Click on screenshot to zoom
Danger level 7
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • System crashes
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel Ransomware Ransomware is unfortunately not decryptable at the moment, and there is not knowing if the volunteer computer security specialists are going to create a decryption tool for this infection. Therefore, our researchers recommend switching damaged files with unaffected copies to recover such data faster, provided you have any copies on other devices, cloud storages, etc. As for paying the ransom, we are firmly against it since it could be a complete waste of your savings. No one can guarantee the malware’s creators will hold on to their end of the deal. Not to mention, these hackers may only claim they have the means to decrypt your data. If you agree with us that paying the ransom is too risky and not worth it, you should concentrate on how to get rid of Ransomware. One of the ways to remove it from the system is to erase it manually, and the instructions placed below the article can guide our readers through this process.

As our researchers have determined this recently created malicious program could be a new version of a previously researched threat called Apocalypse Ransomware. There are some similarities between them like the same encryption method, but Ransomware looks rather different too. For example, the previous version used to encrypt files with the RSA cryptosystem and mark them by applying a secondary extension called .encrypted, for example, forest.jpg.encrypted.

However, even though the newer version still uses RSA cryptosystem, it marks damaged files by adding a more complex extension to them, for example, forest.jpg.ID-EHH852B9DE[].nhcrakmopva1vv. Without a doubt, the first part of it contains a unique user ID number, which is most likely generated for each infected computer. The second part provides an email address that probably belongs to the hackers who created the malware. Our researchers say the last part is insignificant as it simply contains 14 random characters.

What are the files Ransomware is targeting? According to our specialists, the malicious application might be after the same files its previous version was, for example, various pictures, photographs, videos, documents, archives, and so on. Thus, we believe the malware should not target files located in the Windows folder or any other program data. Compared to other ransomware threats that damage all data on the system without any exceptions, this malicious application looks less damaging, since you should be able to use the computer normally as soon as the infection is erased. We recommend deleting it because we do not yet have full information about its working manner and if it remains on the computer, it could pose a threat to your future data.

Once, this malware finishes encrypting its targeted data it may show users a ransom note. Such messages usually threaten users their data might be lost forever if they do not contact the infection’s creators as requested. It may not say anything about paying the ransom, but such demands could arrive later, for example, with a reply email as you might be asked to contact the hackers via email. Sadly, even if you pay the ransom, there is a chance Ransomware’s creators may not bother to send the promised decryption tools, or they could lose your unique decryption key, which is also needed to unlock the encrypted files. Naturally, we do not think it is a good idea to take any chances in such situation, especially when you might lose your money.

Lastly, we would like to stress it again how it is important to eliminate Ransomware if you wish to keep the computer safe and secure. The instruction placed below will show you how to delete data belonging to the malware carefully, so do not hesitate to use these steps if you feel like removing the malicious application manually. For some users, it might appear to be more challenging than it looks like and in such case, we would recommend using reliable antimalware software. A trustworthy tool could detect files associated with the infection automatically, and it would allow the user to remove them quickly along with other possible threats that could be identified during the scan.

Restart computer in Safe Mode with Networking

Windows 8\Windows 10

  1. Press Win+I.
  2. Tap the Power button.
  3. Click Shift and hold it as you select Restart.
  4. Press Troubleshoot and go to Advanced Options.
  5. Pick Startup Settings and select Restart.
  6. Click F5 and restart the computer.

Windows XP\Windows Vista\Windows 7

  1. Go to Start and choose Shutdown options.
  2. Select Restart then wait till the device begins rebooting and start clicking F8.
  3. Pick Safe Mode with Networking and click Enter to log on.

Eliminate Ransomware

  1. Press Win+E.
  2. Check the following directories:
  3. Look for suspicious files that could be associated with the infection.
  4. Right-click the infected files and select Delete.
  5. Locate the ransom note it could be titled *md5*.txt or similarly.
  6. Right-click this text document and select Delete.
  7. Exit the Explorer.
  8. Empty your Recycle bin.
Download Spyware Removal Tool to Remove* Ransomware
  • Quick & tested solution for Ransomware removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.