This article will help you remove ZekwaCrypt ransomware effectively. Follow the ransomware removal instructions provided at the end of the article.
ZekwaCrypt is the name of a ransomware cryptovirus, that is raging on the Web at the moment of writing this article. Files with around 650 different extensions will become encrypted. Encrypted files will receive the extension .zekwakc. Read below to find out what ways you could try to potentially restore some of your data.
|Short Description||The ransomware encrypts around 650 different file extensions.|
|Symptoms||The ransomware will encrypt files on your computer and display a ransom message after that.|
|Distribution Method||Spam Emails, Email Attachments|
See If Your System Has Been Affected by ZekwaCrypt
Malware Removal Tool
|User Experience||Join Our Forum to Discuss ZekwaCrypt.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
ZekwaCrypt Ransomware – Distribution
The ZekwaCrypt ransomware could be distributed through different methods. One of those methods could be with the payload file that initiates the malicious script, being spread around the Internet.
ZekwaCrypt might also be distributing that payload file on social media and file-sharing services. Freeware programs found on the Web can be presented as helpful, but at the same time hide the malicious script for the virus in question. Don’t open files after you download them, especially if they come from suspicious sources like links and e-mails. Open them, after you have made sure to check their size, signatures and scanned them with a security tool. You might want to read the ransomware prevention tips in the forum.
ZekwaCrypt Ransomware – Information
ZekwaCrypt ransomware is a nasty cryptovirus. Without mercy it will encrypt every file you have on your computer, no matter the file type. It appends the .zekwakc extension to encrypted files. The ransomware is known as the detection “Ransom: Win32/Zekwacrypt.A” from Microsoft’s Malware Protection Center.
ZekwaCrypt ransomware makes entries in the Windows Registry to achieve persistence and to make the ransomware work. One of those registry entries is usually designed in a way that will start the virus automatically with each launch of the Windows Operating System. The following registry entries are used by the virus:
Data: encrypt extension
Data: notepad “%documents%\_
A ransom note will appear right after the encryption process is finished. The following files will also be created with it in your Documents folder:
- psawfcsnbd_encrypted_readme.txt.bmp (same content as encrypted_readme.txt encrypted_readme.txt)
The following files are created in any directory which contains encrypted files:
Whatever you do, you should NOT in any circumstance pay the cyber crooks. Your files may not get restored, and nobody could give you a guarantee for that. Moreover, giving money to those criminals will likely just financially support them and probably give them the motivation to create more ransomware and do other criminal activities.
The cryptovirus encrypts lots of file types. You can see what file extensions the ZekwaCrypt ransomware seeks to encrypt from the list provided down here:
→.APR, .BOX, .dot, .GML, .mb, .PAS, .rt, .VC6, .jas, .bpw, .dotm, .GO, .MCD, .PDB, .rtf, .VCD, .ari, .BRD, .dotx, .GRB, .md2, .pdd, .RVM, .VCPROJ, .arw, .BREP, .dotXSI, .GTABLE, .md3, .pdf, .RVT, .vdi, .srf, .BSDL, .dpm, .GTC, .MDA, .PDI, .rw2, .VDPROJ, .1CD, .bzip, .DPR, .GXK, .MDB, .PDX, .rwl, .vfd, .3dm, .C, .dproj, .gz, .mdc, .pef, .rwx, .vhd, .3dmf, .C2D, .drf, .gzip, .MDE, .pem, .rwz, .VHDL, .3dmlw, .c4d, .DRW, .H, .MDF, .pfx, .S, .vimproj, .3ds, .CAD, .dsa, .ha, .MDS, .php, .S12, .VIP, .3DV, .cal3d, .dsk, .hdd, .mdx, .php2, .S19, .VLM, .3dxml, .cap, .dsm, .hdmov, .mef, .php3, .sav, .vmc, .3fr, .CATDrawing, .DSPF, .HPP, .mesh, .php4, .SCAD, .vmdk, .3g2, .CATPart, .dss, .HS, .mht, .php5, .SCALA, .vmem, .3ga, .CATProcess, .dsv, .htm, .mhtml, .php6, .SCDOC, .vmsd, .3gp, .CATProduct, .dtd, .html, .mid, .php7, .SCE, .vmsn, .3gp2, .CBL, .dts, .HXX, .midi, .phps, .SCI, .vmss, .3gpp, .CBP, .DWB, .IAM, .mka, .phtml, .SCM, .vmtm, .3mf, .CC, .DWF, .ICD, .mkv, .PIPE, .SD7, .vmx, .4DB, .CCC, .DWG, .IDW, .ML, .pl, .SDB, .vmxf, .4DD, .CCD, .DXF, .