.pleaseCallQQ Files Virus - How to Remove It and Decrypt Files (Free)
THREAT REMOVAL

.pleaseCallQQ Files Virus – How to Remove It and Decrypt Files (Free)

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by .pleaseCallQQ files virus and other threats.
Threats such as .pleaseCallQQ files virus may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

.pleaseCallQQ Files Virus Remove It Decrypt .pleaseCallQQ Files

This is an article that provides specific details on what happens in case of infection with .pleaseCallQQ files virus as well as a step-by-step removal for all harmful files and data decryption approaches.

The so-called .pleaseCallQQ files virus has been identified as an iteration of a two years old ransomware named Jigsaw. The main purpose of the threat remains the same – ransom extortion. For the purpose, it is designed to compromise computer systems and encrypt the code of valuable files. Its name is a derivative of the distinctive extension it appends to each encrypted file – .pleaseCallQQ. Upon encryption, all corrupted files remain inaccessible until the use of an efficient data recovery tool. This time hackers target primarily Chinese speaking users as revealed by the ransom message associated with their ransomware.

Threat Summary

Name.pleaseCallQQ files virus
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes strond cihper algorithm to encrypt files on stored on the infected computer. Then it demands a ransom for decryption solution.
SymptomsImportant files are locked and renamed with .pleaseCallQQ extension. They remain unusable until an efficient recovery solution reverts their code back.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by .pleaseCallQQ files virus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .pleaseCallQQ files virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.pleaseCallQQ Files Virus – Distribution

For the delivery of .pleaseCallQQ files virus payload cyber criminals are likely to utilize techniques such as email spam campaigns, software cracks, fake software update notifications, freeware with compromised installers and malicious web links.

All these techniques aim to trick you into executing the malicious ransomware payload on your device without noticing its presence. As a major channel of distribution is considered to be malspam as it is a convenient way for hackers to reach a large number of online users with a single campaign. Campaigns of this kind usually attempt to mislead you that an email you received is sent by a representative of a legitimate company or governmental institution. The traits of such emails are file attachments, clickable hyperlinks or buttons and limited time for interaction with the provided information.

With the help of malicious scripts embedded in the code of various web pages the ransomware infection code may be triggered automatically after a visit of one of these pages. As of the URLs of such pages they may be spread across all popular social media channels, various forums, and websites for free programs.

.pleaseCallQQ Files Virus – Overview

This Chinese version of Jigsaw ransomware dubbed .pleaseCallQQ files virus is designed to plague computer systems in order to encrypt valuable files and demand a ransom payment. The infection process passes through several stages first of which is the creation of additional malicious files.

These files are used for the manipulation of various system processes that enable it to evade detection and remain persistent on the infected machine. Files associated with .pleaseCallQQ crypto virus may be dropped or created in some of the following folders:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%
  • %Roaming%

Among the issues that may occur after an infection with this ransomware is the automatic execution of its infection files on each system start. This is usually a consequence of malicious values added under Run and RunOnce registry sub-keys. So when removing harmful files you need to enter the Registry Editor and check these keys for unusual values that may be associated with the ransomware.

The data encryption stage, details of which are revealed in the next paragraph, is followed by the display of a ransom message. After the file that stores the message is dropped on the system it loads automatically to display the following message in Chinese:

你中招了
你的文件已被加密
重开机也没用了
我现在给你2个选择
1.重灌电脑
2.支付50(RMB)金钱
不要尝试重开机啥的
没有用
我有给你足够时间思考
时间到了就没机会了
不用尝试关闭我
你将会获得删除文件作为惩罚
现在请开始你的抉择

With the help of an online translator it becomes clear that the ransom message reads the following in English:

You have recruited
Your file has been encrypted
Rebooting is useless
I will give you 2 choices now.
1. Refill the compute
2. Pay 50 (RMB) money
Don’t try to reboot
Useless
I have given you enough time to think
When time is up, there is no chance.
Don’t try to close me
You will get deleted files as punishment
Please start your choice now.

Be advised to avoid ransom payment as the code of Jigsaw ransomware family was cracked by security researchers and the available free decryption tool may be efficient for .pleaseCallQQ files recovery.

.pleaseCallQQ Files Virus – Encryption Process

The data encryption stage is the main one. For it .pleaseCallQQ crypto virus utilizes a built-in cipher module which is set to transform parts of the original code of target files with the help of AES algorithm. Upon these changes the access to corrupted files remains blocked and all they are marked with the distinctive .pleaseCallQQ extension. Alike previous iterations this Jigsaw variant may be set to locate and encrypt all of the following types of files:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

The ransomware could be also set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

Jigsaw Ransomware Decryption Instructions

Before starting to download the decryptor and learning how to use it, we must have you know that this may take some time. This is why it is advisable to make your computer run permanently without automatically hibernating or shutting down automatically after some time. To do this, please follow the bellow-mentioned instructions:

1: Click on the battery icon in your system tray (next to the digital clock) in Windows and then click on More Power Options.
2: The Power Options menu will appear. In your power plan click on Change Plan Settings.
3: In your plan’s settings make sure you set “Turn off the display” and “Put computer to sleep” to “Never” from the drop down minutes menu.
4: Click on “Change Advanced Plan Settings” and click to expand the “Hard Disk” option in the list there.
5: From there, set the power settings (On Battery and Powered On) to “Never”.

After this has been completed, then you should start the decryption process itself. Even though nothing should go wrong, we strongly advise you to make sure that your files and computer are safe. To do this, you may either scan your computer with an advanced anti-malware program or create copies of the encrypted files and try to decrypt them from a safe PC, just in case something goes wrong.

Download

Malware Removal Tool


Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

After you have secured your computer, you should follow these instructions to download, install and use Jigsaw Decryptor by demonslay335:

Step 1: Download Jigsaw Decryptor from the button below and open the .ZIP file

Download

JigSaw Decrypter


1-jigsawdecrypter-download-zip-main-sensorstechforum

Step 2: Extract the JigSawDecrypter.exe file whenever you feel comfortable to easily access it:

2-jigsaw-decrypter-exe-file-desktop-sensorstechforum

Step 3: Right-Click on it after which click on Run as Administrator… and you should see its primary interface:

3-jigsaw-decrypter-sensorstechforum-main-interface

Step 4: From there, click on the Select Directory button and choose a directory the files in which you want decrypted:

4-jigsaw-choose-files-to-decrypt-sensorstechforum

Step 5: Click on the button Ok after selecting and then click on Decrypt Files and wait for the decryption process to be complete:

5-jigsaw-decrypter-decrypt-files-sensorstechforum

Bear in mind that this process may take some time, it really depends on the files, their size and other factors, like the ransomware variant and its modification. This is why we strongly suggest you to take into consideration leaving your computer to work it out while you are not using it.

Conclusion

As a bottom line, we strongly advise users who have been infected by the JigSaw ransomware to follow these advises to prevent this mess from happening in the near future:

Advice 1: Make sure to read our general protection tips and try to make them your habit and educated others to do so as well.
Advice 2: Install an advanced anti-malware program that has an often updated real-time shield definitions and ransomware protection.

Advice 3: Seek out and download specific anti-ransomware software which is reliable.

Advice 4: Backup your files using one of the methods in this article.

Advice 5: : Make sure to use a secure web browser while surfing the world wide web.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections. She believes that in times of constantly evolving dependency of network connected technologies, people should spread the word not the war.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...