Step-by-Step Malware Removal Instructions

Amazon Prime Email Scam
Phishing/Scam

Amazon Prime Email Scam

"Amazon Prime email scam" refers to a spam campaign. These German-language scam emails claim that recipients have been selected to get a special offer on Amazon Prime - the subscription program of the tech giant's Amazon's e-commerce section. It must be emphasized that the letters in question are

MapsCheckerSearch Browser Hijacker
Browser Hijacker

MapsCheckerSearch Browser Hijacker

The purpose of MapsCheckerSearch is to promote the mapschecker.com/a fake search engine by modifying web browser settings. It could also be capable of collecting various information about its users. It is uncommon for apps like MapsCheckerSearch to be installed by users intentionally. Thus, they a

Pqgs Ransomware
Ransomware

Pqgs Ransomware

Pqgs is a malicious program that is part of the Djvu ransomware family. It encrypts data (renders files inaccessible) and demands payment for the decryption (access recovery). Affected files are appended with a ".pqgs" extension. To elaborate, a file initially titled "1.jpg" would appear as "1.jp

JustAdblockSearch Browser Hijacker
Browser Hijacker

JustAdblockSearch Browser Hijacker

JustAdblockSearch is a browser hijacker that modifies browser settings to promote a fake search engine (justadblocksearch.com). It is common for browser hijackers to be promoted and (or) distributed using questionable methods. Thus, they are categorized as potentially unwanted applications (PUAs).

Iisa Ransomware
Ransomware

Iisa Ransomware

Iisa is ransomware designed to encrypt files, create the "_readme.txt" file containing payment and contact information, and rename encrypted files. It appends the ".iisa" extension filenames, for example, it changes "1.jpg" to "1.jpg.iisa", "sample.jpg" to "sample.jpg.iisa". Iisa is part of the Dj

PDFFreeSearch Browser Hijacker
Browser Hijacker

PDFFreeSearch Browser Hijacker

PDFFreeSearch is a piece of browser-hijacking software. It promotes the pdffreesearch.com fake search engine. Additionally, due to the questionable methods used to distribute browser hijackers, they are also classified as PUAs (Potentially Unwanted Applications). Browser hijackers cause re

LeadingProtocol Adware (Mac)
Mac Virus

LeadingProtocol Adware (Mac)

LeadingProtocol is a piece of advertising-supported and browser-hijacking software. This app has been observed being proliferated via fake Adobe Flash Player updates. Due to the dubious methods used to distribute LeadingProtocol, it is also categorized as a PUA (Potentially Unwanted Application)

FileShare Email Scam
Phishing/Scam

FileShare Email Scam

"FileShare email scam" refers to a spam campaign. These letters claim that several files have been shared with the recipients. It must be emphasized that the "FileShare" emails are fake, and none of their claims are true. Therefore, by trusting these messages, users can experience various severe i

Grakate Stealer
Trojan

Grakate Stealer

Grakate is a type of malware that is capable of stealing information and files from the victim's computer. This stealer is for sale on hacker forums. Is lifetime subscription costs 2000 rubles, and a monthly one costs 490 rubles per month. Grakate can steal passwords, cookies, autofill dat

HandlerRotator Adware (Mac)
Mac Virus

HandlerRotator Adware (Mac)

The purpose of HandlerRotator is to display annoying advertisements and promote a fake search engine (by changing the settings of the affected web browser). It has the qualities of adware and a browser hijacker. Users rarely install such apps on purpose (knowingly). Advertisements genera