Virus and Spyware Removal Guides, uninstall instructions

Sckmedady Ransomware

What kind of malware is Sckmedady?

Sckmedady is ransomware that encrypts files and modifies their filenames. It appends the docexkonc@gmail.com email address, a string of random characters, and the ".sckmedady" extension to filenames.

For instance, it renames "1.jpg" to "1.jpg.[docexkonc@gmail.com][MJ-JS8403912576].sckmedady", "2.jpg" to "2.jpg.[docexkonc@gmail.com][MJ-JS8403912576].sckmedady". Also, this ransomware creates a ransom note, the "Read-Me.txt" file. Sckmedady belongs to a ransomware family called VoidCrypt.

   
NoteIt Adware

What kind of software is NoteIt?

NoteIt is advertised as a tool allowing users to send important notes privately. It also bombards users with annoying advertisements. Therefore, it falls into the category of adware/advertising-supported software. It is worth mentioning that users often install adware unknowingly.

   
j1k0nxo7 Ransomware

What kind of malware is j1k0nxo7?

j1k0nxo7 is ransomware designed to encrypt files (and modify their filenames), change the desktop wallpaper, and create the "read_it.txt" file (a ransom note). It appends a randomly generated extension to filenames, for example, it renames "1.jpg" to "1.jpg.yaoc", "document.txt", to "document.txt.qnrg", and so on.

   
Sbpg Ransomware

What kind of malware is Sbpg?

Sbpg is part of the Djvu ransomware family. This ransomware encrypts files and appends the ".sbpg" extension to their filenames. For instance, it renames "1.jpg" to "1.jpg.sbpg", "sample.png" to "sample.png.sbpg", and so on. Also, Sbpg creates the "_readme.txt" file - a ransom note containing contact and payment information.

   
Drik Ransomware

What kind of malware is Drik?

Drik ransomware belongs to a family of ransomware called Phobos. This variant encrypts files and appends the victim's ID, jackrasal@privatemail.com email address, and the ".Drik" extension to filenames. It also generates two ransom notes: "info.hta" (a file designed to display a ransom note in a pop-up window) and "info.txt".

An example of how the Drik ransomware renames files: it renames "1.jpg" to "1.jpg.id[9ECFA84E-2455].[jackrasal@privatemail.com].Drik", "image.png" to "image.png.id[9ECFA84E-2455].[jackrasal@privatemail.com].Drik", and so on.

   
Xcmb Ransomware

What kind of malware is Xcmb?

Xcmb is ransomware that encrypts files and appends the ".xcmb" extension to filenames. For example, it renames "1.jpg" file to "1.jpg.xcmb", "document.txt" to "document.txt.xcmb", and so on. It provides contact and payment information in a ransom note named "_readme.txt". Xcmb belongs to a ransomware family called Djvu.

   
IntegrationAdmin Adware (Mac)

What kind of application is IntegrationAdmin?

IntegrationAdmin generates advertisements and changes the web browser's settings (hijacks a web browser) to promote a fake search engine. Most users download and install adware and browser-hijacking apps inadvertently. Thus, IntegrationAdmin and similar apps are called potentially unwanted applications (PUAs).

   
Search With Incognito Browser Hijacker

What kind of application is Search With Incognito?

Search With Incognito is a browser hijacker designed to promote searchwithouthistorysearch.com. It changes the web browser's settings to promote a fake search engine. Usually, browser-hijacking apps are promoted/distributed using questionable methods. Thus, users do not download/install them on purpose.

   
Nhuie Ransomware

What kind of malware is Nhuie?

Nhuie is ransomware. It encrypts files to make them inaccessible for victims. Also, Nhuie renames all of the encrypted files (it appends a string of random characters and the ".nhuie" extension to filenames) and creates the "8Axs_HOW_TO_DECRYPT.txt" file (a ransom note).

For example, it renames "1.jpg" to "1.jpg.GXCo07v2AOSADlS44hLpCoTNTO-JdOvXpLYN0x4INgL_LLqkie2bw7A0.nhuie", "2.txt" to "2.txt.GXCo07v2AOSADlS44hLpCoTNTO-JdOvXpLYN0x4INgL_LLqkie2bw7A0.nhuie".

   
Surtr Ransomware

What kind of malware is Surtr?

Surtr is ransomware. Malware of this type encrypts files (and renames them) and generates a ransom note. Surtr appends the decryptmydata@mailfence.com email address and the ".SURT" extension to filenames.

For example, it renames "1.jpg" to "1.jpg.[DecryptMyData@mailfence.com].SURT", "2.jpg" to "2.jpg.[DecryptMyData@mailfence.com].SURT". Ransomware may also append ".Surtr" extension and instead of ".SURT" at the end of the filename.

Surtr's ransom notes are provided in the "SURTR_README.txt" and "SURTR_README.hta" files (the second file opens a pop-up window). This ransomware also changes the desktop wallpaper. It was discovered by S!Ri.

   

Page 688 of 2126

<< Start < Prev 681 682 683 684 685 686 687 688 689 690 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal