.HeroesOftheStorm File Virus - Removal and Restore Guide

.HeroesOftheStorm File Virus – Removal and Restore Guide

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

logo of the game heroes of the storm .HeroesOftheStorm File Virus sensorstechforum

The .HeroesOftheStorm file virus aims to establish its malicious files on a system, encrypts important data and then blackmails victims into playing the game Heroes of the Storm 24 hours. The threat is classified as a ransomware that is based on the open source code of the project HiddenTear. However, playing Heroes of the Storm does not guarantee decryption of corrupted .HeroesOftheStorm files. Being a ransomware, it is likely to demand a ransom payment for the decryption key.

This article provides more information about .HeroesOftheStorm file virus and guides you through the removal process so you can restore PC and regain corrupted files.

Threat Summary

Name.HeroesOftheStorm file virus
TypeRansomware, Cryptovirus
Short DescriptionEncrypts target files on the infected computer. Demands 24 hours playing on Heroes of the Storm game.
SymptomsThe ransmware drops a ransom note that is contained in the What is it?.txt file.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .HeroesOftheStorm file virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .HeroesOftheStorm file virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Does .HeroesOftheStorm Land on the PC?

The .HeroesOftheStorm file virus author can use different methods to distribute the payload. The preferred infection vector is considered to be the spam email messages. Such emails allow hackers to pose as legitimate organizations that are pretending to deliver valuable information that should be seen. Once the email is opened, it may present a message that urges you to click on a web link or download a file attachment. And if you do follow the instructions your PC will get infected with .HeroesOftheStorm file virus. Instant message services can also be used for the distribution of malicious links that lead to web pages with injected malware code.

How Does .HeroesOftheStorm File Virus Corrupts Data?

Being based on the Hidden Tear open source code, this data locker ransomware utilizes the strong AES cipher for data encryption. Like other ransomware based on HiddenTear (ZenCrypt, Unikey, Barrax) .HeroesOftheStorm can seek to encrypt frequently used files of the following types:

→ .txt, .doc, .docx, .xls, .xlsx, .pdf, .pps, .ppt, .pptx, .odt, .gif, .jpg, .png, .db, .csv, .sql, .mdb.sln.php, .asp, .aspx, .html, .xml, .psd, .frm, .myd, .myi, .dbf, .mp3, .mp4, .avi, .mov, .mpg, .rm, .wmv, .m4a, .mpa, .wav, .sav, .gam, .log, .ged, .msg, .myo, .tax, .ynab, .ifx, .ofx, .qfx, .qif, .qdf, .tax2013, .tax2014, .tax2015, .box, .ncf, .nsf, .ntf, .lwp

It then renames all corrupted files with .HeroesOftheStorm extension. The .HeroesOftheStorm files remain completely unusable until the decryption key is applied to the decryptor. Have in mind that many HiddenTear variants have been cracked by security researchers so there is chance that they will release freely available decryptor soon. Meanwhile, you can try to recover .HeroesOftheStorm files with the help of any alternative data recovery tool provided in the instruction at the end of the article.

How Does .HeroesOftheStorm File Virus Damage the PC?

The file restolocker.exe triggers the ransomware attack once it is running on the system. The malicious executable file can initiate various changes of the system settings. To ensure its persistent presence on the PC .HeroesOftheStorm ransomware can add or modify values in the Windows Registry. The registry keys Run and RunOnce are the main two that are targeted by crypto viruses as they manage all processes that need to be started when the Windows operating system is loaded.

Another frequent target of ransomware is the Shadow Volume Copies that can serve as a backup option in case of data loss. They are automatically created and stored in the system by default. So usually the ransomware accesses the Command Prompt and enters the following command line to erase all Shadow Volume Copies:

→ vssadmin.exe delete shadows /all /quiet

At the end of the attack when all target files are encrypted and marked with the extension .HeroesOftheStorm the threat drops a ransom note file called What is it?.txt on the Desktop. It reads the following:

Hi. I encrypted your personal files.
Heroes Of The Storm is the god game. But, people don’t know that.
So, I made this program that make people to play Heroes Of The Storm.
To dectrypt your files, follow this procedure. First, You have to install Heroes Of The Storm. Second, Play Heroes Of The Storm 24hours. (Only Play Time Will Be Recorded)
NOW, Let’s play the King God Emperor General Chungmoogong Majesty Game HEROES OF THE STORM
*Warning* Do NOT KILL This Program and Computer.

In addition the .HeroesOftheStorm crypto virus can replace the desktop wallpaper with the following image:

.HeroesOftheStorm file virus ransom note image sensorstechforum

According to the ransom message attackers‘ demand from you to install Heroes of the Storm and play the game 24 hours. Eventually, after completing the challenge all .HeroesOftheStorm will be decrypted. However, there is no guarantee this will happen as it seems that the threat is in development. Even if it does, all ransomware files and objects remain on the machine. Thus on the next boot up, all your files can be encrypted again. Then hackers will be able to extort a ransom in Bitcoins from you.

Remove .HeroesOftheStorm File Virus and Restore Data

The .HeroesOftheStorm File Virus should be eliminated as soon as possible from the infected system. Otherwise, it has the chance to spread itself to all devices that are connected to the same network as the infected machine. The detailed guide below provides .HeroesOftheStorm ransomware removal instructions. After the removal backup all encrypted files and check step “Restore files encrypted by .HeroesOftheStorm file virus” for alternative data recovery solutions.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share