.aescrypt Ransomware Description
The .aescrypt Ransomware is a file locker Trojan, and one more member of the never stop growing family of the Scarab Ransomware. The .aescrypt Ransomware is spread via corrupted email attachments contained in spam emails that, when opened by the computer users, installs the .aescrypt Ransomware on their machines. The .aescrypt Ransomware, just like other members of the Scarab family, has only one objective: encrypts the user-generated files so that it can ask for a ransom, which supposedly, will pay for a decryption software that will bring back the compromised data. As soon as the .aescrypt Ransomware finishes encrypting the victims' files, it will display its ransom note in a file named 'PLEASE READ.TEXT' that reads:
' All your files have been encrypted due to a security problem with your PC.
For information on decoding, please write to the e-mail GeorjeHalique@protonmail.com
Your files are now encrypted!
Your personal identifier:
Now you should send us email with your personal identifier.
Contact us using this email address: GeorjeHalique@protonmail.com
Free decryption as guarantee!
Before paying you can send us up to 3 files for free decryption.
The total size of files must be less than 5Mb (non archived), and files should not contain
valuable information (databases, backups, large excel sheets, etc.).
* Do not rename encrypted files.
* Do not try to decrypt your data using third party software, it may cause permanent data loss.
* Decryption of your files with the help of third parties may cause increased price
(they add their fee to our) or you can become a victim of a scam.'
The ransom note doesn't specify the ransom amount and offers to decrypt three files for free as a proof that they have the decryption software, an email address for contact, GeorjeHalique@protonmail.com and a personal identifier that should be used on the email the victim must send to the criminals.
Do not accept their demands. However, you should send the three files to be decrypted so that at least this three will be back to normal. Then, use an anti-malware utility to remove the .aescrypt Ransomware from your computer and, if available, recover your data using your file backup. Otherwise, look for alternative recovery methods and hope for the best.
Do You Suspect Your PC May Be Infected with .aescrypt Ransomware & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like .aescrypt Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.