The page in front of you was written as help for you to remove _Recovery_ Virus Ransomware. The _Recovery_ removal guide below is practically identical to the one for the TeslaCrypt variant that uses RSA-4096 and the .mp3 file extension, as they are exactly the same thing. The _Recovery_ Virus Ransomware is called as such by users who take the name of the ransom note as the name. Most likely you have encountered one of the newer TeslaCrypt variant on your PC, the ones with the .micro or .mp3 suffix. This effectively means you are suffering from the newest and sharpest threats out there, and we will do everything we can to help you.
Please, read this! It is vital for the safety of your PC! If you are reading this article, your files have been overtaken by _Recovery_, and you are very aware what the criminals want from you. What you are definitely not aware of in the slightest, however, is the following:
- There is almost a 100% a Trojan Horse in your system. If you do not know what that is, think of the Trojan horse from Greek mythology – the one that tricked the Trojans into opening their doors. This is what a PC virus of the Trojan horse classification does. It allows someone remote access to your computer without your approval. It’s extremely important to remember this, since it is very unlikely the Trojan just disappeared after _Recovery_ got in. It not only employs the open-the-door policy we mentioned, but it may lie dormant for months, waiting to give hackers full access to your PC.
- _Recovery_ has been recorded to infect users via a Trojan. And Trojans are famous for installing a keylogger, that is to say, an additional piece of software able to track anything you write on your keyboard. So any passwords and accounts you input – like the one that is needed to pay the ransom the ransomware creators want from you. The main point is that even if you pay up and you get your files back, there is nothing stopping those people from stealing your bank accounts at a later date. Remember, the only reason they abide by their own rules is so that they don’t scare people away. But once the _Recovery_ VIrus dies down as a whole, they may come back and take advantage of you.
As a general category, ransomware are the most lethal malware classification on the planet right now, and they get more inventive and sophisticated with each new iteration. This spells a lot of trouble for you, since you can possibly encounter something not covered by this removal guide. Cyber criminals are always on the prowl to determine how they can maximize profit by squeezing the full amount of money they can from you. There have been tricks in the past. For example, a built-in timer that scares you by saying the decryption key for your files will be destroyed if you do not cough up the dough in the next 24 to 48 hours. Alternatively, we’ve seen an entire chat room where you can, mind-bogglingly, renegotiate the fee you need to pay with the people trying to rob you. And some people actually agree to do that.
I sincerely hope you are not one of those people. But if you would be hypothetically tempted to acquiesce to such a course of action, maybe there is one thing I can say persuade you away from it. If you pay, you are doing nothing but encouraging not only the people who steal from you, but anyone who wants to imitate them. And you are furthering their schemes and allowing them to practically hire teams of dedicated developers who will make the virus completely unbreakable. This will translate not only in bigger ransoms people will need to pay, but also in a higher number of “casualties” – information lost to the malicious software.
|Danger Level||High (This is the pinnacle of PC viruses. There is nothing worse you can encounter)|
|Symptoms||There is an extension that overtakes all of your files and encrypts them. A ransom is demanded to free the files.|
|Distribution Method||Always through the help of a Trojan horse. Possible routes the Trojan may take include: strange e-mails you should not be receiving, but you find in your mailbox and you click on them; this is called a macro virus; corrupted links, usually shortened that lead to a fake destination and infect you; corrupted advertisements.|
|Detection Tool||Ransomware are notoriously difficult to track down. Use SpyHunter – a professional parasite scanner – to make sure you find all files related to the infection.|
_Recovery_ Virus Ransomware Removal
Readers are interested in:
Reboot in Safe Mode (use this guide if you don’t know how to do it).
This is the first preparation.
To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.
If you want to avoid the risk, we recommend downloading SpyHunter - a professional malware removal tool - to see whether it will find malicious programs on your PC.
The first thing you must do is Reveal All Hidden Files and Folders.
- Do not skip this. _Recovery_ may have hidden some of its files.
Hold the Start Key and R – copy + paste the following and click OK:
A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:
If there are suspicious IPs below “Localhost” – write to us in the comments.
Type msconfig in the search field and hit enter. A window will pop-up:
Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.
Press CTRL + SHIFT + ESC simultaneously. Go to the Processes Tab. Try to determine which ones are a virus. Google them or ask us in the comments.
WARNING! READ CAREFULLY BEFORE PROCEEDING!
Right click on each of the virus processes separately and select Open File Location. End the process after you open the folder, then delete the directories you were sent to.
Type Regedit in the windows search field and press Enter. Once inside, press CTRL and F together and type the virus’s Name.
Search for the ransomware in your registries and delete the entries. Be extremely careful – you can damage your system if you make a big mistake.
Type each of the following in the Windows Search Field:
Delete everything in Temp. The rest just check our for anything recently added. Remember to leave us a comment if you run into any trouble!
How to Decrypt files infected with _Recovery_
There is only one known way to remove this virus successfully – reversing your files to a time when they were not infected. There are two options you have for this:
The first is a full system restore. To do this type System Restore in the windows search field and choose a restore point. Click Next until done.
Your second option is a program called Shadow Volume Copies.
Open the Shadow Explorer part of the package and choose the Drive (C or D usually) you want to restore information from. Right click on any file you want to restore and click Export on it.