[email protected] Ransomware Removal (+File Recovery) Feb. 2019 Update

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 UpdateBlammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 UpdateBlammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update


This page aims to help you remove [email protected] Ransomware for free. Our instructions also cover how any [email protected] file can be recovered.

There are few types of malware out there that can match the infamous Ransomware virus category in terms of maliciousness and ability to cause problems to the targeted users. Typically, such viruses are all about locking a certain element of your computer system and later blackmailing you for the restoration of the access to the said element. In the lines below, you will be presented with some detailed information about one such example of a Ransomware virus that goes under the name of [email protected] As far as we know, this particular infection belongs to the so-called cryptovirus Ransomware subcategory – a type of Ransomware viruses that target the personal data files of the user seeking to encrypt them in order to make them inaccessible for the unfortunate victim who will be later required to make a ransom payment for the decryption key that can unseal the files.

This is a fairly new piece of malware and each day, many users are falling victims to it. If you wish to learn how to protect against this newly-discovered threat, make sure to stay with us until the end of this current article. On the flip side, if your machine has already gotten infiltrated by this nasty virus program, we can offer you a removal guide with instructions on how to eliminate the threat. Just know that removing the virus doesn’t necessarily mean getting the locked-up files restored. To recover the encrypted data, additional measures need to be taken. We have that covered too within our guide – several methods for file restoration will be offered to you. However, unfortunately, we can give no guarantee that any of those methods will work in your instance. Newer Ransomware versions such as [email protected] tend to be highly-advanced and there’s oftentimes no effective way of restoring any data locked by them.

[email protected] Ransomware Removal


Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/

Scan Results

Virus Scanner Result
Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 UpdateClamAV
Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 UpdateAVG AV
Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 UpdateMaldet

After you open their folder, end the processes that are infected, then delete their folders. 

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

If there are suspicious IPs below “Localhost” – write to us in the comments.

Type msconfig in the search field and hit enter. A window will pop-up:

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.

  • Please note that ransomware may even include a fake Manufacturer name to its process. Make sure you check out every process here is legitimate.

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update

Type Regedit in the windows search field and press EnterOnce inside, press CTRL and F together and type the virus’s Name. 

Search for the ransomware  in your registries and delete the entries. Be extremely careful –  you can damage your system if you delete entries not related to the ransomware.

Type each of the following in the Windows Search Field:

  1. %AppData%
  2. %LocalAppData%
  3. %ProgramData%
  4. %WinDir%
  5. %Temp%

Delete everything in Temp. The rest just check out for anything recently added. Remember to leave us a comment if you run into any trouble!

Blammo@cock.li Ransomware Removal (+File Recovery) Feb. 2019 Update 

How to Decrypt [email protected] files

We have a comprehensive (and daily updated) guide on how to decrypt your files. Check it out here.

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!

What makes a Ransomware so devastating?

This malware category significantly differs from most other types of computer viruses that you might have heard about. For instance, a typical Ransomware wouldn’t not actually try to cause any initial damage to any part of your system. After all, the hacker needs to keep everything intact so that they would have leverage upon which they’d be able to carry out their blackmailing agenda and force you to pay the ransom – if your PC system or files get damaged in any way, you might get discouraged from making any payment.

This “harmless” nature of the Ransomware category is actually one of the things that makes viruses like [email protected] so dangerous. Oftentimes, there will not be any visible or easily-detectable symptoms of the infection. Furthermore, as the encryption process used by the virus isn’t an inherently malicious one, many antivirus tools that potential Ransomware victims might have, could prove to be incapable of spotting the threat in time and intercepting it before it has sealed the targeted data files. In addition, as we already mentioned in the previous paragraph, it is oftentimes really difficult to actually handle such a virus and restore the access to the locked-up data.

Due to all that we mentioned above, malware programs like [email protected] truly are some of the worst malware threats out there and everybody needs to be really careful in order to avoid landing such a virus on their computer.

The ransom

Following the complete encryption of all targeted files, [email protected] would likely generate a message on the desktop of the infected PC or within the folder directory of the locked documents. The message would state the ransom demand and provide details regarding how the money transfer needs to be made.

Here, we must warn you that opting for the ransom payment might not be the wisest of options. Though hackers are likely to send you the key for the encrypted data, you can never be certain that this would happen. Many victims of Ransomware have had the misfortune of sending the demanded money yet receiving nothing in return. Therefore, keep that in mind and always seek and try alternative solutions instead of directly giving in to the cyber-criminals’ demands.

Protection of your PC and files

The most important rule when it comes to protecting your computer against any sort of malware is making sure to stay careful when online. Avoiding shady web locations and interaction with suspicious content that you see online (suspicious ads, banners, pop-ups, spam messages, etc.) is of utmost importance if you want to stay safe. Also, a good antivirus program will help you fend off viruses such as Trojans – a commonly used tool for distributing Ransomware. Also, never forget to backup important files that you don’t want to lose – this is one extremely effective way of dealing with potential future Ransomware attacks.


Name [email protected]
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms Your PC might start using more RAM and CPU time than usual during the encryption process which might give away the Ransomware infection.
Distribution Method Shady web-ads ad fake offers and update requests, Trojans used as backdoor, spam social network and e-mail messages, illegal websites, etc.
Data Recovery Tool [banner_table_recovery]
Detection Tool

Keep in mind, SpyHunter’s malware detection tool is free. To remove the infection, you’ll need to purchase the full version. More information about SpyHunter and steps to uninstall.


About the author


Brandon Skies

Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

Leave a Comment