.Alcohol Files Virus – How to Remove It and Decrypt Files for Free

.Alcohol Files Virus – How to Remove It and Decrypt Files for Free

This article has been created to help you by explaining how you can remove the .Alcohol variant of GlobeImposter ransomware and how to restore files that have been encrypted by virus.

A new variant of GlobeImposter ransomware has been reported to append the .Alcohol file extension to the files that have been encrypted by it. The ransomware aims to download and install multiple different malicious files which encrypt the important documents on your computer. This ultimately results in the .Alcohol files virus making the files no longer able to be opened after which the ransomware drops a ransom note file, called how_to_back_files.html with the classic GlobeImposter ransom note. If your computer has been infected by this variant of GlobeImposter ransomware we advise that you read this article and learn how to remove this GlobeImposter version and decrypt .Alcohol encrypted files without having to pay ransom.

Threat Summary

Name.Alcohol Files Virus
TypeRansomware, Cryptovirus
Short DescriptionA variant of the GlobeImposter virus. Encrypts files and asks victims to pay ransom.
SymptomsChanges the files to the file extension .Alcohol. Adds an .html ransom note file.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .Alcohol Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .Alcohol Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

GlobeImposter .Alcohol Virus -Distribution

The .Alcohol files variant of GlobeImposter ransomware infection has the one and only purpose to infect your PC unobstructed and then encrypt your files. To reac it’s end goal, the malware may use various different types of spam e-mails. Such e-mails often contain malicious e-mail attachments which only pose as the legitimate files, like receipts, banking statements or invoices. It is also possible that you may encounter fake e-mails from big companies, like PayPal, eBay, DHL, Amazon and others. In addition to this, the e-mails may also contain malicious web links which pose as fake buttons, but lead to an automated infection process, for example:

Besides via e-mail, you may also become a victim of the .Alcohol variant of GlobeImposter ransomware as a result of having to open the malicious file after downloading it from online software-providing website with low reputations. Such programs pretend to be:

  • Fake installers of freeware.
  • Portable free programs.
  • Cracks.
  • Patches for software.
  • Licence activators.
  • Key generators for programs.

.Alcohol GlobeImposter Ransomware – Activity

The .Alcohol files virus is the type of virus, belonging to the ransomware kind, meaning that it aims to get your files to no loger be able to be opened, at least until you pay the crooks behind it in BitCoin. To reach it’s goal, the malware may drop a malicious executable, which may reside in the following Windows directories under a different, often random name:

  • %AppData%
  • %Local%
  • %Roaming%
  • %LocalLow%
  • %Temp%
  • %SystemDrive%

Once the malicious fiels of this GlobeImposter version are dropped on the victim PC, the ransomware also drops it’s ransom note file, called how_to_back_files.html. The ransom note appears like the following and asks victims to send 1 file to the crooks via e-mail:

After the malicious files are dropped, the GlobeImposter virus may also create values in the following registry sub-keys on victims’ computers:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

The sub-keys are responsible for automatically running the malicious files of this ransowmare on the victim’s computer when he or she logs in Windows.

.Alcohol GlobeImposter Ransomware – Encryption Process

To encrypt the files on the computers that have been infected by it, the .Alcohol GlobeImposter ransowmare may first scan for the files it wants to render no longer usable. The virus may look for often used types of files, such as:

  • Documents.
  • Videos.
  • Images.
  • Archives.
  • Virtual Drives.

In addition to this, the virus may also skip encrypting files in important folders of Windows, in order for victims to still be able to use their computer. Naturally, the encrypted files have the .Alcohol file extension added to them and they no longer look the same:

Remove .Alcohol Files Virus and Restore Encrypted Data

In order to make sure that this variant of GlobeImposter ransomware is gone from your computer, we strongly advise that you follow the removal instructions underneath. If manual removal does not work for you or you lack the experience in performing it, it is strongly reccomended to remove the .Alcohol files virus automatically with the aid of an advanced anti-malware software. According to security experts, such software aims to fully erase all of the related files and objects to .Alcohol ransomware and then ensure that your computer is fully protected against these types of malware and other intrusive software in the future.

If you want to decrypt the .Alcohol encrypted files and use them again, be advised that you are extremely lucky, because most GlobeImposter ranosmware variants are decryptable. After the removal instructions you can find a download link to Emsisoft’s decryption tool for GlobeImposter ransomware viruses.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share