Step-by-Step Malware Removal Instructions

Vinkens.com POP-UP Scam (Mac)
Mac Virus

Vinkens.com POP-UP Scam (Mac)

During a routine inspection of untrustworthy websites, our researchers discovered the vinkens[.]com deceptive site. When we inspected this page, we learned that it promotes several scams. While they make different claims, their goals are likely the same - to endorse untrustworthy or malicious so

DOC/TrojanDownloader.Agent Trojan
Trojan

DOC/TrojanDownloader.Agent Trojan

DOC/TrojanDownloader.Agent is a detection name for malicious Microsoft Office documents (for example, Word, Excel). The purpose of such documents is to infect computers with malware. Computers get infected once macros commands in these documents are enabled. Most cybercriminals disguise them as in

Ourcommonstories.com Ads
Notification Spam

Ourcommonstories.com Ads

During a routine inspection of rogue webpages, our researchers discovered ourcommonstories[.]com. This site is designed to push browser notification spam and redirect visitors to other (likely untrustworthy/harmful) websites. It is noteworthy that most visitors to pages like ourcommonstories[.]com

Apollo Tab Browser Hijacker
Browser Hijacker

Apollo Tab Browser Hijacker

While inspecting shady websites, our researchers found Apollo Tab's promotional page. This browser extension is presented as a tool that supposedly allows users to customize the browser's homepage and "stimulate [their] productivity". After analyzing this piece of software, we learned that Apollo

Ranger3X Ransomware
Ransomware

Ranger3X Ransomware

When looking through support forums, our research team learned of the Ranger3X ransomware (a new variant of TeslaRVNG) from a report made by a victim's representative. We have sampled this malware from VirusTotal and executed it on our test machine. Ranger3X encrypted the files on our test system

VBA/TrojanDownloader.Agent Trojan
Trojan

VBA/TrojanDownloader.Agent Trojan

"VBA/TrojanDownloader.Agent" primarily refers to malicious Microsoft Office documents. Its variations are used as detection names by many anti-virus programs. Virulent MS documents are designed to cause malware infections by executing malicious macro commands. These files are most commonly distrib

MSIL/Spy.Agent Trojan
Trojan

MSIL/Spy.Agent Trojan

"MSIL/Spy.Agent" refers to backdoor-type malware. Its variants are used by many anti-virus programs as detection names primarily for trojans that operate as backdoors. This type of malware is designed to create a "backdoor" for additional malicious software. Theoretically, these trojans can infect

LNK/Agent Trojan
Trojan

LNK/Agent Trojan

LNK/Agent is a detection name for a Windows system shortcut to a malicious file, program, or folder. Shortcuts (LNK files) detected as LNK/Agent do not contain payload - they launch malicious executables (execute files designed to infect computers with malware). Cybercriminals use LNK files becaus

MSIL/TrojanDownloader.Agent Trojan
Trojan

MSIL/TrojanDownloader.Agent Trojan

MSIL/TrojanDownloader.Agent is a detection name for malware that contains a URL (or multiple URLs). It uses that URL to download other malware from the Internet and infect a computer with it. MSIL/TrojanDownloader.Agent targets Windows operating systems. MSIL/TrojanDownloader.Agent malware

Uigd Ransomware
Ransomware

Uigd Ransomware

Our researchers found the Uigd ransomware while inspecting new submissions to VirusTotal. We also learned that this malicious program belongs to the Djvu ransomware family. After being released onto our test system, this malware began encrypting files and appending their filenames with a ".uigd"