Virus and Spyware Removal Guides, uninstall instructions

Grej Ransomware

What is Grej ransomware?

Grej is a malicious program belonging to the Dharma ransomware family. Systems infected with this malware have their data encrypted and receive ransom demands for the decryption. In other words, the files are rendered inaccessible, and victims are asked to pay - to recover access to their data.

During the encryption process, affected files are retitled following this pattern: original filename, unique ID assigned to the victim, cyber criminals' email address, and ".grej" extension. For example, a file like "1.jpg" would appear as something similar to "1.jpg.id-1E857D00.[grejkugulik@onionmail.org].grej" - after encryption. Once this process is completed, ransom notes are created in a pop-up window and "info.txt" text file.

   
Myday Ransomware

What is Myday ransomware?

Belonging to the Dharma ransomware family, Myday is a malicious program designed to encrypt data and demand payment for the decryption. In other words, this malware locks files and asks victims to pay - to restore access to their data.

During the encryption process, files are retitled according to this pattern: original filename, unique ID assigned to the victim, cyber criminals' email address, and ".myday" extension. For example, a file named "1.jpg" would appear as something similar to "1.jpg.id-1E857D00.[everyday@dr.com].myday". Afterwards, ransom notes are created in a pop-up window and "FILES ENCRYPTED.txt" text file.

   
Army Ransomware

What is Army ransomware?

Army is a piece of malicious software belonging to the Xorist ransomware group. This malware operates by encrypting data and demanding payment for the decryption. In other words, the affected files are rendered inaccessible, and victims are asked to pay - to restore their data.

During the encryption process, the compromised files are appended with the ".army" extension. For example, a file originally named something like "1.jpg" would appear as "1.jpg.army", "2.jpg" as "2.jpg.army", and so on. Once this process is complete, a ransom note - "HOW TO DECRYPT FILES.txt" - is dropped onto the desktop.

   
Watchvideoplayer.com Ads

What is watchvideoplayer[.]com?

Watchvideoplayer[.]com is a rogue site designed to load dubious content and/or redirect visitors to other webpages (likely unreliable or malicious ones). The Internet is rife with such websites; thehugejournal.comdarliament.space, and push-news.org - are but some examples.

Users typically enter rogue sites inadvertently. Most get redirected to them by suspicious pages, intrusive ads, or installed PUAs (Potentially Unwanted Applications). This software can cause redirects, run intrusive advertisement campaigns, and gather browsing-related data.

   
Thehugejournal.com Ads

What is thehugejournal[.]com?

Thehugejournal[.]com is an untrustworthy webpage, which shares similarities with catests.space, boustahe.com, echanged.space, and many others. This site operates by presenting visitors with questionable content and/or redirecting them to various pages (likely unreliable or malicious ones).

Websites of this kind are seldom accessed intentionally. Most users get redirected to them by dubious sites, intrusive ads, or installed PUAs (Potentially Unwanted Applications). This software can be installed onto systems without express user consent and/or knowledge.

   
Catests.space Ads

What is the catests[.]space website?

Catests[.]space is a rogue webpage sharing common traits with matrix-news.net, darliament.space, push-news.org, news-mosuka.cc, and countless others. This site is designed to load dubious content and/or redirect visitors to different websites (likely unreliable or malicious ones).

Users rarely access such pages intentionally; most get redirected to them by rogue sites, intrusive adverts, or installed PUAs (Potentially Unwanted Applications). These apps can infiltrate systems without user permission. PUAs operate by causing redirects, running intrusive advertisement campaigns, and collecting browsing-related data.

   
Imshifau Ransomware

What is Imshifau ransomware?

Imshifau is a piece of malicious software classified as ransomware. Systems infected with this malware have their data encrypted (files rendered inaccessible/unusable), and victims are asked to pay a ransom for the decryption (access/use recovery).

The affected files are renamed with a random character string and the "Imshifau" extension during the encryption process. For example, a file initially titled "1.jpg" would appear as something similar to "Aya9hgIcKvAkVk.Imshifau". After this process is complete, a ransom note - "INFO OF DECRYPT.TXT" - is dropped onto the desktop.

   
Statement Report Email Virus

What is "Statement Report email virus"?

"Statement Report email virus" is a malware-spreading spam campaign. The term "spam campaign" defines a mass-scale operation during which thousands of deceptive emails are sent. The "Statement Report" scam emails aim to infect recipients' devices with a trojan.

   
MosaicLoader Malware

What is MosaicLoader?

MosaicLoader is a loader/backdoor type malicious program. It is designed to open a "backdoor" for other malware. To put it another way, MosaicLoader can download/install additional malicious software. Furthermore, it can infect devices with any malware; hence, the threats posed by it are especially broad.

MosaicLoader has been noted infecting systems with the Glupteba trojan, XMRIG cryptominer, and AsyncRAT (Remote Access Trojan). It has also been observed being actively spread via paid advertisements luring victims who search for illegal software activation ("cracking") tools.

   
Desifrujmujpocitac2021 Ransomware

What is Desifrujmujpocitac2021 ransomware?

Desifrujmujpocitac2021 is a ransomware-type malicious program. This malware is designed to encrypt data and demand ransoms for the decryption. In other words, it renders files inaccessible, and asks victims to pay - to recover access to their data.

During the encryption process, affected files are appended with a random extension. For example, a file like "1.jpg" would appear as something similar to "1.jpg.i7g5", "2.jpg" as "2.jpg.x335", "3.jpg" as "3.jpg.7t04", and so forth. After this process is complete, a ransom note - "read_it.txt" - is dropped onto the desktop.

   

Page 6 of 1322

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>
Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal