Remove ZekwaCrypt Ransomware and Restore .zekwakc Files

Remove ZekwaCrypt Ransomware and Restore .zekwakc Files

This article will help you remove ZekwaCrypt ransomware effectively. Follow the ransomware removal instructions provided at the end of the article.

ZekwaCrypt is the name of a ransomware cryptovirus, that is raging on the Web at the moment of writing this article. Files with around 650 different extensions will become encrypted. Encrypted files will receive the extension .zekwakc. Read below to find out what ways you could try to potentially restore some of your data.

Threat Summary

NameZekwaCrypt
TypeRansomware
Short DescriptionThe ransomware encrypts around 650 different file extensions.
SymptomsThe ransomware will encrypt files on your computer and display a ransom message after that.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by ZekwaCrypt

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss ZekwaCrypt.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

ZekwaCrypt Ransomware – Distribution

The ZekwaCrypt ransomware could be distributed through different methods. One of those methods could be with the payload file that initiates the malicious script, being spread around the Internet.

ZekwaCrypt might also be distributing that payload file on social media and file-sharing services. Freeware programs found on the Web can be presented as helpful, but at the same time hide the malicious script for the virus in question. Don’t open files after you download them, especially if they come from suspicious sources like links and e-mails. Open them, after you have made sure to check their size, signatures and scanned them with a security tool. You might want to read the ransomware prevention tips in the forum.

ZekwaCrypt Ransomware – Information

ZekwaCrypt ransomware is a nasty cryptovirus. Without mercy it will encrypt every file you have on your computer, no matter the file type. It appends the .zekwakc extension to encrypted files. The ransomware is known as the detection “Ransom: Win32/Zekwacrypt.A” from Microsoft’s Malware Protection Center.

ZekwaCrypt ransomware makes entries in the Windows Registry to achieve persistence and to make the ransomware work. One of those registry entries is usually designed in a way that will start the virus automatically with each launch of the Windows Operating System. The following registry entries are used by the virus:

→Key: HKU\Administrator\Software\Microsoft\Windows\CurrentVersion\
Value: ext
Data: encrypt extension

→Key: HKU\Administrator\Software\Classes\\
Value: default
Data: .run

→Key: HKU\Administrator\Software\Classes\\shell\open\command
Value: default
Data: notepad “%documents%\__encrypted_readme.txt”

A ransom note will appear right after the encryption process is finished. The following files will also be created with it in your Documents folder:

  • psawfcsnbd_encrypted_readme.txt.bmp (same content as encrypted_readme.txt encrypted_readme.txt)
  • __encrypted_readme.txt

The following files are created in any directory which contains encrypted files:

  • encrypted_readme.txt
  • encrypted_list.txt

Whatever you do, you should NOT in any circumstance pay the cyber crooks. Your files may not get restored, and nobody could give you a guarantee for that. Moreover, giving money to those criminals will likely just financially support them and probably give them the motivation to create more ransomware and do other criminal activities.

The cryptovirus encrypts lots of file types. You can see what file extensions the ZekwaCrypt ransomware seeks to encrypt from the list provided down here:

