Step-by-Step Malware Removal Instructions

yoAD Ransomware
Ransomware

yoAD Ransomware

yoAD belongs to the Dharma ransomware family. It encrypts victims' files and renames each encrypted file by adding the victim's ID, yourfiles1@cock.li email address, and appending the ".yoAD" extension. For example, yoAD would rename a file named "1.jpg" to "1.jpg.id-C279F237.[yourfiles1@cock.li].

Pornographic Alert POP-UP Scam
Adware

Pornographic Alert POP-UP Scam

This is a typical technical support scam website that displays a fake notification stating that the computer is infected and instructs visitors to dial the provided number for help/remote technical support. In most cases, these web pages seem to be official, legitimate Microsoft pages, however, no

You've Made The 9.68-Billionth Search POP-UP Scam
Phishing/Scam

You've Made The 9.68-Billionth Search POP-UP Scam

"You've made the 9.68-billionth search" is a scam, displayed by various deceptive websites. The scheme claims that users have been selected to win a gift of gratitude. At the time of research, this scam redirected to the Google search engine, however, it might also redirect to other web pages that

2021 Ransomware
Ransomware

2021 Ransomware

Ransomware is malware that prevents victims from accessing their files by encryption. In most cases, it renames encrypted files and displays a ransom message. 2021 ransomware's ransom messages appear in a pop-up window and the "FILES ENCRYPTED.txt" file. This ransomware renames files by adding th

Hunter Stealer
Trojan

Hunter Stealer

Hunter is an information stealer, a type of malware that gathers sensitive information from the compromised system and sends it to attackers. This particular stealer collects data and has additional capabilities. It is available for sale on a hacker forum where it can be purchased for 700 or 4000

LOCKED (Xorist) Ransomware
Ransomware

LOCKED (Xorist) Ransomware

LOCKED encrypts files (and renames them), changes desktop wallpaper, creates the "HOW TO DECRYPT FILES.txt" file, and displays a pop-up window. It renames files by appending the ".LOCKED" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.LOCKED", "2.jpg" to "2.jpg.LOCKED", and so o

$500 Amazon Gift Card! POP-UP Scam
Phishing/Scam

$500 Amazon Gift Card! POP-UP Scam

Scammers behind this website attempt to trick visitors into believing that, if they complete a survey, they will receive a $500 Amazon gift card. Neither this nor other similar web pages are legitimate or trustworthy. Commonly, scammers behind these pages ask users to provide personal information

Locks (Xorist) Ransomware
Ransomware

Locks (Xorist) Ransomware

Locks encrypts data, modifies the filename of each encrypted file, and generates two ransom messages. It renames files by appending the ".locks" extension to filenames. For example, "1.jpg" is renamed to "1.jpg.locks", "2.jpg" to "2.jpg.locks", and so on. Locks creates "HOW TO DECRYPT FILES.txt"

Funcy Web Browser Hijacker
Browser Hijacker

Funcy Web Browser Hijacker

Funcy Web is classified as a browser hijacker because it promotes a fake search engine (quicknewtab.com) and directs users to it without their permission. It also collects browsing history details and possibly other data. Note that browser hijackers such as Funcy Web are not often installed by us

OperativeMachine Adware (Mac)
Mac Virus

OperativeMachine Adware (Mac)

OperativeMachine is classified as adware because it generates advertisements. Note that it also functions as a browser hijacker, modifying browser settings to promote a fake search engine. Typically, users do not download or install apps such as OperativeMachine intentionally and, for this reas