IFC, .mlp, .PLN, .SDC, .VND, .4DIndx, .CCM, .E, .ifo, .mm3d, .ply, .SDF, .vob, .4DIndy, .CCP4, .E2D, .IGES, .model, .PM, .SDI, .VS, .4DR, .CCS, .EAP, .ihtml, .mos, .png, .shtml, .vsv, .7z, .cda, .EASM, .iiq, .mov, .pot, .sia, .vud, .aac, .CDI, .EDIF, .IMG, .mp2, .potm, .sib, .vue, .ABC, .CDL, .EDRW, .imp, .mp2v, .potx, .skp, .vwx, .ac, .CDR, .EFS, .INC, .mp3, .pov, .sldasm, .w3d, .ac3, .cer, .EGG, .indd, .mp4, .PP, .SLDDRW, .waData, .ACCDB, .cfg, .EGT, .info, .mp4v, .ppam, .sldm, .waIndx, .ACCDE, .cfl, .eip, .IPN, .mpa, .ppk, .sldprt, .waJournal, .ACCDR, .cfm, .EL, .IPT, .mpc, .pps, .sldx, .waModel, .ACCDT, .cgi, .EMB, .ISO, .mpe, .ppsm, .SLN, .wav, .ace, .CGM, .EMF, .ivf, .mpeg, .ppsx, .smd, .wb2, .ACP, .cgr, .eml, .j2c, .mpg, .ppt, .smk, .WDB, .ADA, .CHML, .EPRT, .j2k, .mpls, .pptm, .snd, .webm, .ADB, .CIF, .eps, .jar, .MPO, .pptx, .SPEF, .WGL, .ADF, .CIR, .epub, .JAVA, .mpv2, .PRC, .SPI, .wings, .adp, .CLJ, .erf, .jp2, .mpv4, .PRG, .SQL, .wm, .ADS, .CLS, .ESS, .jpc, .MRC, .PRO, .SQLITE, .wma, .ADT, .CMX, .ESW, .jpe, .mrw, .PRT, .sr2, .WMDB, .ADZ, .CO, .evo, .jpeg, .MS12, .ps, .SREC, .WMF, .AEC, .COB, .EXCELLON, .jpf, .mts, .psb, .srw, .wmp, .AI, .core3d, .EXP, .jpg, .MYD, .psd, .ssh, .wmv, .aif, .CPF, .F, .jpx, .MYI, .PSM, .std, .wpd, .aifc, .CPP, .f4v, .jsp, .NCF, .PSMODEL, .STEP, .wps, .aiff, .cr2, .F77, .JT, .NDF, .pst, .STIL, .wrl, .ain, .crt, .F90, .k25, .nef, .ptx, .STK, .wv, .alac, .crw, .fac, .kdb, .nif, .pub, .STL, .x, .AMF, .CS, .fb2, .kdbx, .NRG, .pva, .stm, .X_B, .amr, .CSPROJ, .fbx, .kdc, .nrw, .pvs, .SUB, .X_T, .amv, .csv, .FDB, .KEXI, .NSF, .PWI, .SV, .X3D, .an8, .ctm, .fff, .KEXIC, .NTF, .pxn, .SVG, .x3f, .aob, .CUE, .flac, .KEXIS, .NV2, .PY, .swf, .XAR, .aoi, .CXX, .flc, .L, .nvram, .PYT, .SWG, .XE, .ape, .D, .fli, .las, .OASIS, .R, .SXD, .xhtml, .apl, .D64, .flic, .lasso, .obj, .R3D, .tak, .xla, .AR, .DAA, .flv, .lassoapp, .OCD, .ra, .tar, .xlam, .arc, .dae, .FM, .LDB, .ODB, .raf, .TCL, .xll, .arj, .DAF, .FMZ, .LEF, .ODG, .ram, .TCT, .xlm, .ART, .DB, .FOR, .LISP, .odm, .rar, .TCW, .xls, .ASC, .DBA, .FP, .log, .odp, .raw, .tex, .xlsb, .asf, .DBF, .FP3, .lwo, .odt, .RB, .TIB, .xlsm, .ASM, .DBPro123, .FP5, .lws, .off, .RC, .tif, .xlsx, .asp, .dcr, .FP7, .lxo, .ofr, .RC2, .tiff, .xlt, .aspx, .dcs, .FRM, .lzh, .ofs, .rec, .tp, .xltm, .au, .DEF, .FRX, .M, .oga, .RED, .trp, .xltx, .avi, .der, .FS, .m1a, .ogex, .REDS, .ts, .xlw, .AWG, .DFF, .FSDB, .m1v, .ogg, .REL, .tta, .xml, .b3d, .dfm, .FTH, .m2a, .ogm, .RESX, .txt, .XPL, .B6T, .DFT, .FTN, .m2p, .ogv, .RFA, .u3d, .XQ, .BAS, .DGK, .g, .m2t, .OpenAccess, .RIN, .uc2, .XSI, .bay, .DGN, .GBR, .m2ts, .opus, .rk, .UDL, .XSL, .bdmv, .divx, .GDB, .m2v, .ORA, .RKT, .UNV, .Y, .bik, .DMG, .gdoc, .M4, .orf, .RKTL, .UPF, .z3d, .BIM, .DMS, .GDSII, .m4a, .ott, .RLF, .V, .zip, .BIN, .DMT, .GED, .m4b, .P, .rm, .V2D, .bkf, .dng, .gif, .m4r, .p12, .rmi, .VAP, .blend, .doc, .glm, .m4v, .p7b, .rmm, .VB, .block, .docb, .GM6, .ma, .p7c, .rmvb, .VBG, .bml, .docm, .GMD, .maff, .pages, .rp, .VBP, .bmp, .docx, .GMK, .max, .PAR, .rss
Those are around 650 file extensions. The extension that encrypted files will receive is .zekwakc. That extension will be added as a second extension after the original one, with no name changes to those encrypted files.
Anything that is named backup or has such an extension will be deleted. The following directories and strings will be excluded from encryption:
The ZekwaCrypt cryptovirus is quite likely to delete the Shadow Copies from the Windows operating system by utilizing the following command:
→vssadmin.exe delete shadows /all /Quiet
Continue to read below to check out what kinds of ways you can try for potentially recovering at least a part of your data.
Remove ZekwaCrypt Ransomware and Restore .zekwakc Files
If your computer got infected with the ZekwaCrypt ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as you can before it can have the chance to spread further and infect other computer systems. You should remove this ransomware and follow the step-by-step instructions guide provided down below.
Manually delete ZekwaCrypt from your computer
Note! Substantial notification about the ZekwaCrypt threat: Manual removal of ZekwaCrypt requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.