.fartplz Ransom Virus (Restore Files) - How to, Technology and PC Security Forum | SensorsTechForum.com

.fartplz Ransom Virus (Restore Files)

This article is created to help you remove the .fartplz ransomware virus and restore files that have been encrypted by it.

A ransomware virus, known as the funny extension it uses (.fartplz) has been reported to be out in the wild and cause infections to unsuspecting users’ computers. The ransomware encodes files by using the AES encryption algorithm and then leaves a ransom note with instructions on how to pay 2.5 BTC to the cyber-criminals so they can eventually restore the encrypted files. In case you have become a victim by the .fartplz file extension ransomware it we recommend reading the following material.

Threat Summary


.Fartplz Virus

Short DescriptionEncrypts files on compromised systems after which demands 2.5 BTC ransom payoff and 30 BTC payoff for a multiple affected computers in an enterprise.

SymptomsFiles encrypted with the added file extension .fartplz.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .Fartplz Virus


Malware Removal Tool

User ExperienceJoin our forum to Discuss .Fartplz Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.fartplz Ransomware – Infection Process

Regarding the infection process of .fartplz ransomware infection, the virus may spread via different methods. The primary one of them is sending the infection files which are intermediary malware via e-mail. Such intermediary malware are either droppers, downloaders or other malicious files. Such may be posing as legitimate documents or other types of invoices, receipts or letters in the spam e-mails, similar to what the example below displays:

Other methods of replicating this malware may also include the usage of fake updates of Java or Adobe programs, fake Windows updates, via a previous Trojan infections or via malicious torrent files.

The .fartplz Ransomware – Activity

After infection by this ransomware infection, it may connect remotely to a command and control server and distribution site, where the virus may download the payload. It may consist of several files which could be located in the following places under different names:

Then, the .fartplz infection may modify the Windows registry entries on the victim’s computer to run the file encryption on system boot. To do this, the following Windows registry keys are targeted:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

The .fartplz ransomware may also delete Windows backups and disable Windows recovery service with the bcedit and vssadmin commands:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

.Fartplz File Ransomware – The Encryption

This ransomware infection may target multiple different types of files for encryption. Among them may be documents, music, videos, pictures and other file types. The file extensions may be in the hundreds and may vary, for example:


After encryption, the files appear like the following:

The algorithms for the encryption employed by this .fartplz extension ransomware may be the following:

  • Rivest-Shamir-Adleman also known as RSA with a bit strength of 2048. (strongest stable)t
  • Advanced Encryption Algorithm also known as Rijndael with a bit strength of 256. (strongest stable)

An encryption process conducted by this virus may look similar to the following graphic:


The final step for .fartplz ransomware infection is to drop a ransom note, named ReadME_Decrypt_Help_{uniqueID}.html:

“All of your files locked and protected by a strong encryption with and ciphers.
More information about the RSA and AES can be found here:
In summery you can‘t read or work with your files, But with our help you can recover them.
It’s not possible to recover your files without private key and our unlocking software
How to get private key or unlocking software?
You must send us ( per affected computers) OR ( for all affected computers) to receive private key and unlocking soflware-
Our Bitcoin wallet is available in our site”

Remove .fartplz Ransomware and Restore Files

For the removal of .fartplz ransomware infection, recommendations are to focus on following the removal instructions below. They are specifically designed to help you remove this ransomware infection from your computer. In case manual removal represents a challenge, security experts strongly recommend users to download and install an advanced anti-malware tool. It will professionally take care of the .fartplz ransomware infection, while in the same time protect your computer In the future.

But, bear in mind that the files are non decryptable yet. This is why you can try the alternative tools for file recovery in step “2. Restore files encrypted by .fartpls Virus”.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share