visitors to dial the provided number for help/remote technical support. In most cases, these web pages seem to be official, legitimate Microsoft pages, however, no

You've Made The 9.68-Billionth Search POP-UP Scam
Phishing/Scam

You've Made The 9.68-Billionth Search POP-UP Scam

"You've made the 9.68-billionth search" is a scam, displayed by various deceptive websites. The scheme claims that users have been selected to win a gift of gratitude. At the time of research, this scam redirected to the Google search engine, however, it might also redirect to other web pages that

2021 Ransomware
Ransomware

2021 Ransomware

Ransomware is malware that prevents victims from accessing their files by encryption. In most cases, it renames encrypted files and displays a ransom message. 2021 ransomware's ransom messages appear in a pop-up window and the "FILES ENCRYPTED.txt" file. This ransomware renames files by adding th

Hunter Stealer
Trojan

Hunter Stealer

Hunter is an information stealer, a type of malware that gathers sensitive information from the compromised system and sends it to attackers. This particular stealer collects data and has additional capabilities. It is available for sale on a hacker forum where it can be purchased for 700 or 4000

LOCKED (Xorist) Ransomware
Ransomware

LOCKED (Xorist) Ransomware

LOCKED encrypts files (and renames them), changes desktop wallpaper, creates the "HOW TO DECRYPT FILES.txt" file, and displays a pop-up window. It renames files by appending the ".LOCKED" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.LOCKED", "2.jpg" to "2.jpg.LOCKED", and so o