Step-by-Step Malware Removal Instructions

The Big 5 Browser Hijacker
Browser Hijacker

The Big 5 Browser Hijacker

While inspecting dubious websites, our research team discovered The Big 5 browser extension. Our analysis of this piece of software revealed that it is a browser hijacker that promotes (via redirects) the searchm5.com fake search engine. Browser-hijacking software reassigns browsers' homep

Totalfreshwords.com Ads
Notification Spam

Totalfreshwords.com Ads

Totalfreshwords[.]com is a rogue webpage that pushes browser notification spam and redirects users to other (likely dubious/malicious) sites. Most visitors to totalfreshwords[.]com and pages akin to it access them through redirects generated by websites utilizing rogue advertising networks. Our r

Designer Adware
Adware

Designer Adware

While checking out suspicious websites, our research team discovered the Designer application. Our analysis of this piece of software revealed that it is adware. Designer is designed to run intrusive advertisement campaigns, and it may have additional harmful capabilities. Adware stands fo

HubComputing Adware (Mac)
Mac Virus

HubComputing Adware (Mac)

HubComputing is a rogue application discovered by our researchers while inspecting new submissions to VirusTotal. After examining this app, we determined that it is advertising-supported software (adware) belonging to be AdLoad malware family. Adware is designed to display advertisements

Foxy Tab Browser Hijacker
Browser Hijacker

Foxy Tab Browser Hijacker

Foxy Tab is a browser extension that promises to display browser wallpapers. After analyzing this piece of software, we determined that it is a browser hijacker. This extension changes browser settings to promote (via redirects) the logic.hortbizcom.com fake search engine. Browser hijacker

Upcoming Auction Email Scam
Phishing/Scam

Upcoming Auction Email Scam

After examining the "Upcoming Auction" email, we determined that it is spam. It is presented as a message from the recipient's employer inviting them to join an auction. This hoax mail instructs to sign into the email account via a phishing website to show interest in participation. The em

Jorik Trojan
Trojan

Jorik Trojan

Jorik is the name of a trojan-type malware. This program stealthily infiltrates victims' machines on which it can then perform malicious actions. Trojans are considered to be high-risk threats – hence, they must be eliminated from operating systems immediately upon detection. Following suc

Bspojzo Ransomware
Ransomware

Bspojzo Ransomware

Bspojzo is a piece of malicious software categorized as ransomware. Our research team discovered it while reviewing new malware submissions to the VirusTotal website. This malicious program is part of the Snatch ransomware family. Bspojzo is designed to encrypt data and demand payment for its decr

Pzcqyq Ransomware
Ransomware

Pzcqyq Ransomware

During our analysis of samples uploaded to the VirusTotal platform, our team identified Pzcqyq, a ransomware variant belonging to the Snatch family. We observed that Pzcqyq employs encryption to lock files, adds the ".pzcqyq" extension to filenames, and generates a ransom note (a file named "HOW T

ConferenceTrader Adware (Mac)
Mac Virus

ConferenceTrader Adware (Mac)

After assessing ConferenceTrader, our team has determined that its primary function revolves around displaying disruptive advertisements to users, categorizing it as adware. It is important to highlight that users frequently install applications akin to ConferenceTrader without being aware of th