How to remove PewCrypt Ransomware (Virus Removal Guide)

PewCrypt

PewCrypt ransomware, also referred to as PewDiePie ransomware, is malware that encrypts the files on your computer with AES encryption, makes you subscribe to PewDiePie on YouTube, and then makes you wait for PewDiePie to reach 100 million YouTube subscribers for a decryption tool will be released. However, if the YouTube channel T-Series gets 100 million YouTube subscribers before PewDiePie the private key and your files will be deleted.

When PewCrypt ransomware infects a computer it will encrypt files and change the file extension to PewCrypt. This means that a file named test.jpg will become test.jpg.PewCrypt. The ransomware will also show a ransom note.

Your Files Have Been Encrypted!

Pewdiepie Sub Count:

T-Series Sub Count:

Your files have been encrypted using a 256 AES key which has been encrypted with a 2048 bit RSA key

In order to get your files back read the instructions below

Instructions:

– Subscribe to Pewdiepie (Hint: Hit the bro fist)

– Wait until Pewdiepie reaches 100 million subs at which point a decryption tool will be released

If T-Series beats Pewdiepie THE PRIVATE KEY WILL BE DELETED AND YOU FILES GONE FOREVER!

Although the computer virus is not associated with YouTuber PewDiePie, the purpose of PewCrypt ransomware is clearly to help PewDiePie reach 100 million YouTube subscribers before T-Series.

Ransomware such PewCrypt is typically distributed by spam email message campaigns and websites that host malware or display malicious advertisements.

Step 1: Scan your computer with Malwarebytes

1. Download Malwarebytes Anti-Malware software to scan your computer and remove malicious files and potentially unwanted programs.

2. To install the program, locate and double-click the executable file you just downloaded. The file can usually be found in the Download folder.

install malwarebytes

3. Choose if this is for home or work use and click Agree and Install to begin installing Malwarebytes. Once the installation is complete, click Finish.

scan now

4. Once Malwarebytes is installed, open the program and click the Scan Now button on the dashboard – or go to the Scan tab and click the Start Scan button.

quarantine selected

5. When the scan is complete click the Quarantine Selected button.

6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

Step 2: Scan your computer with HitmanPro

1. Download HitmanPro to perform a second-opinion scan and remove any remaining malicious trace files. A second-opinion scan is important when removing malware and malicious files from your computer.

2. To install the program, locate and double-click the executable file you just downloaded. The file can usually be found in the Download folder.

3. Once HitmanPro is installed, open the program and click Next to start scanning your computer. *If you are using the free version you may choose to create a copy or perform a one-time scan.

4. When the HitmanPro scan is complete, click the Next button.

5. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

6. Click the Reboot button.

Step 3: Secure your computer

Consider these best practices to ensure that your computer is secure from cyber threats like this in the future.

Use Antivirus with real-time protection

Using an Antivirus program with real-time protection can stop emerging threats and hackers from gaining access to your computer or mobile device. Antivirus programs can remove malicious files that are already on your computer, prevent your programs from being used against you, protect you from malicious websites, and stop known and unknown ransomware attacks.

Recommendations:

Use a VPN

Using a VPN creates a private tunnel to keep the eyes of eavesdroppers and hackers away from your private data while you browse the web. With a VPN, you become anonymous and no one can determine who you are. Your data is encrypted and your web activity cannot be tracked.

Recommendations:

Sean Doyle

Sean is a distinguished tech author and entrepreneur with over 20 years of extensive experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. His expertise and contributions to the industry have been recognized in numerous esteemed publications. Sean is widely acclaimed for his sharp intellect and innovative insights, solidifying his reputation as a leading figure in the tech community. His work not only advances the field but also helps businesses and individuals navigate the complexities of the digital world.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.