Decrypt .anon Encrypted Files for Free (Update May 2017)

This article aims to help you decrypt files encrypted by FuckTheSystem ransomware using the .anon file extension for free and easily.

Another ransomware virus from the “Stupid” ransomware family has been reported to infect unfortunate users. The virus uses the .anon file extension and has the same pop-up screen as other viruses from it’s family, like the .haters virus. In case you have become a victim of this ransomware infection, we strongly advise you to read the material below. It will assist you in completely removing the ransomware and recovering files encrypted with the .anon file extension appended to them.

Threat Summary

Name

.anon virus

TypeRansomware
Short DescriptionVariant of “Stupid Ransomware”. Encrypts files and then displays a pop-up asking for decryption.

SymptomsChanges the file extension to .anon and opens a pop-up with a message stating the files are encoded.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .anon virus

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss .anon virus.

.anon Ransomware – More Information

Also known as FuckTheSystem ransomware, this virus is a part of the Stupid Ransomware family of encryptors. It’s primary goal is to scare victims into paying a hefty ransom fee to encrypt their files.

The virus is distributed most likely via spam e-mail campaigns as well as other methods, such as uploading fake setups online, malicious web links, infections via exploit kit’s as well as fake key generators or torrents.

Once the victim is infected, .anon ransomware drops a malicious executable, named Crypto.exe and may modify the Windows Registry Editor so that it runs on system start up.

Upon running, the encryptor will hunt down and encrypt documents, images, audio files, database files, archives, video files and many other often used file types. The extension added after the encryption is .anon and the encrypted files look like the image below:

After the encryption, the virus drops the following ransom note:

Fortunately, this ransomware infection is decryptable and in order to remove it and decrypt your files for free, follow the instructions below.

Remove .anon Virus

Before the actual decryption takes place, we strongly suggest you to remove .anon ransomware using the instructions below. In case manual removal is a challenge for you, security experts always recommend using an advanced anti-malware software to remove the malware automatically and protect your computer in the future as well.

Manually delete .anon virus from your computer

Note! Substantial notification about the .anon virus threat: Manual removal of .anon virus requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove .anon virus files and objects
2.Find malicious files created by .anon virus on your PC

Automatically remove .anon virus by downloading an advanced anti-malware program

1. Remove .anon virus with SpyHunter Anti-Malware Tool and back up your data

After having removed the malicious files of FuckTheSystem Ransomware, it is time to decrypt the encoded ones.

Decrypt .anon Files for Free

Step 1: For the decryption process of JeepersCrypt ransomware to be successful, first you need to download StupidDecrypter by demonslay335 by clicking on the button below:

Download

StupidDecrypter

Step 2: After downloading it, extract it from the archive and then run the decryptor as an administrator:

After this, select directories with encrypted files and click on the “Decrypt” button which will turn bold black once directories are selected:

After this has completed, the program will ask you if you want to perform a copy process of the encrypted files and it is advisable to make such copies in a separate folder, just in case.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.