Step-by-Step Malware Removal Instructions

Coronavirus Email Virus
Phishing/Scam

Coronavirus Email Virus

There are a number of variants of the Coronavirus spam campaign. Cyber criminals use it to deceive recipients into infecting their computers with malicious programs such as Agent Tesla, Emotet, LokiBot, Remcos, TrickBot, FormBook, Ave Maria, LimeRAT, CrimsonRAT, and other high-risk malware. They

ProLock Ransomware
Ransomware

ProLock Ransomware

Discovered by PeterM, ProLock is a rebranded version of PwndLocker ransomware. This ransomware encrypts files with the RSA-2048 algorithm, modifies filenames and creates a ransom message. ProLock appends the ".proLock" extension to the filenames of all encrypted files. Research shows that it appe

Velar Ransomware
Ransomware

Velar Ransomware

Discovered by S!Ri, Velar is malicious software categorized as ransomware. It is designed to encrypt data and demand payment for decryption. When this ransomware encrypts, all affected files are appended with the ".Velar" extension. Therefore, following encryption, a file such as "1.jpg" would ap

Hack For Life Ransomware
Ransomware

Hack For Life Ransomware

Hack For Life belongs to the Ouroboros ransomware family. Like most programs of this type, it encrypts files with a strong encryption algorithm, renames all encrypted files and provides victims with instructions about what they must do next. Hack For Life encrypts files with a combination of AES-

Gate Ransomware
Ransomware

Gate Ransomware

Gate belongs to the Dharma ransomware family and is designed to encrypt files, modify their filenames and provide victims with instructions about how to contact the developers (plus some other details). Gate renames encrypted files by adding the victim's ID, lockhelp@qq.com email address and appen

LX Ransomware
Ransomware

LX Ransomware

Discovered by Jakub Kroustek, LX is malicious software belonging to the Crisis/Dharma ransomware family. It operates by encrypting the data of infected systems and demands payment for decryption tools/software. When this malware encrypts, all affected files are renamed according to this pattern:

Cranchit Browser Hijacker
Browser Hijacker

Cranchit Browser Hijacker

Cranchit is a browser hijacker endorsed as a tool to improve web searches. In fact, it operates by modifying browser settings to promote feed.cranchit.com (a fake search engine). Furthermore, it has data tracking capabilities, which are employed to monitor users' browsing activity. Due to its dub

ArkeiStealer Malware
Trojan

ArkeiStealer Malware

ArkeiStealer (also known as Arkei Stealer) is a type of malware that steals sensitive, confidential information, which cyber criminals can then use to generate revenue. Research shows that ArkeiStealer is capable of stealing login credentials and cryptocurrency wallet keys. Through accessing such

Banta Ransomware
Ransomware

Banta Ransomware

Discovered by dnwls0719, Banta is yet another high-risk ransomware infection from the Phobos malware family. After successful infiltration, Banta encrypts most stored files, thereby rendering them unusable. During encryption, Banta also appends each filename with the victim's unique ID, developer'

LookupModule Adware (Mac)
Mac Virus

LookupModule Adware (Mac)

Belonging to the AdLoad malware family, LookupModule is a rogue app classified as adware. This application also possesses browser hijacker traits. LookupModule operates by running intrusive advertisement campaigns, modifying browsers and promoting fake search engines. Additionally, most adware-