Tim Kas

Tim Kas

Computer security specialist. I try to do my best and share my knowledge with you by creating simple-to-follow and useful guides on various topics about computer security.

How to remove Thor ransomware and decrypt .thor files

Thor is another variant of Locky ransomware that uses RSA-2048 and AES-128 encryption algorithms to encode files. Virus got its name because it adds .thor extension to all ciphered files. It also modifies filenames using random characters and numbers, so it becomes hard to distinguish files. Mostly malware affects user documents, pictures, videos, game files. Thor ransomware demands ransom of 3 BitCoins (~$1950). Ransomware creates 2 files: _WHAT_is.html and _WHAT_is.bmp. This files contain instructions for users to pay the ransom and get decryptor.

How to remove Shit ransomware and decrypt .shit files

Shit ransomware is new virus from Locky family. Actually, it infects files using the same way - like previous variants, ransomware is installed using a DLL that is executed by Rundll32.exe. After execution it attacks files of 380 various file extension and encrypts them using AES encryption. After this it appends .shit extension to all encoded files and demands ransom of 3 BitCoins (~$1950). Ransomware creates 3 files: _WHAT_is.html, _[2_digit_number]_WHAT_is.html, and _WHAT_is.bmp. This files contain texts encouraging users to pay the ransom.

How to uninstall (remove) Searchoko.com

Searchoko.com - fake browser search page that hijacks Google Chrome, Mozilla Firefox, Internet Explorer. Searchoko.com looks like an ordinary search engine, such as Google, Bing, Yahoo. According to developers, this increases the viewing experience, eliminates irrelevant search results.