Virus and Spyware Removal Guides, uninstall instructions

Deman Ransomware

What is Deman?

Deman is a malicious program belonging to the Everbe ransomware family. This malware operates by encrypting the data of infected systems so that ransom demands can be made for decryption. During the encryption process, the filename extensions of all affected files have "deman" added to them.

For example, a file originally named something like "1.jpg" would appear as "1.jpgdeman" following encryption. After this process is complete, a text file ("!=How_to_decrypt_files=!.txt") is created on the desktop.

   
Qlopx.xyz Redirect

What is qlopx.xyz?

qlopx.xyz is the address of a fake search engine promoted through a potentially unwanted application (PUA), a browser hijacker called SApp+ (or Smash App+). It is possible that other apps also promote qlopx.xyz. Generally, apps of this type promote the addresses of fake search engines by changing browser settings.

Browser hijackers also gather information. They are classified as PUAs, since people usually download and install them unintentionally.

   
Anon Ransomware

What is Anon?

Discovered by malware researcher Raby, Anon is a malicious program classified as ransomware. Systems infected with this malware suffer data encryption and users receive ransom demands for decryption. During the encryption process, all affected files are appended with the ".anon000" extension.

For example, "1.jpg" would appear as "1.jpg.anon000". After this process is complete, Anon ransomware displays a pop-up window, which contains the ransom message.

   
MuchLove Ransomware

What is MuchLove?

MuchLove is a ransomware-type infection based on HiddenTear. It renames all encrypted files by appending the ".encrypted" extension to filenames. For example, it renames "1.jpg" to "1.jpg.encrypted", and so on. MuchLove also creates a ransom message within the "READ_IT.txt" file, which can be found in folders that contain encrypted data.

   
Rezm Ransomware

What is Rezm?

Rezm is a ransomware-type program that belongs to the Djvu family. It encrypts files that are stored on the infected computer, renames them and creates a ransom message. This ransomware renames all files by appending the ".rezm" extension to filenames.

For example, Rezm renames a file named "1.jpg" to "1.jpg.rezm", and so on. The ransom message created by Rezm is within a text file named "_readme.txt".

   
Dewar Ransomware

What kind of malware is Dewar?

Dewar is a malicious program belonging to the Phobos ransomware family. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption. During the encryption process, all affected files are renamed according to the following pattern: original filename, unique ID, developer's email address and the ".dewar" extension.

For example, a file like "1.jpg" would appear as something similar to "1.jpg.id[1E857D00-2718].[kryzikrut@airmail.cc].dewar".

   
Speed Test Guide Browser Hijacker

What is Speed Test Guide?

Speed Test Guide is a browser hijacker and endorsed as a free tool capable of internet speed testing, access to previous tests and speed improvement tips, etc. In fact, Speed Test Guide operates by altering browser settings to promote a fake search engine (speedtest-guide.com).

Furthermore, it has data tracking capabilities, which are employed to monitor users' browsing habits. Due to its dubious proliferation methods, Speed Test Guide is also classified as a Potentially Unwanted Application (PUA).

   
PDF Opener Browser Hijacker

What is PDF Opener?

The PDF Opener browser hijacker promotes pdfsrch.com, the address of a fake search engine. Like most apps of this type, PDF Opener achieves this by changing browser settings. Furthermore, browser hijackers usually gather details relating to users' browsing habits.

These apps are categorized as potentially unwanted applications (PUAs), since people tend to download and install them inadvertently.

   
Sorena Ransomware

What is Sorena?

Discovered by Jirehlov, Sorena is malicious software categorized as ransomware. Systems infected with this malware have their data encrypted and users receive ransom demands for decryption. During the encryption process, all affected files are renamed with the following pattern: original filename, cyber criminals' email address, unique ID and the ".sorena" extension.

For example, a file such as "1.jpg" would appear as something similar to "1.jpg.Email=[MasterFile001@protonmail.com]ID=[GKKUEMKNJJOXPKVDEPIO].sorena" after encryption. Once this process is complete, a ransom message within the "how_to_decrypt.txt" file is created.

   
Kiss Ransomware

What is Kiss?

Kiss is a part of Phobos, a family of ransomware-type malicious programs. It changes filenames of all encrypted files, displays a ransom message and creates another in a text file. Kiss renames files by adding the victim's ID, 2katrin@tuta.io email address and appending the ".kiss" extension to filenames.

For example, "1.jpg" might become "1.jpg.id[1e857d00-2641].[2katrin@tuta.io].kiss", and so on. It creates a text file named "info.txt" and displays another ransom message in a pop-up window from the created "info.hta" file.

   

Page 1420 of 2329

<< Start < Prev 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal