Virus and Spyware Removal Guides, uninstall instructions

Dodger Ransomware

What is Dodger?

Dodger is software that is categorized as ransomware and this malicious program was discovered by GrujaRS. These programs are designed to encrypt files and create ransom messages that encourage victims to pay ransoms. Dodger adds the ".dodger" extension to each encrypted file.

For example, "1.jpg" becomes "1.jpg.dodger". It also displays the ransom message in a pop-up window.

   
Bak Ransomware

What is Bak?

Discovered by Michael Gillespie, Bak is the name of a high-risk computer infection. It is a new variant of Rotor, which is a ransomware-type program designed to prevent victims from accessing or using their files by encrypting them. To regain access, victims are encouraged to pay a ransom to Bak's developers.

Bak creates a ransom message within the "prontos_chek_base.txt" file and renames each encrypted file by adding "!__prontos@cumallover.me__.bak" to the filename. For example, "1.jpg" becomes "1.jpg!__prontos@cumallover.me__.bak".

   
Armuchteetthat.info Ads

What is armuchteetthat[.]info?

armuchteetthat[.]info is a rogue website identical to suaningrebtersed[.]infonewschanel[.]bizallneed[.]pro, and many others. It is designed to redirect users to other rogue websites and deliver dubious content.

Users typically visit armuchteetthat[.]info inadvertently - they are redirected by potentially unwanted applications (PUAs) and intrusive advertisements delivered by other rogue sites. PUAs usually infiltrate computers without permission and, as well as causing redirects, deliver intrusive ads and record information.

   
Lanset Ransomware

What is Lanset?

Lanset is a typical ransomware-type program that prevents users of infected computers from accessing their files. It encrypts (locks) them and victims cannot use them unless a ransom is paid. This malicious program belongs to the Djvu ransomware family and was discovered by Michael Gillespie.

Generally, ransomware-type programs rename encrypted files by adding an extension to the filenames. In this case, Lanset adds the ".lanset" extension. For example, "1.jpg" becomes "1.jpg.lanset". It also creates a text file called "_readme.txt", which contains a ransom message. This file can be found in all folders that contain encrypted data/files.

   
BSC Ransomware

What is BSC?

Discovered by Jakub Kroustek, BSC is yet another variant of high-risk ransomware called Dharma. After successful infiltration, BSC encrypts most stored files. Additionally, this malware appends filenames with the victim's unique ID, developer's email address, and ".BSC" extension.

For instance, "sample.jpg" might be renamed to a filename such as "sample.jpg.id-1E857D00.[basecrypt@aol.com].beets". After successful encryption, BSC opens a pop-up window and stores the "RETURN FILES.txt" text file on the desktop.

   
Megumin Trojan

What is Megumin?

Megumin is malicious software that is categorized as a trojan. It incorporates various features that allow cyber criminals to steal personal details, execute commands on the victim's computer, download and open files, and so on. Megumin is a high-risk computer infection that can cause serious problems and should, therefore, be eliminated immediately.

   
Redmat Ransomware

What is Redmat?

First discovered by Michael Gillespie and belonging to the Djvu ransomware family, Redmat is high-risk ransomware designed to stealthily infiltrate computers and encrypt most stored data, thereby rendering it unusable. During encryption, Redmat appends filenames with the ".redmat" extension (hence, its name).

For instance, "sample.jpg" is renamed to "sample.jpg.redmat". Additionally, Redmat generates a text file ("_readme.txt") and stores it in each folder containing encrypted files.

   
Io-search.com Redirect (Mac)

What is io-search.com?

Identical to geofoxip.com, io-search.com is a fake search engine that supposedly enhances the browsing experience by generating improved results and providing quick access to various popular websites.

On initial inspection, io-search.com may seem legitimate and useful, however, developers promote the site using rogue downloaders/installers that modify browser options without permission. Furthermore, io-search.com continually records information relating to browsing activity.

   
Suaningrebtersed.info Ads

What is suaningrebtersed[.]info?

suaningrebtersed[.]info is designed to operate like other rogue websites of this type, including allneed[.]pro, feedmedia[.]me, and tontorcaltedron[.]info. When opened, this site redirects visitors to other rogue websites or displays dubious content.

People do not generally visit this and other similar websites intentionally - they are opened by potentially unwanted apps (PUAs) installed on their computers or browsers. In most cases, people download and install apps of this type inadvertently. Furthermore, most PUAs cause unwanted redirects, collect browsing-related information, and deliver unwanted advertisements.

   
Stone Ransomware

What is Stone?

Stone is a malicious program that encrypt files, thereby preventing victims from accessing them unless a ransom is paid to cyber criminals (by purchasing a decryption tool/key).

This malicious software is categorized as ransomware. Stone belongs to the family of Djvu ransomware-type programs, and this particular infection was discovered by Michael Gillespie. Stone creates a ransom message within the "_readme.txt" file and renames all encrypted files. For example, "1.jpg" becomes "1.jpg.stone".

   

Page 1411 of 2126

<< Start < Prev 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal