Step-by-Step Malware Removal Instructions

Kotalq App Unwanted Application
Potentially unwanted application

Kotalq App Unwanted Application

Kotalq App is a PUA (Potentially Unwanted Application) that acts as a dropper for the Legion Loader malware. Our researchers discovered an installer containing Kotalq App promoted on a rogue webpage. In addition to the malware, this PUA also dropped the fake "Save to Google Drive" browser extensi

Loches Ransomware
Ransomware

Loches Ransomware

While inspecting malware samples submitted to VirusTotal, we discovered Loches, ransomware from the GlobeImposter family. Loches encrypts data, appends ".loches" to files, and provides a ransom note ("how_to_back_files.html"). An example of how Loches renames files: it changes "1.jpg" to "1.jpg.lo

Login From A New Device Email Scam
Phishing/Scam

Login From A New Device Email Scam

After examining this "Login From A New Device" email, we determined that it is spam. This fake message alerts the recipient that their email account was signed into from a new device. This spam mail attempts to lure recipients into disclosing their account log-in credentials to a phishing webpage.

OneDrive - Encrypted EFT Document Email Scam
Phishing/Scam

OneDrive - Encrypted EFT Document Email Scam

We have inspected the email and determined that it is a fake letter regarding an important electronic fund transfer document. It is written by scammers who seek to steal personal information from recipients. Emails of this type should be ignored, and links (or other elements) in them should be lef

Edfr789 Ransomware
Ransomware

Edfr789 Ransomware

Edfr789 is ransomware, a type of malware that encrypts files to prevent access to them. Threat actors use it to get paid for a decryption tool. In addition to locking files, Edfr789 appends four random characters to them and generates a ransom note ("Decryptfiles.txt"). An example of how the ranso

Time Is Slipping Away From Your Grasp Email Scam
Phishing/Scam

Time Is Slipping Away From Your Grasp Email Scam

We have examined the email and concluded that it is a sextortion scam. This type of scam typically involves a fraudulent claim that the sender has obtained compromising material, such as explicit photos or videos. Scammers behind such scams demand a ransom, often in cryptocurrency, to prevent the

Shadowpad Malware
Trojan

Shadowpad Malware

Shadowpad is a modular malware that uses information-stealing modules and can cause chain infections. It has been around since at least 2017. Initially used by a single threat actor based in China, its later attacks have been attributed to multiple Chinese cyberespionage groups. The latest campai

GhostSocks Malware
Trojan

GhostSocks Malware

GhostSocks is a malicious program written in the Go programming language. It is compatible with Windows and Linux operating systems. This program is a SOCKS5 backconnect proxy malware. Essentially, software of this kind is used by attackers to employ victims' Internet connections for malicious pur

Keep Awake Unwanted Application
Potentially unwanted application

Keep Awake Unwanted Application

Keep Awake is promoted as an app that allows users to stop their computers from entering sleep mode with just one click. However, our analysis shows that multiple security vendors flag Keep Awake (and its installer) as malicious. For this reason, we classified Keep Awake as an unwanted application

Ad Blocker Pro Shield Adware
Adware

Ad Blocker Pro Shield Adware

Our researchers discovered the Ad Blocker Pro Shield browser extension while investigating deceptive websites. This extension is promoted as a powerful advertisement-blocking tool that emphasizes privacy. Upon inspection, we determined that Ad Blocker Pro Shield operates as adware. Therefore, inst