Step-by-Step Malware Removal Instructions

Zumanek Trojan
Trojan

Zumanek Trojan

Zumanek is high-risk malware categorized as a banking/Remote Access Trojan (RAT). This malware is distributed using social engineering. In this way, cyber criminals trick users into downloading and installing Zumanek without their consent. The presence of this infection might cause various privacy

Carcn Ransomware
Ransomware

Carcn Ransomware

Discovered by Jakub Kroustek, Carcn is a ransomware-type malicious program that belongs to the Dharma malware family. Developers spread this infection to prevent victims accessing their computer files unless a ransom is paid. Carcn is designed to encrypt data and make it unusable. It also renames

Ketintontrat.info POP-UP Redirect
Adware

Ketintontrat.info POP-UP Redirect

ketintontrat[.]info is one of many rogue websites on the internet. This site is similar to hundreds of other pages of this type such as maranhesduve[.]club, undrabbifor[.]info, and tontritrattof[.]info. When visited, it causes redirects to several untrustworthy websites or displays dubious content

Feed.ebooks-club.com Redirect
Browser Hijacker

Feed.ebooks-club.com Redirect

feed.ebooks-club.com is another fake search engine. As with other sites of this type, it is presented as 'useful' - supposedly providing fast searches, accurate results, and so on. These search engines are often promoted through potentially unwanted applications (PUAs), browser hijackers. In this

George Carlin Ransomware
Ransomware

George Carlin Ransomware

George Carlin is a ransomware-type virus that stealthily infiltrates the system and encrypts most stored data. This is a new variant of another ransomware infection called Razy, however, it has many differences. It is rather unusual as compared to other infections of this type: George Carlin does

Chthonic Banking Trojan
Trojan

Chthonic Banking Trojan

Chthonic is a Trojan-type program that is installed through emails sent from hijacked/stolen PayPal accounts. The program leads to a fake Google Chrome update file that is promoted on the hijacked website. Visitors are informed that their Chrome browser is outdated and needs to be updated by clic

Conhost.exe Virus
Trojan

Conhost.exe Virus

Conhost.exe (Console Window Host) is the process of a program (cryptominer) that is designed to mine Monero cryptocurrency. Generally, cyber criminals trick people into downloading and installing this program to generate revenue. In summary, the program uses computer resources to mine cryptocurre

Apple.com-scan.live POP-UP Scam (Mac)
Mac Virus

Apple.com-scan.live POP-UP Scam (Mac)

apple.com-scan[.]live is a scam website designed to trick people into downloading a potentially unwanted application (PUA) called Cleanup-My Mac. The site displays a fake virus alert stating that the Mac computer is infected with some viruses that should be removed immediately. This website (or

Proof Attached Email Scam
Phishing/Scam

Proof Attached Email Scam

"Proof attached" is the name of a spam email campaign that is categorized as a 'sextortion' scam. Generally, scams of this type are used to scare people (recipients) and trick them into believing that scammers have recorded a compromising video (or taken photos) and will proliferate the material u

Btix Ransomware
Ransomware

Btix Ransomware

Discovered by Jakub Kroustek, Btix is yet another variant of high-risk ransomware called Dharma. As with its predecessor, Btix encrypts stored data and appends the names of compromised files with the ".btix" extension plus the developer's email address and victim's unique ID (e.g., "sample.jpg" mi