Step-by-Step Malware Removal Instructions

Microsoft Defender Protection Email Scam
Phishing/Scam

Microsoft Defender Protection Email Scam

Upon scrutinizing the letter, we have concluded that it is a fraudulent email that has been created by scammers with the intention of tricking recipients into contacting them. The email is disguised as a communication from Microsoft and includes a fake customer support number. We strongly advise r

GuideUnit Adware (Mac)
Mac Virus

GuideUnit Adware (Mac)

Our examination of GuideUnit showed that it exhibits intrusive advertisements, which is why we classified it as adware. Additionally, GuideUnit may have the ability to access sensitive information. It is important to note that users rarely download and install adware on purpose. Adware-g

Nature Wallpapers Browser Hijacker
Browser Hijacker

Nature Wallpapers Browser Hijacker

During our assessment of the Nature Wallpapers application, we determined that it acts as a browser hijacker by altering certain web browser settings to promote a fake search engine (search.landscape-wallpaper.com). We came across Nature Wallpapers on a suspicious webpage. Nature Wallpaper

Cylance Ransomware
Ransomware

Cylance Ransomware

Cylance is the name of malicious software that operates as ransomware. Its purpose is to encrypt files (to prevent victims from accessing their data). Additionally, Cylance appends the ".Cylance" extension to filenames and creates the "CYLANCE_README.txt" file (a ransom note). Cylance targets Win

Jycx Ransomware
Ransomware

Jycx Ransomware

During our analysis, we identified Jycx as ransomware that employs file encryption and modifies the file names by appending the ".jycx" extension. Furthermore, it generates a ransom note, the "_readme.txt" file. Our team came across Jycx while examining various malware samples submitted to the Vir

D7k Ransomware
Ransomware

D7k Ransomware

D7k is ransomware designed to encrypt data on infected devices and append the ".D7k" extension to the filenames of all encrypted files. Additionally, D7k creates a text file named "note.txt". This file contains a ransom note. An example of how D7k renames files: it changes "1.jpg" to "1.jpg.D7k",

PhasePure Adware (Mac)
Mac Virus

PhasePure Adware (Mac)

During our testing of PhasePure, we observed that it displays intrusive ads, leading us to categorize it as adware. Moreover, PhasePure has the capability to access sensitive information. It is noteworthy that users seldom intentionally download and install adware. Ads displayed by adwar

OpcJacker Malware
Trojan

OpcJacker Malware

OpcJacker is the name of malware capable of logging keystrokes, capturing screenshots, stealing sensitive information from web browsers, loading supplementary modules, and substituting cryptocurrency addresses in the system's clipboard. OpcJacker disguises itself as legitimate software, such as cr

HR Added You To The Working Group Email Scam
Phishing/Scam

HR Added You To The Working Group Email Scam

After examining the letter, we have determined that it is a deceptive email designed by scammers to deceive recipients into divulging sensitive information. The email is disguised as a message from an HR department and contains a link to a phishing website. It is recommended that recipients disreg

Money Message Ransomware
Ransomware

Money Message Ransomware

Money Message is ransomware that encrypts files and creates a ransom note ("money_message.log" file). Unlike most ransomware variants, Money Message does not rename files (it does not append its extension to filenames). Cybercriminals use Money Message to extort money from victims. Screenshot