Step-by-Step Malware Removal Instructions

CommonBrand Adware (Mac)
Mac Virus

CommonBrand Adware (Mac)

Like many other adware-type apps, CommonBrand supposedly improves the browsing experience and/or delivers various features. In fact, it serves intrusive advertisements and gathers information. Furthermore, it promotes the Safe Finder website by opening it through akamaihd.net. Apps such as Comm

C-VIR Ransomware
Ransomware

C-VIR Ransomware

Discovered by Jakub Kroustek, C-VIR is malicious software belonging to the Dharma ransomware family. Typically, software of this type encrypts files, changes their filenames and creates and/or displays ransom messages. C-VIR renames encrypted files by adding the victim's ID, coronavirus@foxmail.co

Quick Photo Editor Browser Hijacker
Browser Hijacker

Quick Photo Editor Browser Hijacker

Quick Photo Editor is a rogue application supposedly capable of providing easy access to various free photo editing services. It makes modifications to browser settings to promote search.hquickphotoeditor.com (a fake search engine). Therefore, this app is classified as a browser hijacker. Further

Waldo Ransomware
Ransomware

Waldo Ransomware

Discovered by dnwls0719, Waldo is a malicious program classified as ransomware. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption tools/software. During the encryption process, filenames of affected files are typically appended with an ext

Vmos.xyz Redirect
Browser Hijacker

Vmos.xyz Redirect

There are many fake search engines on the internet. In most cases, they are promoted through potentially unwanted applications (PUAs), browser hijackers. Note that vmos.xyz is the address of a fake search engine, which is promoted through PUAs named SApp+ and Ext Apps. It is possible that other b

Belazyelephant.com Ads
Notification Spam

Belazyelephant.com Ads

belazyelephant[.]com opens various untrusted pages or loads dubious content. It functions in a similar way to many other rogue websites including, for example, go9news[.]biz, alisalis[.]com and exq-timepieces[.]com. These are often opened by potentially unwanted applications (PUAs) installed on th

Alisalis.com Ads
Notification Spam

Alisalis.com Ads

alisalis[.]com is one of many rogue websites that load dubious content or redirect visitors to other untrusted web pages. Some examples of other pages similar to alisalis[.]com include go9news[.]biz, speakwithjohns[.]com and exq-timepieces[.]com. Browsers often open websites of this type when pote

COVID-19 Solution Announced By WHO Email Virus
Phishing/Scam

COVID-19 Solution Announced By WHO Email Virus

Cyber criminals commonly attempt to spread malicious programs through files attached to their emails (spam campaigns). In summary, they send emails that are disguised as important, official and seek to deceive recipients into opening/executing the downloaded file. In this case, cyber criminals se

Npsk Ransomware
Ransomware

Npsk Ransomware

Npsk is one of many malicious programs that form part of the ransomware family called Djvu. This particular ransomware infection was discovered by Karsten Hahn and is designed to encrypt victims' files, modify filenames and create ransom messages. Npsk modifies encrypted files by appending the ".

PlugX RAT
Trojan

PlugX RAT

PlugX is a Remote Access Trojan (RAT). Malware under this classification grants cyber criminals remote access and control over the infected device. PlugX Trojan has various capabilities, which can cause particularly serious issues. It has been observed targeting Afghan, American, Russian, Belorus