.pain Files Virus - Remove It and Restore Files

.pain Files Virus – Remove It and Restore Files

.pain Files Virus - Remove It and Restore Files sensorstechforum com

This article provides information about a data locker ransomware dubbed .pain files virus that encrypts important files and demands a ransom payment. By the end of it you will know how to remove the threat and how to restore .pain files.

The ransomware that is known to append the extension .pain to all files it corrupts restricts the access to important data until victims transfer the demanded ransom amount to hackers’ digital wallet. According to the ransom message it displays, victims should contact hackers at pain@cock.lu to receive further details how to pay the ransom and obtain the decryption key.

Threat Summary

Name.pain Files Virus
TypeRansomware, Cryptovirus
Short DescriptionA ransomware threat that encrypts important files stored on the infected host and then demands a ransom for thier decryption.
SymptomsYour important files are encoded with strong encryption algorithm. They all have the extension .pain appended at the end of their names. A ransom payment is needed for their decryption.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .pain Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .pain Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.pain Files Virus – Update June 2018

A decryption tool for this ransomware has been released. The malware researcher Michael Gillespie has discovered that .volcano Files Virus is a variant of EverBe ransomware and has updated the decryptor. You can download the decrypter from the following link, wrapped inside a .zip archive: Decryption Tool. You need an encrypted file along with its original and the files can be decrypted even if their size is under 10 MB.

.pain Files Virus – Distribution

Distribution process of the executable file that triggers .pain crypto virus infection is likely to be performed with the help of several common methods preferred by hackers. The main one is believed to be email spam campaigns. As such emails could be easily designed to resemble legit ones hackers often choose them as a way of distribution of their malicious code. Such emails may impersonate representatives of well-known companies or even governmental institutions while the text messages may attempt to convince you to download and open a file attached to the email or visit a webpage presented as a link in the text.

If you want to keep your system secure be advised to use a free online file extractor before you open new file on your PC. Tools of this kind scan uploaded files for specific malicious traits. So after the scan, you could see whether the file you uploaded contains malicious components or not. This information could help you to avoid severe malware infections like .pain ransomware.

.pain Files Virus – Overview

This new ransomware dubbed .pain files virus is believed to be new version of Everbe threat that was reported by our team a week ago.

An infection with this ransomware leads to heavily modified system settings and corrupted important data. The attack begins after the ransomware payload is triggered on the system. Such files are likely to be able to create additional malicious files that support the infection process.

Malicious files could be developed to modify essential system settings in order to plague the system and ensure the ransomware a persistent presence on it. Some of them may access the Registry Editor and add some malicious values there. The functionalities of some of the keys in the Registry Editor could be used for the automatic execution of all ransomware files each time the Windows system is started.

At the end of the attack .pain crypto virus displays a ransom note on the PC screen. It is contained in a file named !=How_recovery_files=!.txt and the message it may depicts reads:

Hi !

If you want restore your files write on email – pain@cock.lu
In the subject write – id-*****{CODE}

Do not try to recover data, it’s wasting your time.
Every 7 days the price doubles.

It is highly recommendable to avoid any negotiations with them as they could attempt to steal additional sensitive data from you or even infect your system with other malware. Beware that the payment of the ransom doesn’t guarantee the efficient decryption of .pain files. Hackers could only steal your money and invest them into new attack campaigns and malware threats.

.pain Files Virus – Encryption Process

The primary goal of .pain files virus is to utilize strongs cipher algorithm that modifies the original code of predefined files which restricts your access to them. In case of infection it is likely that you will find the following files to be encrypted by this ransomware:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

Once encrypted the files are renamed with the extension .pain that stands at the end of their original names. There is one more extension associated with the same ransomware that could be placed before the extension .pain and it is .[pain@cock.lu] – the contact email left on the ransom note. So encrypted files may look like this one:

encoded .[pain@cock.lu].pain file sensorstechforum com

The information stored in corrupted files remains inaccessible until a working data restore solution is applied to them. At this point, there is no available free decrypter but hopefully, security researchers will release one soon. As soon as this happens we will update the content in this guide to inform you how to obtain and use the decrypter to restore all .pain files. Meanwhile, you could restore some important files with the help of alternative data recovery tools. Keep reading.

Remove .pain Crypto Virus and Restore Files

The removal of the so-called .pain crypto virus demands a bit of technical experience and ability to recognize characteristics of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Below you could find how to do it step by step. Beware that the ransomware is severe and it could plague your whole system. Security researchers recommend the help of advanced anti-malware tool for maximum efficiency. Such tool will keep you protected against devastating threats like .pain crypto virus as well as all other kinds of malware in future.

After you remove the ransomware make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for four years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share