.happyness Files Virus – How to Remove and Restore Your Data

.happyness Files Virus – How to Remove and Restore Your Data

This article aims to help you by explaining what is .happyness files virus and how to remove Happyness ransomware completely from your computer system.

A new ransomware infection has been detected out in the wild, going by the wrongly-spelled extension name .happyness. The ransomware infection aims to infect the computers of victims and encrypt the files on them with the help of a combination of AES and RSA encryption algorithms. After doing so, the ransomware virus drops a ransom note file on the infected computers’ desktop, called
HOW_TO_RECOVER_ENCRYPTED_FILES.txt which provides instructions on how to pay a hefty ransom fee in Bitcoin in order to restore files that have been encrypted by this ransomware virus. In the event that your computer has been infected by the .happyness files virus, we advise that you read the following article in order to learn how to remove it from your computer and how to restore files, encrypted with it’s extension added.

Threat Summary

Name.happyness Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the compromised computer system in order to hold them hostage until the victim pays a hefty ransom fee.
SymptomsFiles are encrypted with the file extension .happyness added to them and the ransom note
HOW_TO_RECOVER_ENCRYPTED_FILES.txt is dropped on the victim’s PC.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .happyness Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .happyness Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.happyness Files Virus – How Does It Infect

The primary method of infection which is used by this ransomware is via spammed e-mail messages which propagate through various different types of methods, including the usage of web links which are masked as fake buttons, like the example fake PayPal image below displays:

When the user is tricked and clicks on the button, a malicious script is activated which may automatically download and run a malicious file on the victim’s computer that triggers the infection. The same method goes if a malicious file has been uploaded as an e-mail attachment, since most malicious files contain JavaScript.

In addition to this, the .happyness ransomware may also be uploaded as a malicious file online, pretending to be a legitimate:

  • Setup of a program or game.
  • Setup of a system driver.
  • Key generator, patch or software license activator.

.happyness Ransomware – How Does It Work

Happyness ransomware is the type of malware which aims to perform various different types of activities such as download it’s payload after infection, which consists of the malicious executable file plus the ransomware’s ransom note. The malicious file of the .happyness files virus has been reported to be dropped in one of the system folders of Windows:

  • %AppData%
  • %Windows%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%

After the malicious files of the ransomware infection have been dropped on the victim’s computer, the malware may also drop it’s ransom note file and set it so that the victim can see it, for example, create copies on the desktop of the infected computer. The ransom note, is called HOW_TO_RECOVER_ENCRYPTED_FILES.txt and has the following message, as reported by researcher Michael Gillespie(https://pastebin.com/ZRpvRjsg):


Your personal ID

All your files have been encrypted due to a security problem with your PC.
To restore all your files, you need a decryption.
If you want to restore them, write us to the e-mail

In a letter to send Your personal ID (see In the beginning of this document).
You have to pay for decryption in Bitcoins.
The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
In the letter, you will receive instructions to decrypt your files!

In a response letter you will receive the address of Bitcoin-wallet, which is necessary to perform the transfer of funds.
HURRY! Your personal code for decryption stored with us only 72 HOURS!

Our tech support is available 24 \ 7
Do not delete: Your personal ID
Write on e-mail, we will help you!

Free decryption as guarantee
Before paying you can send to us up to 1 files for free decryption.
Please note that files must NOT contain valuable information and their total size must be less than 5Mb.
When the transfer is confirmed, you will receive interpreter files to your computer.
After start-interpreter program, all your files will be restored.

Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders are not compatible with other users of your data, because each user’s unique encryption key

The .happyness files virus has been reported to be a variant of the Matroska ransomware family, which released a variant back in July 2017 and just like it, the ransomware may execute the following commands in Windows Command Prompt:

→ process call create “cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures”

After this has been done the .happyness ransowmare may also perform various other activities, such as set automatic running of it’s malicious file on Windows boot by modifying the following Windows Registry sub-keys:


.happyness Ransomware – Encryption Process

In order to encrypt the files on the computers of victims, the .happyness files virus may use a combination of two main encryption algorithms – AES and RSA encryption. The AES cipher may be used in a variety of different methods, but researchers have reported the first 65 bytes of the files to be used and the first 300 bytes of the files are also encrypted via the RSA-4096 cipher, after which a unique decryption AES key is generated in the process of encrypting the resto of the targeted files. At the moment there is no direct decryption for this combination and this virus, and this is why most ransomware viruses use it. Furthermore, the .happyness ransomware also makes it so that only important files from the infected computers are encrypted, such as:

  • Documents.
  • Videos.
  • Images.
  • Audio files.
  • Other types of files.

After the encryption process has been done, the malware aims to set the .happyness file extension to the encrypted files, making them appear like the following:

Remove .happyness Ransomware and Restore Encrypted Files

In order to fully erase all traces of this ransomware infection, we advise you to follow the removal instructions down below. They are divided in manual and automatic removal instructions, so that they are appropriate based on your malware removal experience. In case you lack the experience in malware removal, experts recommend to download an advanced anti-malware software. It will make sure to scan automatically for all the malicious files and objects on your computer and secure your computer against future infections as well.

In order to try and restore files, encrypted by this ransomware virus, recommendations are to follow the alternative methods for file recovery down below in step “2. Restore files encrypted by .happyness Files Virus”. They are in no way fully effective against ransomware threats, but may help you to restore as many encrypted files as possible.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share