This article explains the issues that occur in case of infection with .like files virus and provides a complete guide on how to remove malicious files and how to potentially recover files encrypted by this ransomware.
The so-called .like files virus is identified to be data locker ransomware that belongs to Dharma threat family. Its main goal is to encode valuable files stored on infected devices with the help of sophisticated cipher algorithm. Afterward, hackers become able to extort ransom payment from victims who want to obtain the decrypter. In case of infection with this ransomware, all your important files could be renamed with the extension .like. This is a sure sign that their content cannot be accessed until their original code is restored.
|Name||.like Files Virus|
|Short Description||A data locker ransomware that utilizes strong cihper algorithm to encrypt files ostored on infected devices. Following data encryption, it demands a ransom payment for decryption solution.|
|Symptoms||Important files are corurpte and renamed with .like extension. A ransom message appears on screen to extort a ransom payment.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by .like Files Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .like Files Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.like Files Virus – Distribution
Security researchers reported that hackers are currently spreading this .like Dharma ransomware strain. Its distribution campaigns could be set against users worldwide.
It is most likely that the infection payload of .like files virus is spread with the help of malspam campaigns. E-mails that belong to these campaigns could contain one or more of the following components:
- A link that lands on compromised web page set to download and execute the infection file directly on the PC. It may be presented as in-text link, banner, image, button or direct URL address.
- A malicious file attachment that according to email text is a legitimate document. It could be uploaded in a .rar or .zip archive. Such a file could be set to evade active security measures and trick you into running the ransomware on your PC.
In addition, fake software installers, fake update notifications, compromised software setups, files shared on forums and other techniques may download and activate the ransomware module.
Variants ofSkype viruses may be also part of the distribution scheme of .like files virus. By exploiting some security flaws of the software hackers could deliver their malicious code directly through this channel.
.like Files Virus – Overview
The .like files virus is a threat designed to compromise computer systems and encrypts valuable data stored on them. It has been identified to be a strain of the infamous Dharma ransomware.
In case of infection with this ransomware your system will be heavily damaged by the changes it applies. When loaded on the system, the payload file of the so-called .like files virus initiates a sequence of malicious activities that lead the attack through several infection stages.
First of all .like files virus should find a way to establish all needed malicious files and objects on the device. For the purpose it could be either connect to its command and control server and download the files or create them directly on the system. Several system directories are likely to store harmful files associated with the ransomware:
Analyses of .like files virus reveal that some of its associated files manipulate functionalities of legitimate system processes in an attempt to perform malicious activities without being detected by active security and analysis components.
As detected another issue caused by the ransomware is the automatic load of malicious scripts and applications on each system start. How this becomes possible is via certain changes of registry values. Since Run and RunOnce registry sub-keys have the functionality to auto-execute all files and objects set under them, they could be compromised by .like Dharma virus.
These sub-keys are used when the virus wants to load its ransom note on the screen. The note is dropped during the infection process. The note could be copied several times so that it could appear on your desktop as well as in folders with corrupted files. Its message is likely to urge you to contact hackers at [email protected] so that they can send you details about the ransom payment process.
.like Files Virus – Encryption Process
Like some previous Dharma ransomware versions (.combo, .arrow, .bkp, etc.) Dharma .like crypto virus aims to utilize its built-in encryption module as it completes the primary infection stage.
This module could be set to utilize a single cipher algorithm or a combination of two cipher algorithms. One of these algorithms is considered to be the AES. Following encryption, valuable files become inaccessible due to essential changes of their code. Unfortunately, all of your important files could be affected by the ransomware including all your:
- Audio files.
- Image files.
How all corrupted files could be recognized is by the distinctive extension .like as it appears at the end of their names. Your access to information stored by .like files remains restricted and hackers attempt to blackmail you into paying them a ransom for their decrypter. However, there is no guarantee that they could provide you a working solution as the code of their threat could be broken.
Remove .like Files Virus (Dharama Ransomware) and Restore Data
Below you could find how a step-by-step removal guide that may be helpful in attempting to remove .like Dharma ransomware. The manual removal approach demands practice in recognizing traits of malware files. Beware that ransomware is a threat with highly complex code that plagues not only your files but your whole system. So it should be secured properly before it could be used regularly again.
The automatic approach enables you to check the infected system for ransomware files and remove them with a few clicks after the scan. Reliable anti-malware program is also one of the best ways to protect the PC from ransomware. Additional security layer that will prevent you from ransomware attacks isanti-ransomware tool.
If you want to understand how to fix .like files without paying the ransom make sure to read carefully all the details mentioned in the step “Restore files” from the guide below. Beware that before recovery process you should back up all encrypted files to an external drive in order to prevent their irreversible loss.