Click on screenshot to zoom
Danger level 9
Type: Trojans
Common infection symptoms:
  • Will change your homepage
  • Installs itself without permissions
  • System crashes is a malicious computer infection classified as ransomware. It means that when the program enters your computer as a Trojan, it holds your computer (or your files, in this case) hostage until you pay a pre-determined ransom fee. Needless to say, it is important to remove from the system as soon as possible, and the best way to achieve that is to invest in a legitimate computer security application. For any further questions, please leave us a comment below this description and our team will reply as soon as possible.

It does not require an extensive analysis to see that is a direct clone of Both ransomware infections have been created by the same criminals who intend to steal your money. You most probably got infected with when you opened a spam email attachment. However, spam email messages are not the only method of distribution employed by this infection. Our research shows that this ransomware program might also be distributed via exploit kits. Exploit kits are one of the most prevalent web threats, and they can be embedded in various websites that contain vulnerable software (like flash plug-ins). The pre-written exploit code in the exploit kits targets users that are running outdated software applications.

Therefore, all of your software should be updated regularly if you want to avoid and similar malware infections. Nevertheless, if has already managed to enter your computer, do not panic because that will not help anyone.

Technically, is a very annoying and disturbing infection because right when it enters your computer, it encrypts the most commonly used file extensions, thus making it impossible for you to access your MS Word documents, videos, photos, Excel documents, and so on. Once the encryption is complete, the files are renamed as [filename].id[ID] This ID on the file is the ID users are told to send with their email message via The notification that tells you to contact the people behind this infection is worded as follows:

Attention! Your computer was attacked by virus-encoder. All your files are encrypted cryptographically strong, without the original key recovery is impossible!
Write on the case, do not waste your and our time on empty threats.
Responses to letters only appropriate people are not adequate ignore.

Judging from the sloppy and awkward English in the message, we can tell that the people behind are not interested in beating around the bush. They really want you to pay the ransom as soon as possible, and they claim that it is impossible to decrypt your files without their decryption key.

However, that might not be exactly the case. There are several decryption tools out there that can help users infected with and similar ransomware infections. What’s more, you may not even need a decryption tool if you have a file backup on an external storage device. Either way, you should still consider acquiring a reliable computer security tool that would delete and all the related files at once, and you would be able to protect your PC from harm. Don’t forget that there might be more dangerous programs running on your system, so you should remove them all as well.

Download Spyware Removal Tool to Remove*
  • Quick & tested solution for removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.