Step-by-Step Malware Removal Instructions

Wabot Malware
Trojan

Wabot Malware

Wabot is a malicious program, malware classified as an Internet Relay Chat (IRC) worm. Software within the worm classification is typically self-proliferating. I.e., it copies itself from one location to another, such as from directories, drives, systems or networks, to other corresponding locatio

TheMaskSearch Browser Hijacker
Browser Hijacker

TheMaskSearch Browser Hijacker

TheMaskSearch is a browser hijacker which promotes themasksearch.com by changing certain browser settings. Like most URLs promoted by apps of this type, themasksearch.com is the address of a fake search engine. In most cases, browser hijackers gather browsing-related (and other) information. User

Audit And Assurance Email Virus
Phishing/Scam

Audit And Assurance Email Virus

This malspam campaign is disguised as a message from a global audit, accounting and consulting group called Mazars. In fact, this company has nothing to do with this bogus email. The main purpose of this campaign is to trick recipients into opening the attached file, a malicious HTML file disguise

Upatre Malware
Trojan

Upatre Malware

Upatre is a malicious program which operates as a backdoor Trojan (opens a 'backdoor' for other malware). Therefore, this rogue software can download and install additional malware (cause chain infections). These malicious programs are installed onto the compromised system and their actions depend

Dungeon Ransomware
Ransomware

Dungeon Ransomware

Discovered by Michael Gillespie, Dungeon belongs to the Xorist ransomware family. Like most other malware of this type, Dungeon encrypts files, changes filenames and creates a ransom message containing instructions about how to contact the cyber criminals, and various other details. This ransomwa

Vawe Ransomware
Ransomware

Vawe Ransomware

Vawe is malicious software belonging to the Djvu ransomware family. Systems infected with this malware experience data encryption and users receive ransom demands for decryption tools/software. During the encryption process all affected files are appended with the ".vawe" extension. For example,

GhostSearch Browser Hijacker
Browser Hijacker

GhostSearch Browser Hijacker

GhostSearch changes certain browser settings to ghost-search.com (the address of a fake search engine). Apps of this type tend to collect data relating to web browsing activities. These browser hijackers are often downloaded and installed unintentionally and are, therefore, categorized as potentia

News-back.best Ads
Notification Spam

News-back.best Ads

news-back[.]best is similar to sombes[.]com, cooperativasantamargherita[.]com, click-to-win-prize[.]com and a number of other rogue web pages that display dubious content or redirect visitors to other bogus sites. Generally, users do not open sites such as news-back[.]best intentionally - in most

MyDoom Malware
Trojan

MyDoom Malware

MyDoom (also known as LunaStorm) is malicious software designed to carry out DDoS (distributed denial-of-service) attacks. MyDoom is self-proliferating and self-sufficient malware. This malicious program poses a significant threat to device integrity and, therefore, you are strongly advised to rem

Soltern Malware
Trojan

Soltern Malware

Soltern is a computer worm, a type of malware that copies itself for installation on other computers - it uses already infected systems as hosts to scan and infect the other machines. Typically, worms such as Soltern use computer networks, email services, instant messaging apps, and Peer-to-Peer