If this succeeds, the virus sends data on the infected computer to the server, and from it receives a key (so-called ‘online key’) necessary for file encryption. After that, Tisc virus tries to connect to its command server.
Upon execution, the virus creates a directory in the Windows system directory, copies itself to this directory, changes some OS settings, and also collects information about the infected computer. Typically, ransomware like Tisc can infect a computer when installing programs downloaded from torrent web-sites as well as when running cracked games, freeware, key generators and other similar software. Tisc virus sneaks into the system without any visible symptoms, which is why users notice that their computer is infected too late, when the files are already encrypted.
Tisc ransomware is a malware that’s created to encrypt files located on the victim’s computer, and then extort money to decrypt them. Screenshot of files encrypted by Tisc virus (‘.tisc’ file extension) QUICK LINKS