Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC.
Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI.
A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. It detects and removes the following malware: malware family Rootkit.Win32.TDSS; bootkits; rootkits.
Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. More Info @ HomePage: 23fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4#2M7s2m8G2M7Y4c8Q4x3X3g2C8j5i4y4H3k6i4u0K6K9%4W2Q4x3X3g2U0L8$3#2Q4x3V1k6X3j5i4q4Q4x3V1k6Q4x3@1k6I4K9h3c8Q4x3@1b7J5x3o6R3J5z5o6l9&6x3K6t1`.