.jundmd@cock.li!! Files Virus - How to Remove It

[email protected]!! Files Virus – How to Remove It


with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by [email protected]!! Ransomware and other threats.
Threats such as [email protected]!! Ransomware may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This blog post has been created with the main purpose to explain how you can remove the [email protected]!! file extension ransomware and how to try and restore encrypted files.

Yet another ransomware variant was recently spotted by malware researcher Petrovic. The virus uses the [email protected]!! file extension which is appended to the encrypted files. The malware is from the cryptovirus type meaning that it is aimed at extorting victims by locking their files via encryption. The outcome of this is inability to open the files unless their file structure is decrypted for which the criminals want a ransom payment. If your comptuer was infected by the [email protected]!! files virus, we suggest that you read this article.

Threat Summary

Name[email protected]!! Ransomware
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the compromised computer and then ask victims to pay ransom in order to get them restored.
SymptomsFiles have the [email protected]!! file extension added to them.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by [email protected]!! Ransomware


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss [email protected]!! Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[email protected]!! Ransomware – Infection

For the [email protected]!! files virus to infect computers, the virus may be spread via multiple different and deceitful ways. The main one of those is to be replicated as a result of being uploaded online. Usually most ransomware viruses, like [email protected]!! tend to stay hidden as different types of files often sought for download by the average user, like:

  • Software cracks.
  • Activators.
  • Key generators.
  • Torrents.
  • Portable versions of programs.

In addition to this, the [email protected]!! ransomware may also come as an e-mail attachment, the main purpose of which could be to trick victims that it is an important file, like an invoice, recipe or a letter from their own bank.

[email protected]!! Ransomware – More Information

As soon as it has infected your computer, the [email protected]!! ransomware may drop files in the following Windows directories:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%

After doing that, the [email protected]!! ransomware virus may create multiple different types of files on the computers of victims. They are called modules and via these files, the [email protected]!! ransomware may perform the following actions:

  • Create mutexes.
  • Modify Windows Registries.
  • Obtain permissions.
  • Obtain system information.

To modify the registry editor, the [email protected]!! ransomware virus may create various types of value entries in the following Windows registry sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

In addition to this, the [email protected]!! files virus may delete the shadow volume copies of the infected machine via the following commands:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

[email protected]!! Ransowmare – Encryption Process

To encrypt files, the [email protected]!! ransomware may first scan for them, based on their file extensions and types. The malware is very clever as it skips encrypting data, located in system folders so you can still use your PC, but other than that it may look for documents, video files, images and other file types outside them. The extensions it scans for are the most commonly used ones, for instance:


To encrypt the files, the [email protected]!! ransomware may encipher portion of their data, using an encryption algorithm, like Salsa20, RSA or AES. The files are left behind, looking like the image below shows:

Remove [email protected]!! Files Virus and Try Restoring Files

If you want to remove the [email protected]!! files virus, we would suggest that you follow the removal instructions that are underneath this article. They have been created with the main idea to assist you in removing the malicious files of this virus either manually or automatically. In addition to this, the [email protected]!! file ransomware is the type of malware that has been created to remain persistent and it’s removal may be tricky. This is the main reason why researchers believe the most effective removal method is to use an advanced anti-malware software. It aims to automatically scan for and remove all files that are related to [email protected]!! ransomware and protect your PC against such threats in the future as well.

If you want to restore files, encrypted by the [email protected]!! files virus, we would suggest that you try the alternative methods underneath this article. They may not work for you at a 100% rate, but with their help, you might be able to recover some of your data.

Note! Your computer system may be affected by [email protected]!! Ransomware and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as [email protected]!! Ransomware.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove [email protected]!! Ransomware follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove [email protected]!! Ransomware files and objects
2. Find files created by [email protected]!! Ransomware on your PC

Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by [email protected]!! Ransomware

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share