HappyLocker ransomware – is a typical ransomware, which encrypts user documents and files (especially media files) by using special encrypting algorithm. While encrypting files, HappyLocker also renames them and adds file extension .happy.
Esmeralda Ransomware -is a malicious software, that uses e-mail attachments with provocative messages to infect personal computer. Its main purpose is encrypting documents and files to get ransom for them.
BTC ransomware – is a typical ransomware, which corrupts user’s files and documents and after asks money for “cure”. Mainly, BTC ransomware infects personal computers via e-mail attachments.
Kangaroo ransomware – is a common ransomware, that infects computers via e-mail attachments. As many ransomware it uses AES encryption algorithm to encrypt user’s documents and files, also it renames files and adds “.crypted_file” file extension.
DummyLocker – is an uncommon malicious software, which is developed by cyber crooks. Why is it uncommon? Because it has own monetizing system: after reaching computer, program starts to encrypt user’s documents and files.
Troldesh ransomware – is another malware with popular monetizing scheme. After appearing on computer, Troldesh begin to encrypt files and documents by using special encrypt algorithm.
Crysis ransomware – is a typical malicious crypto-software, which after infection starts to encrypt user’s documents and files (especially media and text files).
Cerber ransomware – is a typical crypto-ransomware, that encrypts users documents and files by using AES encryption algorithm. What happens if Cerber infects user’s PC? It starts encryption
Jack.pot ransomware – is another ransomware, that after infecting computers encrypts users files and documents (also renaming them and adding .coin as file extension).