.docx Files Virus - How to Remove and Restore Files

.docx Files Virus – How to Remove and Restore Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

This article has been created with the main goal of helping you by showing how to remove the .docx files ransomware virus from your computer and how you can try and recover files, encrypted by it.

A new ransomware, using the same distribution IP addresses as

GandCrab ransomware does has been detected to infect victimized computers and encrypt their files. Shortly after this, the virus drops a ransom note type of file, called YOU_FILES_HERE.txt, in which ransom demands are made to pay in BitCoin in order to get the encrypted files restored once again. If your computer has been infected by this virus we recommend that you read this article as it aims to help you remove the .docx files virus from your computer and show how you can try and restore .docx encrypted files.

Threat Summary

Name.docx Files Virus
TypeRansomware, Cryptovirus
Short DescriptionEncrypts your files and asks you to pay ransom to get them to be opened again.
SymptomsFiles are appended the .docx file extension to them. A ransom note, called YOU_FILES_HERE.txt is dropped on the victims’ PC.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .docx Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .docx Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.docx Ransomware – Distribution Methods

There may be more than one way via which this .docx ransomware may spread onto the computers of users. The virus’s main idea is to get users to open It’s malicious file. This is why the infection file may pretend to be a legitimate file sent to victims via spammed e-mail message which imitates a legitimate one, like the example below:

In addition to this, the ransomware virus may also hide as a legitimate file that is available for download. Such files can often turn out to be fake installers of software, whose main goal is to get users to download and run them. They also turn out to be fake cracks, patches, license activators and other types of seemingly legitimate .exe and .msi files.

.docx Files Virus – Analysis

The .docx file extension virus for now has no name, but it can be easily recognized by the ransom note it adds. It is called YOU_FILES_HERE.txt and has the following message:

Your files are Encrypted!
For data recovery needs decryptor.
How to buy decryptor.
1. Download “Tor Borwser” from https://torproject.org/and install it.
2. Open this link In the “Tor Browser”
Note! This link is available via “Tor Browser” only.
If Tor/Tor browser is locked in your country or you can not install it, open one of the following links:
Free decryption as guarantee.
Before paying you can send us 2 file for free decryption.
You unique ID: {ID}

The main malicious file of the .docx files virus is reported to have the following parameters:

→ SHA256:30ec73110c97a5ac5e923324b6874c41777a31b9b8a95467babcb9fb6bd3e982

When the .docx files virus infects your computer, the malware may start to interact with the following Windows System files:

→ advapi32.dll

The ransomware uses those system files to perform a lot of procedure calls and actions that would otherwise be unauthorized.

One of them is to possibly create registry entries in the following Windows Registry sub-keys:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

Another malicious activity of the .docx files virus may be to delete the shadow volume copies of the infected computer, preferrably by running a script that executes Windows Command Prompt with the following commands to delete the backed up files on the infected PC:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

.docx Files Virus – Encryption Process

To encrypt the files, the .docx ransomware may check for them first. To do this, the virus may scan documents, images, videos and other important files based on their file types, for example:


After encryption, the files can no longer be opened and may appear like the following:

Remove .docx Files Virus and Try Restoring Your Files

Before beginning the removal of the .docx file ransomware, we recommend that you backup your encrypted files. This will effectively help you to recover your files if something fails to try decrypting them later.

To remove .docx files virus from your computer, we recommend that you follow the removal instructions underneath this article. They have been created with the main idea in mind that you should remove this ransomware virus from your computer either manually or automatically. Be advised that the automatic approach is the best one, according to security experts since it involves using an advanced anti-malware software, the main idea behind which is to automatically scan your PC and remove every malicious object in a safe manner.

To try and restore files, encrypted by the .docx files virus, we recommend that you follow the file recovery instructions underneath this article. They have been created to help you try restore as many files as possible, even though they may not be 100% effective.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share