During this process, Arrakis.com Developers promote Arrakis.com using a deceptive marketing method called ‘bundling’ and conceal all information about modification of browser options within the ‘Custom/Advanced’ settings of the download/installation processes. Following successful encryption, Arrakis.com generates three different files: By falsely claiming to generate the most relevant search results, Arrakis.com often tricks users into believing that it is legitimate. As mentioned above, Arrakis.com is promoted using bogus software installers. Once infiltrated, Arrakis.com uses a ‘virtual layer’ to generate pop-up, banner, coupon, search, and other similar advertisements. Once infiltrated, Arrakis.com encrypts various files and adds .evil Therefore, public (encryption) and private (decryption) keys are generated during the process.