.lol Files Virus (Scarab) - How to Remove It

.lol Files Virus (Scarab) – How to Remove It

remove .lol files virus scarab ransomware sensorstechforum guide

This article explains what .lol files virus is and what issues occur in case of infection with this ransomware. In addition, you could find a detailed removal guide with restore data part at the end of the article.

A ransomware dubbed .lol files virus has been identified as a strain of Scarab threat family. It is a crypto virus designed to infect computer systems with the purpose to reach certain types of files and transform their code with the help of sophisticated cipher algorithm. Following the data encryption process, .lol files virus opens a ransom message that urges you into contacting hackers so you can receive instructions on how to pay them a ransom fee.

Threat Summary

Name.lol Files Virus
TypeRansomware, Cryptovirus
Short DescriptionA strain of Scarab ransomware that corrupts valuable files with the help of sophisticated cipher algorithm.
SymptomsImportant files appear with the extension .lol appended to their names. You could not access them as they are encoded with strong cipher algorithm. Hackers attempt to extort a ransom payment for files decryption.
Distribution MethodSpam Emails, Corrupted Websites, Fake Software Updates
Detection Tool See If Your System Has Been Affected by .lol Files Virus


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .lol Files Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.lol Files Virus – Distribution

The spread of the payload file that triggers an infection with .lol files virus could be realized with the help of commonly used techniques like malspam, malvertising, corruption of web pages, fake software update notifications, freeware installers and other.

Since hackers seek for the most efficient way to trick users into executing unnoticeably malicious code on their devices, they often chose malspam as a main infection vector. Malspam or email messages that deliver malicious code enable hackers to present their infection payload in familiar forms such as file attachments of common types and URL addresses. Once an infected file is opened on the device or a corrupted website loaded in the browser .lol files virus becomes able to damage essential system components and encode target files. Emails part of malicious campaigns may be disguised as legitimate emails sent by well-known institutions and services such as

What are PayPal e-mail messages and how to stop and block them? How to spot fake PayPal scams and how to remove any malware infection as a result of such?
Remove malware caused by DHL Scams, including related email messages and websites. The article will reveal DHL Scams and legitimate messages from DHL
The FedEx Parcel Scam is a malware infection that is being spread on the Internet by unknown computer hackers, read more about in our removal guide
FedEx, and
The article will aid you to differentiate between an Amazon Gift Card and its scams. Follow the removal instructions to remove $1000 Amazon Gift Card scams

.lol Files Virus – Overview

A ransomware dubbed .lol files virus has been identified as a strain of

Remove Scarab-Bomber ransomware completely. Scarab is a virus. Follow the Scarab-Bomber ransomware removal instructions provided at the end of the article.
Scarab threat family. The infection process with the so-called .lol files virus begins with the execution of its payload on your system. This file is developed to trigger a sequence of malicious activities that support the completion of the attack.

As it may not contain all malicious commands needed for the thorough system contamination, it is likely to initiate the creation of additional malware files. One way to do get these files is by creating them directly on the system. Another one is via connection to a command and control server. Files associated with this ransomware may be located in some of the following system folders:

  • %AppData%
  • %Local%
  • %LocalLow%
  • %Roaming%
  • %Temp%
  • %Windows%

One of the major impacts that could be witnessed as a result of harmful changes implemented by Scarab .lol ransomware is the automatic execution of malicious files on each system start. This becomes a fact after some specific malicious values are added under the Run and RunOnce registry sub-keys.

These keys are located in the Registry Editor – a hierarchical database that stores essential system settings. The reason why they are often affected by ransomware like .lol is their functionality to execute all files and processes listed under them each time you start the system.

In case that your computer has been infected by .lol files virus you should consider the complete removal of all malicious files and objects from the system. Otherwise, hackers could misuse present harmful files to perform further malicious activities.

Following data encryption process, specifics of which are described in detail in the next paragraph, .lol crypto virus drops a text file called HOW TO RECOVER ENCRYPTED FILES.TXT on the infected device. This file contains a ransom message left by hackers. Its purpose is to present you information on how to act further in order to restore encrypted files.
Here is the text it presents:

All your files are encrypted!
Your ID

Get a decoder:
[email protected]
[email protected]

If you can not contact by mail
* Register on the site http://bitmsg.me (Bitmessage online sending service)
* Write a letter BM-2cTXnB6dEE6TdHmAJCnEHp9PdsPThtS5n4 with your mail and ID.
If the site does not work, use vpn or torproject.org

HOW TO RECOVER ENCRYPTED FILES.TXT Scarab .lol files virus ransom note sensorstechforum

For the sake of your security you should not believe in hackers’ promises. Their so-called decoder could be unable to restore your .lol files. Only a single bug in the code of this ransomware could result in the generation of a broken decryption key that will be inefficient while applying it during the decryption process. So we recommend you to consider the help of alternative data recovery methods before rushing into paying hackers the demanded ransom. As of the ransom, its amount remains unknown since it is not stated in the ransom note. The guesses are that it should be paid in Bitcoin.

.lol Files Virus – Encryption Process

Data encryption is considered to be the main infection phase as it corrupts valuable users’ files restoration of which is possible after a ransom payment. During this infection phase, .lol files virus activates an inbuilt encryption module that is designed to scan certain drives and folders for target types of files and utilize sophisticated cipher algorithm every time it finds a match of its search.

Since this iteration of Scarab ransomware is likely to encrypt commonly used types of files, it could corrupt valuable data such as:

  • Audio files
  • Video files
  • Document files
  • Image files
  • Backup files
  • Banking credentials, etc

Upon encryption your corrupted files will appear with the extension .lol in their names. Unfortunately, you won’t be able to access the information they store until you apply an efficient recovery solution to revert back their code. We remind you that the decrypter offered by hackers is only one of the ways to restore .lol files. You could find out more data recovery approaches in the guide below.

Remove Scarab Ransomware and Restore .lol Files

The so-called .lol files virus is a threat with highly complex code that plagues not only your files but your whole system. So infected system should be cleaned and secured properly before you could use it regularly again. Below you could find a step-by-step removal guide that may be helpful in attempting to remove Scarab .lol ransomware. Choose the manual removal approach if you have previous experience with malware files. If you don’t feel comfortable with the manual steps select the automatic section from the guide. Steps there enable you to check the infected system for ransomware files and remove them with a few mouse clicks.

In order to keep your system safe from ransomware and other types of malware in future, you should install and maintain a reliable anti-malware program. Additional security layer that could prevent the occurrence of ransomware attacks is

With the different types of ransomware emerging and evolving on a daily basis, a need for better protection against such viruses arises. A more specific kind of protection is always necessary, in addition to any anti-malware tools. The following article...Read more
anti-ransomware tool.

Make sure to read carefully all the details mentioned in the step “Restore files” if you want to understand how to fix encrypted files without paying the ransom. Beware that before data recovery process you should back up all encrypted files to an external drive as this will prevent their irreversible loss.

Gergana Ivanova

Gergana Ivanova

Gergana has completed a bachelor degree in Marketing from the University of National and World Economy. She has been with the STF team for three years, researching malware and reporting on the latest infections.

More Posts

Follow Me:
Google Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share