.grinch file extension is placed on all of your files? .grinch Virus File is also known as Redrum ransomware which locks files on a computer and demands money to be paid as a ransom for unlocking them.
Redrum Ransomware (.grinch Virus File)
Redrum or otherwise known as .grinch Virus File is a ransomware type virus. It encrypts files by appending the .grinch extension to them, making them inaccessible. All encrypted files will receive the new extension as a secondary one. The Redrum ransomware drops a ransom note, which gives instructions to victims on how they can allegedly restore their data by paying a ransom fee.
Redrum Ransomware Virus
Redrum Ransomware will encrypt all types of files such as audio, video, pictures, backups, banking data and other personal user files found on a compromised computer system.
|Short Description||The ransomware encrypts files on your computer system and demands a ransom to be paid to allegedly recover them.|
|Symptoms||The Redrum ransomware will encrypt your files by appending the .grinch extension to them, along with a unique identification number placing the new .grinch extension as a secondary.|
|Ransom Demanding Note||decryption.txt|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by grinch Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss grinch Virus.|
.grinch Virus File – How Did It Infect My PC and What Happened?
.grinch Virus File might spread its infection via a payload dropper, which initiates the malicious script for this ransomware. The virus might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Read the tips for ransomware prevention from our forum.
Redrum ransomware has previous variants such as the original .Redrum Files Virus. The .grinch Virus File is ransomware that encrypts your files and shows ransomware instructions inside a ransom note called decryption.txt:
Beside the instructions you can see in the above image, there is a note that states the following:
FILES ARE ENCRYPTED:
All your documents, photos, databases and other important files have been ENCRYPTED! Do you really interested to restore your files?
If so, you must buy decipher software and private key to unlock your data!
Write to our email – email@example.com and tell us your unique [redacted 8 uppercase hex] We will send you full instruction how to decrypt all your files.
In case of no answer in 24 hours write us on additional e-mail address – firstname.lastname@example.org
FAQ FOR DECRYPTION YOUR FILES:
* WHATS HAPPENED ???
Your files are NOT DAMAGED! Your files have been modified and encrypted with strong cipher algorithm. This modification is reversible. The only way to decrypt your files is to purchase the decipher software and private key. Any attempts to restore your files with the third-party software will be fatal for your files, because would damage data essential for decryption !
Note !!! You have only 24 hours to write us on e-mail or all your files will be lost or the decryption price will be increased!
* HOW TO RECOVERY MY FILES ???
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decipher software and private key that will decrypt all your files.
* FREE DECRYPTION !!!
Free decryption as guarantee! If you don’t believe in our service and you want to see a proof, you can ask us about test for decryption. You send us up to 5 modified files. Use file-sharing service and Win-Rar to send files for test. Files
have to be less than 1 MB (non archived). Files should not be important! Don’t send us databases, backups, large excel files, etc. We will decrypt and send you your decrypted files back as a proof!
* WHY DO I NEED A TEST???
This is done so that you can make sure that only we can decrypt your files and that there will be no problems with the decryption!
* HOW TO BUY BITCOINS ???
There are two simple ways to by bitcoins:
Read this information carefully because it’s enough to purchase even in large amounts.
!!! ATTENTION !!!
!!! After 60 hours the price for your encryption will increase 10 percent each day
!!! Do not rename encrypted files.
!!! Do not try to decrypt your data using third party software, it may cause permanent data loss.
!!! Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
You should NOT under any circumstances pay any ransom sum.
The extortionists want you to pay a ransom for the alleged restoration of your files, same as with a lot of ransomware viruses. .grinch Virus File ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows system. All encrypted will receive the .grinch extension alongside a random generated one. That extension will be placed as a secondary one to each file and look something like .grinch. Audio, video, image files as well as documents, backups and banking data can be encrypted by the ransomware.
The .grinch Virus File could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:
→vssadmin.exe delete shadows /all /Quiet
If your computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore your files back to normal.
Remove .grinch Virus File
If your computer got infected with the .grinch Virus File, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.