.ETH Files Virus – How to Remove It

.ETH Files Virus – How to Remove It


with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by .ENC Files Virus and other threats.
Threats such as .ENC Files Virus may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article has been created in order to explain what exactly is the ransomware virus using the .ETH file extension and show you ways via which you can remove it and try restoring files, encrypted by it.

A new ransomware virus, using the .ETH file extension has been detected by researchers. The ransomware uses the .ETH file extension which is also an abbreviation for the cryptocurrency Ethereum, suggesting it may want you to pay in Ether in order to get your files decrypted. The virus also uses the [email protected] e-mail address for contact with the crooks behind it. If your computer system has been compromised by the .ETH file ransowmare, we would suggest that you read this article thoroughly. If you want to remove this ransomware completely from your computer, we would suggest that you read this article thoroughly.

Threat Summary

Name.ENC Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the computers it has compromised in order to extort their owners to pay ransom.
SymptomsFiles can not be opened and have the .ETH file extension added to them. A ransom note may also appear.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by .ENC Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .ENC Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.ETH Virus – Distribution Methods

The main distribution mean of the .ETH file ransomware is likely conducted via massive spam e-mail campaigns. These e-mails are often very cleverly designed and may contain links to multiple different types of malicious files that can be automatically added to your PC and ran, via a so-called drive-by download:

Another scenario is if the malicious e-mails, spreading the .ETH files virus contain attachments added in them. These attachments could end up to be files of the following types;

  • .PDF
  • .JS
  • .DOCX
  • .EXE
  • .VBS

If the files are .PDF and .DOCX types, then they may likely be infected with malicious macros which could let the .ETH files virus infect a vulnerable machine.

In addition to e-mails the ransomware may also attack your computer passively. Some cyber-criminals prefer to infect by hijacking the traffic from websites they hack or create fake sites of their own and upload the malicious files, making them seem as if they are:

  • Patches.
  • Updates of Flash Player or other often used software.
  • Cracks for software or games.
  • Online activators for licenses.
  • Portable versions of programs.
  • Setups of programs.

.ETH Files Virus – Analysis

.ETH files virus is the type of ransomware that encrypts your files and aims to convince you that paying ransom to get them back is your only hope of recovering them.

The .ETH file ransomware may drop it’s files on the infected computer upon infection. The primary infection file of this virus is characterized with the following information:

File size:164.5 KB

Besides the main infeciton file, other support files may also be created or dropped on the victimized computer and they may reside in the following Windows directories:

  • %AppData%
  • %Local%
  • %Temp%
  • %LocalLow%
  • %Roaming%

In addition to the files, the ransomware may also begin to insert mutexes in the infected computer and also perform privilege escalation. These may result in the virus obtaining administrative privileges. These may be used for the .ETH ransomware to:

  • Copy system information.
  • Copy network information.
  • Obtain various types of data from your PC.
  • Obtain read and write privileges.
  • Obfuscate it’s malicious files by legitimising them in Windows.
  • Delete shadow copies.

In addition to those, the ransomware virus may also run the following Windows commands in the computers of victims:

→sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

In addition to this, the .ENC files virus may also run scripts that make sure to automatically add registry values in the Windows Registry Editor. These values may run files automatically on Windows Start Up. The registry sub-keys used for this are believed to be the following:


.ENC Files Virus – Encryption Process

To encrypt files on the compromised computer, the .ENC files virus may begin to scan for them by file extension. The following file extensions are at danger of encryption, if your computer is infected with the .ENC files virus:


Once the .ENC file ransomware encrypts your data, the ransomware may set the .ENC file suffix next to their original one, making the files appear like the following:

Remove .ENC File Ransomware and Try Restoring Files

If you want .ENC files virus removed from your computer, we would suggest that you follow the removal instructions underneath this article. They have been created with the main idea to help you delete this ransomware either manually or automatically (reccomended). If manual removal does not seem to do the trick, one way to remove it si with the power of an advanced anti-malware software. Such tool aims to help users remove this ransomware virus by scanning for all of the files and objects created by it on your computer.

If you want to try and restore files, encrypted by this virus on your computer, we would advise you to check out the “Try to restore” instructions underneath. They are no 100% guarantee that you will be able to restore all of your files, but with their aid, you might be able to restore most or some of the files.

Note! Your computer system may be affected by .ENC Files Virus and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as .ENC Files Virus.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove .ENC Files Virus follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove .ENC Files Virus files and objects
2. Find files created by .ENC Files Virus on your PC

Before starting the Automatic Removal below, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by .ENC Files Virus

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share