.dcom Files Virus – Remove It

.dcom Files Virus – Remove It

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

.dcom Files Virus virus remove

What is .dcom files virus .dcom files virus is also known as .dcom ransomware and encrypts users’ files while asking for a ransom.

The .dcom Files Virus is a new ransomware infection which is being spread worldwide and using a variety of methods. At the moment there is no information about the hacker or criminal group behind it however we assume that they are experienced enough in order to cause a lot of infections. When the .dcom files virus is deployed onto the given system various effects can be presented — computer settings modifications, data retrieval and etc. The main goal of these threats is to encrypt sensitive user data according to a list of target file type extensions and rename them with the .dcom extension. A ransomware note is created in a text file to blackmail the victims into paying the hackers.

Threat Summary

Name.dcom files virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer machine and demands a ransom to be paid to allegedly restore them.
SymptomsThe ransomware will blackmail the victims to pay them a decryption fee. Sensitive user data may be encrypted by the ransomware code.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .dcom files virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .dcom files virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.dcom Files Virus – Detailed Description

The .dcom files virus is a new ransomware threat which is being spread by an yet unknown hacker or criminal group. The distribution is likely being done using popular methods that attempt to infect users on a global scale. This is mainly done via email SPAM messages that appear as being sent by legitimate and well-known companies. They contain contents that may be stolen or appear as safe. The other mechanism which is used by hackers is to create phishing sites that are promoted as Internet portals.

In certain cases the .dcom files virus installation can be embedded in file carriers which can take many forms. A popular approach is to send out macro-infected documents that prompt the users into enabling the scripts when the files are opened. The other carrier can be a malicious application setup package of tools that are often downloaded by end users. They can be spread using the above-mentioned methods and also via file-sharing networks such as BitTorrent. The .dcom files virus can also be deployed by malicious web browser plugins that are uploaded to their respective repositories with fake user reviews and developer identities.

Whatever the infection method once the .dcom files virus infection is active onto a given host the main engine will call for the intended components to be run. One of the first actions that are done is the data harvesting process — the ransomware will look out for strings that can identify individual users and the affected machines. This can be used for various crimes including identity theft and financial abuse. The collected information may be used to bypass security services that include anti-virus programs, firewalls, intrusion detection engines and virtual machine hosts.

When this step has completed the .dcom files virus may launch various system changes in order to impact the systems. A popular approach is to make the .dcom files virus start automatically as soon as the computer is powered on. This is called a persistent installation and it many cases it will also block access to the recovery boot options.

Other changes may include modifications to the Windows Registry which leads to severe performance issues, the inability to start certain services and potential data loss.

Advanced versions can be used to deploy other threats including trojans, hijackers and miners. At the point of execution of the encryption phase target user data will be encrypted with a strong cipher — the hackers will target common data such as the following: multimedia files, archives, databases, backups and etc. All victim data will receive the .dcom extension. The crafted text file will blackmail the users into paying the hackers a decryption fee.

.dcom Files Virus – What Does It Do?

The .dcom Files Virus is a crypto virus programmed to encrypt user data. As soon as all modules have finished running in their prescribed order the lockscreen will launch an application frame which will prevent the users from interacting with their computers. It will display the ransomware note to the victims.

You should NOT under any circumstances pay any ransom sum. Your files may not get recovered, and nobody could give you a guarantee for that.

The .dcom Files Virus cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

If your computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore your files back to normal.

Remove .dcom Files Virus

If your computer system got infected with the .dcom Files ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share