→.APR, .BOX, .dot, .GML, .mb, .PAS, .rt, .VC6, .jas, .bpw, .dotm, .GO, .MCD, .PDB, .rtf, .VCD, .ari, .BRD, .dotx, .GRB, .md2, .pdd, .RVM, .VCPROJ, .arw, .BREP, .dotXSI, .GTABLE, .md3, .pdf, .RVT, .vdi, .srf, .BSDL, .dpm, .GTC, .MDA, .PDI, .rw2, .VDPROJ, .1CD, .bzip, .DPR, .GXK, .MDB, .PDX, .rwl, .vfd, .3dm, .C, .dproj, .gz, .mdc, .pef, .rwx, .vhd, .3dmf, .C2D, .drf, .gzip, .MDE, .pem, .rwz, .VHDL, .3dmlw, .c4d, .DRW, .H, .MDF, .pfx, .S, .vimproj, .3ds, .CAD, .dsa, .ha, .MDS, .php, .S12, .VIP, .3DV, .cal3d, .dsk, .hdd, .mdx, .php2, .S19, .VLM, .3dxml, .cap, .dsm, .hdmov, .mef, .php3, .sav, .vmc, .3fr, .CATDrawing, .DSPF, .HPP, .mesh, .php4, .SCAD, .vmdk, .3g2, .CATPart, .dss, .HS, .mht, .php5, .SCALA, .vmem, .3ga, .CATProcess, .dsv, .htm, .mhtml, .php6, .SCDOC, .vmsd, .3gp, .CATProduct, .dtd, .html, .mid, .php7, .SCE, .vmsn, .3gp2, .CBL, .dts, .HXX, .midi, .phps, .SCI, .vmss, .3gpp, .CBP, .DWB, .IAM, .mka, .phtml, .SCM, .vmtm, .3mf, .CC, .DWF, .ICD, .mkv, .PIPE, .SD7, .vmx, .4DB, .CCC, .DWG, .IDW, .ML, .pl, .SDB, .vmxf, .4DD, .CCD, .DXF, .IFC, .mlp, .PLN, .SDC, .VND, .4DIndx, .CCM, .E, .ifo, .mm3d, .ply, .SDF, .vob, .4DIndy, .CCP4, .E2D, .IGES, .model, .PM, .SDI, .VS, .4DR, .CCS, .EAP, .ihtml, .mos, .png, .shtml, .vsv, .7z, .cda, .EASM, .iiq, .mov, .pot, .sia, .vud, .aac, .CDI, .EDIF, .IMG, .mp2, .potm, .sib, .vue, .ABC, .CDL, .EDRW, .imp, .mp2v, .potx, .skp, .vwx, .ac, .CDR, .EFS, .INC, .mp3, .pov, .sldasm, .w3d, .ac3, .cer, .EGG, .indd, .mp4, .PP, .SLDDRW, .waData, .ACCDB, .cfg, .EGT, .info, .mp4v, .ppam, .sldm, .waIndx, .ACCDE, .cfl, .eip, .IPN, .mpa, .ppk, .sldprt, .waJournal, .ACCDR, .cfm, .EL, .IPT, .mpc, .pps, .sldx, .waModel, .ACCDT, .cgi, .EMB, .ISO, .mpe, .ppsm, .SLN, .wav, .ace, .CGM, .EMF, .ivf, .mpeg, .ppsx, .smd, .wb2, .ACP, .cgr, .eml, .j2c, .mpg, .ppt, .smk, .WDB, .ADA, .CHML, .EPRT, .j2k, .mpls, .pptm, .snd, .webm, .ADB, .CIF, .eps, .jar, .MPO, .pptx, .SPEF, .WGL, .ADF, .CIR, .epub, .JAVA, .mpv2, .PRC, .SPI, .wings, .adp, .CLJ, .erf, .jp2, .mpv4, .PRG, .SQL, .wm, .ADS, .CLS, .ESS, .jpc, .MRC, .PRO, .SQLITE, .wma, .ADT, .CMX, .ESW, .jpe, .mrw, .PRT, .sr2, .WMDB, .ADZ, .CO, .evo, .jpeg, .MS12, .ps, .SREC, .WMF, .AEC, .COB, .EXCELLON, .jpf, .mts, .psb, .srw, .wmp, .AI, .core3d, .EXP, .jpg, .MYD, .psd, .ssh, .wmv, .aif, .CPF, .F, .jpx, .MYI, .PSM, .std, .wpd, .aifc, .CPP, .f4v, .jsp, .NCF, .PSMODEL, .STEP, .wps, .aiff, .cr2, .F77, .JT, .NDF, .pst, .STIL, .wrl, .ain, .crt, .F90, .k25, .nef, .ptx, .STK, .wv, .alac, .crw, .fac, .kdb, .nif, .pub, .STL, .x, .AMF, .CS, .fb2, .kdbx, .NRG, .pva, .stm, .X_B, .amr, .CSPROJ, .fbx, .kdc, .nrw, .pvs, .SUB, .X_T, .amv, .csv, .FDB, .KEXI, .NSF, .PWI, .SV, .X3D, .an8, .ctm, .fff, .KEXIC, .NTF, .pxn, .SVG, .x3f, .aob, .CUE, .flac, .KEXIS, .NV2, .PY, .swf, .XAR, .aoi, .CXX, .flc, .L, .nvram, .PYT, .SWG, .XE, .ape, .D, .fli, .las, .OASIS, .R, .SXD, .xhtml, .apl, .D64, .flic, .lasso, .obj, .R3D, .tak, .xla, .AR, .DAA, .flv, .lassoapp, .OCD, .ra, .tar, .xlam, .arc, .dae, .FM, .LDB, .ODB, .raf, .TCL, .xll, .arj, .DAF, .FMZ, .LEF, .ODG, .ram, .TCT, .xlm, .ART, .DB, .FOR, .LISP, .odm, .rar, .TCW, .xls, .ASC, .DBA, .FP, .log, .odp, .raw, .tex, .xlsb, .asf, .DBF, .FP3, .lwo, .odt, .RB, .TIB, .xlsm, .ASM, .DBPro123, .FP5, .lws, .off, .RC, .tif, .xlsx, .asp, .dcr, .FP7, .lxo, .ofr, .RC2, .tiff, .xlt, .aspx, .dcs, .FRM, .lzh, .ofs, .rec, .tp, .xltm, .au, .DEF, .FRX, .M, .oga, .RED, .trp, .xltx, .avi, .der, .FS, .m1a, .ogex, .REDS, .ts, .xlw, .AWG, .DFF, .FSDB, .m1v, .ogg, .REL, .tta, .xml, .b3d, .dfm, .FTH, .m2a, .ogm, .RESX, .txt, .XPL, .B6T, .DFT, .FTN, .m2p, .ogv, .RFA, .u3d, .XQ, .BAS, .DGK, .g, .m2t, .OpenAccess, .RIN, .uc2, .XSI, .bay, .DGN, .GBR, .m2ts, .opus, .rk, .UDL, .XSL, .bdmv, .divx, .GDB, .m2v, .ORA, .RKT, .UNV, .Y, .bik, .DMG, .gdoc, .M4, .orf, .RKTL, .UPF, .z3d, .BIM, .DMS, .GDSII, .m4a, .ott, .RLF, .V, .zip, .BIN, .DMT, .GED, .m4b, .P, .rm, .V2D, .bkf, .dng, .gif, .m4r, .p12, .rmi, .VAP, .blend, .doc, .glm, .m4v, .p7b, .rmm, .VB, .block, .docb, .GM6, .ma, .p7c, .rmvb, .VBG, .bml, .docm, .GMD, .maff, .pages, .rp, .VBP, .bmp, .docx, .GMK, .max, .PAR, .rss

