.locked_by_mR_Anonymous(TZ_HACKERS) Files Virus - Remove
THREAT REMOVAL

.locked_by_mR_Anonymous(TZ_HACKERS) Files Virus – Remove

This article will help you to remove the .locked_by_mR_Anonymous(TZ_HACKERS) File Virus (Jigsaw) fully. Follow the ransomware removal instructions given at the end of the article.

The .locked_by_mR_Anonymous(TZ_HACKERS) File Virus is a part of the Jigsaw ransomware family. The cryptovirus uses the source code of the original one to a great extent. Jigsaw has a list with around 126 file extensions that seeks to encrypt. All of the files which will get encrypted will receive the extension .locked_by_mR_Anonymous(TZ_HACKERS) appended to them. Afterward, a ransom note message will be displayed demanding a ransom sum for a supposed file restoration. The ransom note is written in English for its majority, but there is also a Czech part.

Threat Summary

Name.locked_by_mR_Anonymous(TZ_HACKERS)
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware will encrypt your files and display a screen with the ransom note, which is written in English and Czech languages.
SymptomsThe ransomware will encrypt files by placing the .locked_by_mR_Anonymous(TZ_HACKERS) extension to all of them.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .locked_by_mR_Anonymous(TZ_HACKERS)

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .locked_by_mR_Anonymous(TZ_HACKERS).

.locked_by_mR_Anonymous(TZ_HACKERS) File Virus (Jigsaw) – Spread

Jigsaw ransomware could infect computers using different methods for spreading that infection. Spam e-mails could be spreading its payload dropper. Those types of emails will try to convince you that something important is attached as a file to that e-mail. In actuality, the attachment will look like a legitimate document or one that is archived, but it is a file containing a malicious script. If you open that file, it will launch the payload for the ransomware. You can preview the analysis of one such file on the VirusTotal service:

Jigsaw ransomware might be using other methods for spreading, like putting the payload file dropper via social media and file-sharing sites. Freeware applications which roam the Internet could be presented as useful but also could hide the malicious files of this virus. Refrain from opening files after you download them, especially if they come from unverified sources, such as links and e-mails. First, you should scan these files with a security tool, and also make sure to check their sizes and signatures for anything that seems unusual. You should read the ransomware preventing tips topic in the forum.

.locked_by_mR_Anonymous(TZ_HACKERS) File Virus (Jigsaw) – Overview

The Jigsaw ransomware ransomware virus keeps on appearing on the radar of malware researchers. When the Jigsaw virus is executed, it will modify an existing entry in the Windows Registry or create a new one to achieve persistence. That registry entry makes the malware to automatically execute with each boot of the Windows operating system. Afterward, your files will get encrypted, and receive the same extension.

What comes next is a window popping up on your screen that shows the picture of a Guy Fawkes mask with the ransom message instructions. The ransom note is written in English for its majority, but there is also a Czech part.

You can preview it in the following screenshot:

The ransom note message states the following:

I want to piay a game with you. Let me expiain the ruies:
Sina mda wa kutheza inshort data zako zote ziko deieted. Your photos, videos, documents, etc…
But, don’t worry! Utapata data zako endapo ukifuata maeiekezo.
data zako zote ziko iocked by Us hivo uwezi kuzifungua hata ukibadiii extension,HIVD BASI…
Every hour I seiect some of them to deiete permanentiyg
therefore I won’t be abie to access them, either.
Are you famiiiar with the concept of exponentiai growth? Let me heip you out.
It starts out siowiy then increases rapidiy.
During the first 24 hour you wiii oniy iose a few fiies,
the second day a few hundred, the third day a few thousand, and so on.
If you turn off your computer or try to ciose me, when I start next time
you wiii get 1000 fiies deieted as a punishment.
Yes you wiii want me to start next time, since I am the oniy one that
is capabie to decrypt your personai data for you.
HIMWD BASI TUNA 30000TSH KWENYE NAMBA UTAZQZIPATA KWENYE EMAIL YETU HII tanzaniahackersflprotonmaii.ch
kitu kingine endapo ukiscan fiies hizi haisadii baii itaongeza possibiiity ya kupoteza stuffs zako
hiyo basi usiguse fiie au ku edit extensionS haitosaidia na data zako hazitorud endapo tukikupa UNLOCKER
Nakupa 2 hours UKICHELEWA UR STUFFS HUTDZIF’ATA NA HATUTAKUW.A NA SERVICE NA L‘JEL‘.’E.
Ukizima PC utakuwa umejiua mwenyewe fuata maeiekezo__ALL THE BEST.
Now, iet’s start and enjoy our iittie game together Cheers!

Jigsaw (.locked_by_mR_Anonymous(TZ_HACKERS) File Virus) tries to manipulate to paying a ransom sum, by stating that it will delete files from your PC every hour until you pay and there is nothing else that you can do to prevent that. But you should NOT under any circumstances pay the ransom sum. Supporting cybercriminals is a bad idea as that will only motivate them to do more criminal acts.

.locked_by_mR_Anonymous(TZ_HACKERS) File Virus (Jigsaw) – Encryption

A decrypter tool might be made to decrypt files locked by this ransomware threat in the near future.

In case the cryptovirus follows the encryption process of the original ransomware, the list with 126 file extensions that will become encrypted will look like the following:

→.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as.txt, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .dxf.c, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .zip

The list with the file extensions for encryptions will be updated with if new information is found about it. The encrypted files will have the .locked_by_mR_Anonymous(TZ_HACKERS) extension appended to them, after their file name.
The Jigsaw ransomware could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

In case the command stated above is executed that would make the encryption process even more efficient as it will eliminate one of the possible ways for restoring your data. If your computer machine was infected with this ransomware and your files are locked, read on through to find out how you could potentially recover your data.

Remove Jigsaw Ransomware and Restore .locked_by_mR_Anonymous(TZ_HACKERS) Files

If your computer got infected with the Jigsaw ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Tsetso Mihailov

Tsetso Mihailov

Tsetso Mihailov is a tech-geek and loves everything that is tech-related, while observing the latest news surrounding technologies. He has worked in IT before, as a system administrator and a computer repair technician. Dealing with malware since his teens, he is determined to spread word about the latest threats revolving around computer security.

More Posts

1 Comment

  1. Sam

    Thats not czech language…

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...