Step-by-Step Malware Removal Instructions

Mist Stealer
Trojan

Mist Stealer

Mist is a malicious program classified as a stealer. This malware exfiltrates (i.e., steals) various sensitive information. The Mist stealer primarily targets cryptocurrency wallets, saved log-in credentials (usernames and passwords), certain browsing information and data stored in specific locati

ERROR CODE 72 POP-UP Scam
Phishing/Scam

ERROR CODE 72 POP-UP Scam

"ERROR CODE 72" is a scam run on deceptive web pages. It has been observed being promoted using azurewebsites[.]net - Microsoft Azure website-hosting platform. "ERROR CODE 72" is classified as a technical support scam. This scheme claims that the device has been infected with several high-risk vir

LookWebResults Adware (Mac)
Mac Virus

LookWebResults Adware (Mac)

LookWebResults is adware and a browser hijacker - it feeds users with ads and changes browser settings to the address of a fake search engine. Apps such as LookWebResults often collect data. Adware and browser hijackers are categorized as potentially unwanted applications (PUAs), since users te

VikroStealer Malware
Trojan

VikroStealer Malware

VikroStealer is malicious software which is used by cyber criminals to steal various sensitive information. Research shows that this malware can be purchased on hacker forums for $39.99, $59.99 or $89.99 (depending on the subscription type). The programs runs stealthily in the system background,

Track Package Tab Browser Hijacker
Browser Hijacker

Track Package Tab Browser Hijacker

Track Package Tab is a browser hijacker which changes certain browser settings to trackpackagetab.com, the address of a fake search engine. Commonly, apps of this type gather data relating to browsing activities. Many users download and install browser hijackers unintentionally and, for this reaso

Pywdu Ransomware
Ransomware

Pywdu Ransomware

Pywdu is malicious software belonging to the Snatch ransomware family. Systems infected with this malware experience data encryption and users receive ransom demands for decryption. During the encryption process, files are appended with the ".pywdu" extension. Therefore, after encryption, a file

Gomer Ransomware
Ransomware

Gomer Ransomware

Discovered by dnwls0719, Gomer is a new variant of Outsider ransomware. It renames encrypted files by appending the ".gomer" extension. For example, it would change "1.jpg" to "1.jpg.gomer", "2.jpg" to "2.jpg.gomer". etc. It also drops the "GOMER-README.txt" text file (ransom message) in each fold

Palo APP Browser Hijacker
Browser Hijacker

Palo APP Browser Hijacker

Palo APP is classified as a browser hijacker. It forces users to visit gooogle.page (a fake search engine). Typically, apps of this type promote these bogus addresses by changing certain browser settings, however, this particular app promotes the aforementioned URL without even changing any settin

Login Center Browser Hijacker
Browser Hijacker

Login Center Browser Hijacker

Login Center (also known as Login Center Tab) is rogue software endorsed as a tool for quick access to email accounts and other online services. It operates by making modifications to browsers to promote hp.hlogincenter.co (a fake search engine). This browser hijacker also monitors users' browsing

SearchMainInfo Adware (Mac)
Mac Virus

SearchMainInfo Adware (Mac)

SearchMainInfo is a potentially unwanted application (PUA) which functions both as adware and a browser hijacker: it changes certain browser settings (to promote a fake search engine) and serves advertisements. Typically, users do not download or install these apps intentionally. SearchMainInfo