Step-by-Step Malware Removal Instructions

You've Made The 9.68-Billionth Search POP-UP Scam
Phishing/Scam

You've Made The 9.68-Billionth Search POP-UP Scam

"You've made the 9.68-billionth search" is a scam, displayed by various deceptive websites. The scheme claims that users have been selected to win a gift of gratitude. At the time of research, this scam redirected to the Google search engine, however, it might also redirect to other web pages that

2021 Ransomware
Ransomware

2021 Ransomware

Ransomware is malware that prevents victims from accessing their files by encryption. In most cases, it renames encrypted files and displays a ransom message. 2021 ransomware's ransom messages appear in a pop-up window and the "FILES ENCRYPTED.txt" file. This ransomware renames files by adding th

Hunter Stealer
Trojan

Hunter Stealer

Hunter is an information stealer, a type of malware that gathers sensitive information from the compromised system and sends it to attackers. This particular stealer collects data and has additional capabilities. It is available for sale on a hacker forum where it can be purchased for 700 or 4000

LOCKED (Xorist) Ransomware
Ransomware

LOCKED (Xorist) Ransomware

LOCKED encrypts files (and renames them), changes desktop wallpaper, creates the "HOW TO DECRYPT FILES.txt" file, and displays a pop-up window. It renames files by appending the ".LOCKED" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.LOCKED", "2.jpg" to "2.jpg.LOCKED", and so o

$500 Amazon Gift Card! POP-UP Scam
Phishing/Scam

$500 Amazon Gift Card! POP-UP Scam

Scammers behind this website attempt to trick visitors into believing that, if they complete a survey, they will receive a $500 Amazon gift card. Neither this nor other similar web pages are legitimate or trustworthy. Commonly, scammers behind these pages ask users to provide personal information

Locks (Xorist) Ransomware
Ransomware

Locks (Xorist) Ransomware

Locks encrypts data, modifies the filename of each encrypted file, and generates two ransom messages. It renames files by appending the ".locks" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.locks", "2.jpg" to "2.jpg.locks", and so on. Locks creates "HOW TO DECRYPT FILES.txt"

Funcy Web Browser Hijacker
Browser Hijacker

Funcy Web Browser Hijacker

Funcy Web is classified as a browser hijacker because it promotes a fake search engine (quicknewtab.com) and directs users to it without their permission. It also collects browsing history details and possibly other data. Note that browser hijackers such as Funcy Web are not often installed by us

OperativeMachine Adware (Mac)
Mac Virus

OperativeMachine Adware (Mac)

OperativeMachine is classified as adware because it generates advertisements. Note that it also functions as a browser hijacker, modifying browser settings to promote a fake search engine. Typically, users do not download or install apps such as OperativeMachine intentionally and, for this reas

BTC Giveaway Scam
Phishing/Scam

BTC Giveaway Scam

Some internet scams invite people to send a specific Bitcoin sum to a provided wallet or via a QR code, and promise to return double the amount of cryptocurrency. People who trust these scams receive nothing in return and simply lose the cryptocurrency that they send. This giveaway scam is no dif

Babuk Locker Ransomware
Ransomware

Babuk Locker Ransomware

Babuk Locker is ransomware that creates the "How To Restore Your Files.txt" file (ransom message) in all folders that contain encrypted files and renames the files by appending the ".__NIST_K571__" extension. For example, "1.jpg" is renamed to "1.jpg.__NIST_K571__", "2.jpg" to "2.jpg.__NIST_K571__