Step-by-Step Malware Removal Instructions

Dexphot Malware
Trojan

Dexphot Malware

Dexphot is the name of a malicious program that infects systems with a cryptocurrency miner. It is capable of reinstalling a miner if an installed antivirus suite attempts to remove it. In summary, cyber criminals use resources of infected systems to mine cryptocurrency, which helps them to genera

My Login Helper Browser Hijacker
Browser Hijacker

My Login Helper Browser Hijacker

My Login Helper is yet another rogue application that claims to allow users to access their emails. Its appearance suggests that My Login Helper is a legitimate and useful application, however, it is categorized as a potentially unwanted application (PUA) and a browser hijacker. The main reasons

CILLA Ransomware
Ransomware

CILLA Ransomware

CILLA is malicious software belonging to the GlobeImposter ransomware family. It operates by encrypting data and demanding ransom payments for decryption. During this process, all compromised files are renamed with the ".CILLA" extension. For example, a filename such as "1.jpg" becomes "1.jpg.CILL

WinRARER Ransomware
Ransomware

WinRARER Ransomware

Discovered by GrujaRS, WinRARER is malicious software that is classified as ransomware. This ransomware stores files in an .ace archive file named "YourFilesHere-0penWithWinrar.ace" and places it in the "C:\YOUR-locked-FILES\" directory. This file is password protected. To obtain the password, vi

KesLan Ransomware
Ransomware

KesLan Ransomware

Discovered by GrujaRS, KesLan is a malicious program categorized as ransomware. It is designed to encrypt data and demand a ransom payment for decryption (i.e., payment for decryption tools/software). There are several variants of this ransomware. During encryption, KesLan appends files with the "

Vnse52.xyz Redirect
Browser Hijacker

Vnse52.xyz Redirect

vnse52.xyz is a fake search engine and promoted through a number of browser hijackers. One example is called APP. Browser hijackers are potentially unwanted applications (PUAs) that most people download and install inadvertently. In most cases, PUAs change browser settings and record browsing dat

NEMTY 2.2 REVENGE Ransomware
Ransomware

NEMTY 2.2 REVENGE Ransomware

Discovered by GrujaRS, NEMTY 2.2 REVENGE is an updated variant of NEMTY REVENGE 2.0 ransomware. This malware encrypts data and demands ransom payments for decryption. During this process, all files are appended with an extension consisting of ".NEMTY_" and a unique ID, generated individually for e

SwiftEngine Adware (Mac)
Mac Virus

SwiftEngine Adware (Mac)

The SwiftEngine app supposedly helps users to browse the web, however, it serves advertisements and gathers various data. Apps of this type are classified as adware. Furthermore, since most people do not download applications such as SwiftEngine intentionally, they are also known as potentially

OneSafe PC Cleaner Unwanted Application
Potentially unwanted application

OneSafe PC Cleaner Unwanted Application

OneSafe PC Cleaner is software classed as a Potentially Unwanted Application (PUA). It is endorsed as system cleaning tool capable of scanning and removing various threats and issues. One of this application's distribution methods is via deceptive/scam websites, hence why it is classified as a PUA

SystemDistrict Adware (Mac)
Mac Virus

SystemDistrict Adware (Mac)

The SystemDistrict application should not be trusted, since it is categorized as adware and a potentially unwanted application (PUA). Apps of this type feed users with unwanted ads and often gather private information. Typically, people do not download or install this software intentionally. In