Click on screenshot to zoom
Danger level 7
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • System crashes
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel Ransomware Ransomware is an extremely dangerous infection that might also be recognized as Ransomware. Needless to say, the names derive from email addresses, and, according to our research, these email addresses are embedded in the extensions that are attached to the files encrypted by this malware. Because this threat does not leave a ransom note – which is usually represented via files created by the infection – the email in the new extension is the only lead for the victim. If you contact the email address provided to you, cyber criminals behind it will respond with a ransom request. Unfortunately, it looks like the creator of this ransomware is very greedy, and the ransom fee might be extremely high. Whether or not you have enough to cover the ransom, you need to read this report first. Here, we explain how risky it is to pay the ransom, and we discuss the removal of Ransomware.

The first topic we want to address is the infiltration of Ransomware. Needless to say, this threat cannot just appear out of thin air. Based on the information we have gathered while analyzing hundreds of other ransomware infections (e.g., Screenlocker Cuzimvirus, Ncrypt Ransomware, and Anubis Ransomware), the chances are that you have executed the threat by opening a spam email attachment. Have you recently opened a file attached to an email and nothing happened? Though you might not have noticed it, the inconspicuous-looking file might have launched the ransomware. It does not take long for the threat to start the malicious process of file encryption, which is why it should be easy to figure out that you have executed the infection by opening a corrupted attachment. Of course, different methods of distribution could be employed, and so you have to consider all security vulnerabilities. Also, you have to consider the possibility that other threats might await removal as well.

It looks like Ransomware attempts to encrypt sensitive files because it targets files with such extensions as .txt, .zip, .png, .gif, or .html. This ransomware is not extremely aggressive in a sense that it does not try to encrypt all files present on your PC. Of course, that does not mean that this threat is any less damaging than all those other ransomware infections that target documents, photos, and other sensitive files. Once the files are encrypted, they get the “_____GLOK9200@GMAIL.COM_____.tar” (or “_____COCOSLIM98@GMAIL.COM_____.tar”) extension attached to them. The email address in this extension, of course, hints that you need to communicate with someone via it. The “.tar” extension at the end means nothing. Although it is a type of archive file on Linux OS, it does not seem to have a purpose when used by this ransomware. Are you able to delete this additional extension? Do not waste your time because the problem is not in the extension but within your file. The devious Ransomware uses an encryption algorithm to render the file data unreadable. To make your files readable again, you need a decryption key, and that might be impossible to get.

If you communicate with the cyber criminals using the email address, you might receive instructions indicating that your files will be decrypted only if you pay the ransom, which, according to some users, might reach the 7 Bitcoins mark. Do you know how much 7 Bitcoins is? If we look at the current conversion rates, the ransom goes up to around $4900 or €4500. In this sense, the ransomware is exceptionally aggressive because we have not seen other ransomware threats asking for such big ransom payments. And what if cyber criminals do not provide you with a file decryptor after you pay this sum? Unfortunately, it is very possible that you will be scammed, in which case, you will be left standing without your files or money. We do not recommend taking any more risks. Instead, you should employ automated malware removal software to delete Ransomware and other active threats. Afterward, back up the remaining files to guarantee their protection. If you want to erase the ransomware manually, here is the guide that will help you. Ransomware Removal

  1. Tap Win+E keys to launch Explorer.
  2. Enter %ALLUSERSPROFILE%\Start Menu\Programs\Startup\ into the bar at the top.
  3. Right-click and Delete the {random name}.lnk file whose shortcut target should point to the malicious {unknown name}.exe file.
  4. The {random name}.lnk file could be located in these directories as well:
    • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
    • %USERPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\
    • %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup\
    • %ALLUSERSPROFILE%\Application Data\Microsoft\Windows\Start Menu\Programs\Startup\
  5. Now, enter %LOCALAPPDATA% (or %USERPROFILE%\Local Settings\Application Data\) into the bar at the top.
  6. Right-click and Delete the folder named PeerDistRepub (contains the malicious {unknown name}.exe file).
  7. Enter %Temp% into the bar at the top to check for the copy of the {unknown name}.exe file.
Download Spyware Removal Tool to Remove* Ransomware
  • Quick & tested solution for Ransomware removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.