Remove Virus and Restore Encrypted Files

Remove Virus and Restore Encrypted Files

Spacerangersaolcom_ransomwareMalware researchers have just spotted ransomware virus to infect users and encrypt their files asking for a payment in exchange for a decryption key.

We strongly advise users to not pay the cyber criminals as this is not a guarantee they will receive their files back. What’s more, ransomware viruses have gained power in the last year precisely due to panicked and negligent users who hurry to pay as they do not take precautions to prevent such attacks on the first place.

If you have been infected by, read further to learn how to remove it from your PC first. Only then can you try to restore some of your data using a powerful file recovery tool.

Threat Summary


Short DescriptionPart of the “@” ransomware variants. Encrypts the files on the infected computer then asks for ransom money in email correspondences.
SymptomsThe user may witness his files to become inaccessible and with an .xtbl extension added to them.
Distribution MethodVia Spam emails,corrupted file attachments and URLs.
Detection Tool See If Your System Has Been Affected by


Malware Removal Tool

User ExperienceJoin our forum to Discuss
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. Ransomware – How Does It Spread? spreads like a typical ransomware virus – via spam emails often disguised as legitimate senders such as institutions, organizations, companies, etc. that the victim is well familiar with.

The spam emails that carry the virus usually contain a malicious URL or an attachment, and once opened, the virus enters the victim’s computer and the activation begins. Ransomware in Details

Once inside the victim’s computer, ransomware virus will scan the system to look for the following files to encrypt:


It may then drop a file with instructions on how the ransom fee must be paid. The creators behind are prompting the victim to email them in order to negotiate the ransom fee. will use a strong AES encryption algorithm to encrypt files. That algorithm is also used to produce a decryption key once the whole encryption process is complete. That decryption key, on the other hand, is encrypted via RSA encryption, and is sent to the cyber criminals empowering them to decrypt the victim’s files upon payment.

How to Remove and Restore Encrypted Files

First thing you need to do if your system has been infected by is to remove it using a powerful anti-malware tool which will detect all malicious components and remove them safely and permanently from your PC.

You can also follow the steps below to remove by yourself.

To learn how to decrypt your files, please check step “3. Restore files encrypted by” below.

Manually delete from your computer

Note! Substantial notification about the threat: Manual removal of requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove files and objects
2. Find malicious files created by on your PC
3. Fix registry entries created by on your PC

Automatically remove by downloading an advanced anti-malware program

1. Remove with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by in the future
3. Restore files encrypted by
Optional: Using Alternative Anti-Malware Tools
Boyana Peeva

Boyana Peeva

Believes that the glass is rather half-full and that nothing is bigger than the little things. Enjoys writing, reading and sharing content – information is power.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.