Remove Virus and Restore Encrypted Files

Remove Virus and Restore Encrypted Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Spacerangersaolcom_ransomwareMalware researchers have just spotted ransomware virus to infect users and encrypt their files asking for a payment in exchange for a decryption key.

We strongly advise users to not pay the cyber criminals as this is not a guarantee they will receive their files back. What’s more, ransomware viruses have gained power in the last year precisely due to panicked and negligent users who hurry to pay as they do not take precautions to prevent such attacks on the first place.

If you have been infected by, read further to learn how to remove it from your PC first. Only then can you try to restore some of your data using a powerful file recovery tool.

Threat Summary


Short DescriptionPart of the “@” ransomware variants. Encrypts the files on the infected computer then asks for ransom money in email correspondences.
SymptomsThe user may witness his files to become inaccessible and with an .xtbl extension added to them.
Distribution MethodVia Spam emails,corrupted file attachments and URLs.
Detection Tool See If Your System Has Been Affected by


Malware Removal Tool

User ExperienceJoin our forum to Discuss
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive. Ransomware – How Does It Spread? spreads like a typical ransomware virus – via spam emails often disguised as legitimate senders such as institutions, organizations, companies, etc. that the victim is well familiar with.

The spam emails that carry the virus usually contain a malicious URL or an attachment, and once opened, the virus enters the victim’s computer and the activation begins. Ransomware in Details

Once inside the victim’s computer, ransomware virus will scan the system to look for the following files to encrypt:


It may then drop a file with instructions on how the ransom fee must be paid. The creators behind are prompting the victim to email them in order to negotiate the ransom fee. will use a strong AES encryption algorithm to encrypt files. That algorithm is also used to produce a decryption key once the whole encryption process is complete. That decryption key, on the other hand, is encrypted via RSA encryption, and is sent to the cyber criminals empowering them to decrypt the victim’s files upon payment.

How to Remove and Restore Encrypted Files

First thing you need to do if your system has been infected by is to remove it using a powerful anti-malware tool which will detect all malicious components and remove them safely and permanently from your PC.

You can also follow the steps below to remove by yourself.

To learn how to decrypt your files, please check step “3. Restore files encrypted by” below.

Boyana Peeva

Boyana Peeva

Believes that the glass is rather half-full and that nothing is bigger than the little things. Enjoys writing, reading and sharing content – information is power.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share