__murzik@jabber.mipt.ru Files Virus – Remve FLKR and Restore Data

[email protected] Files Virus – Remve FLKR and Restore Data

This article has been created in order to explain what is the ransomware using the file extension [email protected] and how you can remove it and restore the files that have been encrypted on your computer.

A new ransomware infection, going by the name FLKR ransomware has been detected by security researchers. The malware’s main goal is to encrypt the files on your computer, leaving them to appear as if they are corrupt or malicious. In addition to this, the malware also adds the file extension [email protected] and ask victims to contact the cyber-crooks, using this anonymous e-mail address. The FLKR ransomware also leaves behind a ransom note type of file, called INSTRUCTIONS.txt with ransom instructions on how to make the payoff to get your files recovered back to their normal, working state. If your computer has been infected by the FLKR ransomware, we recommend that you read the following article and learn how to remove it from your PC and how to try and restore as many [email protected] encrypted files as possible.

Threat Summary

NameFLKR Ransomware
TypeRansomware, Cryptovirus
Short DescriptionVariant of the FLKR ransomware family. Encrypts your files and holds them hostage until you pay ransom.
SymptomsThe files on your computer seem no longer able to be opened and they also have the file extension [email protected].
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by FLKR Ransomware


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss FLKR Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

FLKR Ransomware – Spread

For this ransomware virus to infect the maximum ammount of victims It may use similar methods like it’s predecessor. The malware may come via e-mail in the form of a malicious URL or attachment. The e-mails sent by the cyber-criminals may also pretend that the attachment is an important document and the user should open it. Here are some example of e-mail topics to best explain how FLKR ransomware may trick victims into opening it’s files:

  • “Your eBay purchase has been dispatched.”
  • “Your PayPal account has been suspended.”
  • “There is suspicious activity on your BankAccount”
  • “Deadline for paying your fine.”

Once victims are lured into openeing the attachment, the infection process of FLKR ransomware takes place.

FLKR Ransomware – Analysis

The FLKR ransomware infects your computer using malware obfuscation techniques that prevent your security software from detecting any malware infections. As soon as the infection takes place, the virus drops it’s malicious files which may have the same location as the previous version of the virus and also the same names:

→ C:\cpqsystem\rel1711\flkr.exe

After this is done, the FLKR ransomware virus may also attack the Windows Registry Editor by adding Windows registry entries in the following sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

In addition to those, the ransomware may also drop it’s ransom note file on your computer, called “INSTRUCTIONS.txt”. It has the following contents:

Хотите расшифровать Ваши файлы? Пишите на джаббер (xmpp): [email protected] (можете писать в оффлайн если нас нет в онлайне) Ваш PIN: {RANDOM}

FLKR Ransomware – Encryption Process

In order to encrypt the files on the victim’s computer, the FLKR ransomware may scan for the files that you often use. Most likely these appear to be:

  • Documents.
  • Video files.
  • Audio files.
  • Microsoft Office files.
  • Adobe Reader files.
  • Virtual drives.
  • Images.
  • Archives.

The malware goas as far as to skip encrypting the files in the following Windows directories so that you can still be able to use your PC:

  • %Program Files%
  • %Documents and Settings%
  • %Intel%
  • %Install%
  • %cpqsystem%

After the encryption process has completed, the FLKR ransomware virus may leave the files with the file extension [email protected] and they may appear like the following image displays:

After the FLKR ransomware encrypts the files on your computer, the virus may also delete the back ups on your computer, by executing the following command in the background:

process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default}
recoveryenabled no & bcdedit.exe /set {default}
bootstatuspolicy ignoreallfailures”

Remove FLKR Ransomware and Restore Encrypted Files

In order for you to make sure that FLKR ransomware is fully gone from your computer you will need to isolate this malware before actually removing it. You can do the removal either manually or automatically by following the instructions underneath. Be advised that if manual removal is not something you feel confident in doing, security experts always recommend automatic removal of this virus by using an advanced anti-malware software. It will help you to remove this malware from your computer completely and make sure that real-time protection is ensured against future intrusive software.

If you want to restore files, that have ben encrypted by this ransomware virus, we recommend that you try out the alternative methods for file recovery underneath in step

“2. Restore files, encrypted by FLKR Ransomware”

They have been created in order to help you try and recover as many encrypted files by this malware as possible.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share