- Slow Computer
- System crashes
- Connects to the internet without permission
- Installs itself without permissions
- Can't be uninstalled via Control Panel
Hollycrypt Ransomware is an infection that was created using the Hidden-Tear Ransomware open source. This tells us right away that the creator of this ransomware is unlikely to be experienced, and that is proven by other things that we will discuss further in this report. APT Ransomware and GhostCrypt Ransomware have also been created using the same open source project, and so there is a lot if information that you can gather by reading the reports analyzing these infections. One thing we have to mention right now is that this ransomware must not be mistaken for HolyCrypt Ransomware, which we have also reviewed in a separate report. Needless to say, all of these infections require urgent removal, but, in this report, we want to focus on deleting Hollycrypt Ransomware. Please continue reading the report to learn how you should act around this monstrous infection.
There are several ways you can confirm the invasion of Hollycrypt Ransomware. Although this infection does not change the Desktop to display a ransom note – which is how most ransomware infections operate – it creates a TXT file called “Read_this_shit.txt”. In this note, you are informed that your files were encrypted by “Hollycrypt.” Also, if this infection encrypts the files successfully, it adds the “.Hollycrypt” extension to them. If you check the encrypted files and the TXT file, and both of them represent the name of the infection, you can be sure that this is the threat you are dealing with. Note that the TXT file is most likely to be added to every folder and subfolder containing the corrupted files. If you open this file, you will find a request that reads: “Send me some bitcoins or Vodka , Then I will email with an antidote.” The ransom fee is not specified, and there is no information on how the fee should be transferred. On top of that, the email address that the creator of Hollycrypt Ransomware expects you to use for communication is Hollyman137@gmail.com, and law enforcement authorities should be able to track it. Clearly, this threat was created by someone clueless, but that does not make it any less harmful.
According to our research, Hollycrypt Ransomware is most likely to use the AES encryption algorithm to encrypt the files located on your operating system. This threat should evade system files and corrupt only personal files, such as photos, archives, and documents, but these, of course, are the most sensitive. If you store your files in a back-up drive or a storage cloud, you are safe. All you need to do is delete Hollycrypt Ransomware and replace the corrupted files with the back-up copies. Obviously, if this is how you proceed, you need to make sure that your operating system is entirely clean before you do anything. Keep in mind that the ransomware might be accompanied by other malicious threats! In fact, the ransomware could have been downloaded by them onto your computer. Of course, it is most likely that this malware is spread via spam email attachments, just like most other ransomware infections. If that is the case, you need to figure out where you have downloaded the malicious executable because you need to delete it.
Will you retrieve access to your personal files if you contact the creator of the ransomware and follow the instructions to pay a ransom? Unfortunately, we do not know; however, there is a great possibility that you will not be provided with a file decryptor or a decryption key (or whatever it is that you are promised) even if you pay the ransom twice. You need to be extremely careful if the ransom fee demanded from you is very big, in which case, the stakes are higher. Hopefully, your files are backed up, and you can remove Hollycrypt Ransomware from your operating system without further postponement. After you get rid of this infection, immediately scan your PC to check if other malicious threats exist. Use an anti-malware tool to eliminate them and, more important, protect your operating system from further invasions. Also, if you have not used file backup systems, set them up immediately to prevent the loss of files in the future.
Hollycrypt Ransomware Removal
N.B. If you are unable to detect malware, install a legitimate malware scanner to inspect your operating system and list the infections and their components for you.