Decrypt Files Encrypted by .FailedAccess Ransomware - How to, Technology and PC Security Forum | SensorsTechForum.com

Decrypt Files Encrypted by .FailedAccess Ransomware

Article created to help you completely remove the .FailedAccess file virus and decrypt files encrypted by it for free.

Yet another variant of “Stupid” ransomware family has appeared out in the wild, this time using the .FailedAccess file extension. The virus has a goal to encrypt the files on computers that have been compromised by it after which leave behind a ransom note file notifying victims to pay a hefty ransom fee in order to restore files encrypted by this ransomware infection. Fortunately, the FailedAccess ransomware is part of the family of Stupid ransomware which is decryptable. In case you have become a victim of this virus, we advise following the instructions on this article to remove the virus and restore .FailedAccess encrypted files from your computer.

Threat Summary

Name

FailedAccess

TypeRansomware
Short DescriptionEncrypts important documents, music, video, images and other files and then demands a ransom to be paid to get the files back.

SymptomsThis ransomware uses the .FailedAccess file extension which is added to the encrypted files.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by FailedAccess

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss FailedAccess.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.FailedAccess Virus – Infection Process

The .FailedAccess threat may cause an infection by carefully utilizing multiple different types of techniques, such as:

Trojan.Dropper.
Trojan.Downloader.
Exploit kits.
JavaScript.
Malcious MicrosoftOffice macros.

These techniques may be used in multiple different types of situation, such as sending spam e-mails to users. Such spam e-mails may include the usage of legitimate e-mail addresses that are not flagged as spam, to spread messages to users with convincing statements to open the e-mail attachments. Two examples of such e-mails, oje using a malicious attachment and the other using a URL can be seen below:

In addition to being spread via e-mail, the FailedAccess ransomware virus may also cause infection via fake setups as well as other fake software uploaded on suspicious websites or torrent-providers.

.FailedAccess File Virus – Infection Activity

As soon as the victim of .FailedAccess ransomware clicks on the web link, the virus may connect to the C2 server or a distribution site. From there, the payload of the ransomware is downloaded and may reside within the following Windows folders:

  • %AppData%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %SystemDrive%
  • %Windows%
  • %System32%

The ransomware infection may also tamper with the Windows Registry editor, modifying the following keys:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

After having changed different settings, .FailedAccess ransomware may begin to encrypt user files.

FailedAccess Virus – Encryption Process

The encryption process of FailedAccess may target, documents, photos, music and many other file types:

“PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”Source:fileinfo.com

As soon as the virus detects the file extensions, which it is pre-configured to encode, the ransomware immediately begins to change blocks of their data. After the encryption is complete, the virus adds the .FailedAccess file extension, making the files appear like the image below:

Fortunately, files encrypted with this extension, can be decrypted as researcher demonslay335 has updated the decryptor for all Stupid Ransomware variants know so far.

Remove .FailedAccess Virus

Before you begin decrypting the .FailedAccess encoded files, it is advisable to first get rid of this threat. One very good method to do it, is to follow the removal instructions underneath. They are carefully designed to help you isolate and then remove all the malicious objects. However, since the .FailedAccess ransomware heavily interferes with Windows registry entries and files, it is strongly advisable to focus on removing this threat automatically. The best recommended tool to do this with is an advanced anti-malware program which will also ensure future protection in the meantime.

Manually delete FailedAccess from your computer

Note! Substantial notification about the FailedAccess threat: Manual removal of FailedAccess requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove FailedAccess files and objects
2.Find malicious files created by FailedAccess on your PC

Automatically remove FailedAccess by downloading an advanced anti-malware program

1. Remove FailedAccess with SpyHunter Anti-Malware Tool and back up your data

Decrypt .FailedAccess Files for Free

Step 1: For the decryption process of FailedAccess ransomware to be successful, first you need to download StupidDecrypter by demonslay335 by clicking on the button below:

Download

StupidDecrypter

Step 2: After downloading it, extract it from the archive and then run the decryptor as an administrator:

After this, select directories with encrypted files and click on the “Decrypt” button which will turn bold black once directories are selected:

After this has completed, the program will ask you if you want to perform a copy process of the encrypted files and it is advisable to make such copies in a separate folder, just in case.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...