Step-by-Step Malware Removal Instructions

Ptt Email Virus
Phishing/Scam

Ptt Email Virus

Typically, cyber criminals behind malspam campaigns such as this attempt to deceive recipients into executing (opening) a malicious file, which is attached to the email (or downloaded from a website). This particular email is disguised as a message from the Turkish post company (Ptt) and used to d

Templates Discovery Tab Browser Hijacker
Browser Hijacker

Templates Discovery Tab Browser Hijacker

Templates Discovery Tab is a dubious application endorsed as a tool for easy access to free online templates. Following successful infiltration, however, the app makes alterations to browser settings to promote htemplatesdiscovery.com (a fake search engine). This app also collects information rel

Tiger865qq Ransomware
Ransomware

Tiger865qq Ransomware

Tiger865qq is a malicious program belonging to the GlobeImposter ransomware family. It operates by encrypting files and demanding payment for decryption. During the encryption process, all affected files are appended with the ".Tiger865qq" extension. For example, a file originally named something

Devoe Ransomware
Ransomware

Devoe Ransomware

Devoe is a malicious program belonging to the Phobos ransomware family. This malware operates by encrypting data and demanding payment for decryption. During the encryption process, all compromised files are renamed following this pattern: original filename, unique ID assigned to the victims, cybe

My Office Tools Browser Hijacker
Browser Hijacker

My Office Tools Browser Hijacker

My Office Tools is dubious software categorized as a browser hijacker. It operates by making modifications to browser settings to promote hmyofficetools.co (a fake search engine). Additionally, My Office Tools has data tracking capabilities, which are employed to monitor users' browsing habits. D

YaKo Ransomware
Ransomware

YaKo Ransomware

Discovered by xiaopao, YaKo is malicious software that belongs to the Xorist ransomware family. It is designed to encrypt data and demand payment for decryption. During the encryption process, all affected files are appended with the ".YaKo" extension. For example, a file originally named somethin

MAKB Ransomware
Ransomware

MAKB Ransomware

Discovered by xiaopao, MAKB is a malicious program belonging to the Scarab ransomware family. It renames the filenames of encrypted files to a string of random characters and appends the ".MAKB" extension. For example, it would rename "1.jpg" to "2g000000002o63SEiduTVesufmp7Ur50.MAKB", "2.jpg" to

Ambrosia Ransomware
Ransomware

Ambrosia Ransomware

Ambrosia is a part of the Scarab ransomware family and was discovered by xiaopao. Like most malicious programs of this type, Ambrosia encrypts files, modifies their filenames and creates a ransom message. It renames encrypted files by changing their filenames to a string of random characters and a

Z6airr.com Redirect (Mac)
Mac Virus

Z6airr.com Redirect (Mac)

z6airr.com is a fake search engine. Rogue search tools such as z6airr.com are usually promoted by software classified as browser hijackers. They promote these search engines by making modifications to browser settings and restricting/denying access to them. Additionally, browser hijackers and b

Xati Ransomware
Ransomware

Xati Ransomware

Discovered by Jakub Kroustek, Xati belongs to a family of ransomware called Dharma. It encrypts files, modifies their filenames, displays a ransom message in a pop-up window and creates another in a text file called "FILES ENCRYPTED.txt". Xati renames files by adding the victim's ID, xatixxatix@ma