Those are around 650 file extensions. The extension that encrypted files will receive is .zekwakc. That extension will be added as a second extension after the original one, with no name changes to those encrypted files.

Anything that is named backup or has such an extension will be deleted. The following directories and strings will be excluded from encryption:

  • Microsoft
  • Windows
  • Borland
  • Content.IE5
  • Mozilla
  • Framework
  • Temp
  • Torrents
  • Torrent
  • I386

The ZekwaCrypt cryptovirus is quite likely to delete the Shadow Copies from the Windows operating system by utilizing the following command:

→vssadmin.exe delete shadows /all /Quiet

Continue to read below to check out what kinds of ways you can try for potentially recovering at least a part of your data.

Remove ZekwaCrypt Ransomware and Restore .zekwakc Files

If your computer got infected with the ZekwaCrypt ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as you can before it can have the chance to spread further and infect other computer systems. You should remove this ransomware and follow the step-by-step instructions guide provided down below.

Manually delete ZekwaCrypt from your computer

Note! Substantial notification about the ZekwaCrypt threat: Manual removal of ZekwaCrypt requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove ZekwaCrypt files and objects
2.Find malicious files created by ZekwaCrypt on your PC

Automatically remove ZekwaCrypt by downloading an advanced anti-malware program

1. Remove ZekwaCrypt with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by ZekwaCrypt
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.