Step-by-Step Malware Removal Instructions

Sakula RAT
Trojan

Sakula RAT

Sakula is software categorized as a remote access trojan (RAT). Generally, programs of this type are used by cyber criminals to control infected computers remotely and perform tasks that enable them to generate revenue in various ways. Typically, victims are unaware that the Sakula RAT is install

Coharos Ransomware
Ransomware

Coharos Ransomware

Coharos is yet another ransomware-type infection from the Djvu family. This malware is designed to stealthily infiltrate computers and encrypt most stored data. During encryption, Coharos appends each filename with the ".coharos" extension (hence its name). For example, "sample.jpg" is renamed to

DarkComet RAT
Trojan

DarkComet RAT

DarkComet is the name of a remote access/administration tool (RAT). Programs of this type are designed to control systems through a remote network connection. I.e., to control computers and perform various tasks remotely using another computer. Cyber criminals often try to trick people into insta

Yoba Ransomware
Ransomware

Yoba Ransomware

Discovered by Alex Svirid, Yoba is categorized as ransomware. Ransomware-type programs are used to extort money from people with infected computers. They are designed to encrypt files and prevent access unless victims pay the ransom. Like most programs of this type, Yoba renames encrypted files an

2k19cry Ransomware
Ransomware

2k19cry Ransomware

Discovered by dnwls0719, 2k19cry is a part of the Paradise ransomware family (and similar to 2k19sys). These programs are designed to encrypt (lock) files and deny access to them unless a ransom is paid. This particular ransomware renames all encrypted files by adding a random string of character

Mtogas Ransomware
Ransomware

Mtogas Ransomware

First discovered by Michael Gillespie and belonging to the Djvu ransomware family, Mtogas is yet another high-risk program. The purpose of this infection is to infiltrate computers and compromise data by encryption, keeping it this state unless a ransom is paid. Mtogas also renames each file by ad

My Mail Center Browser Hijacker
Browser Hijacker

My Mail Center Browser Hijacker

The My Mail Center app supposedly allows users to manage multiple email inboxes using quick links, however, this app also changes browser settings to promote a fake search engine (mymailcenter.co) and collects data relating to users' browsing habits. Apps of this type are called browser hijackers

Searchberry.co Redirect
Browser Hijacker

Searchberry.co Redirect

searchberry.co is the web address of a fake search engine, however, developers present it as a legitimate and useful search tool. Typically, search engines of this kind are promoted through browser hijackers (in this case, the Searchberry Home Page app). This app promotes searchberry.co by changi

How To DIY Browser Hijacker
Browser Hijacker

How To DIY Browser Hijacker

The How To DIY app is designed to provide links to web pages that contain information about how to learn virtually anything. In fact, this is a browser hijacker. Apps of this type change browser settings and perform information tracking. Most people download and install browser hijackers unintent

Falseortruerdr POP-UP Scam (Mac)
Mac Virus

Falseortruerdr POP-UP Scam (Mac)

Scammers use the falseortruerdr web page to promote an unwanted application called Smart Mac Booster. Note that falseorrealrdr is a scam site used to trick people into believing that their computers are infected with a virus that can be removed using the aforementioned application. Do not trust