Ransomware

Remove LooCipher Virus Ransomware (+File Recovery)


How irritating is this problem? (6 votes, average: 5.00)
Loading...

This page aims to help you remove LooCipher Virus Ransomware for free. Our instructions also cover how any .lcphr file can be recovered.

LooCipher Removal guide

The LooCipher Virus will encrypt your files with the .lcphr extension and will demand ransom for decrypting them.

When the encrypting of the files is finished, you will find a @Please_read_me.txt file with instructions for you to follow.

Q:  What happened to my files?
A:  All your important files (including those on the network disks, USBs, etc.) have been encrypted using a strong algorithm with a private and unique key generated for you.

Q:  Where is my key?
A:  Your key is stored in our TOR servers in order to preserve the anonymity.

Q:  What do I do?
A:  You need to make a Bitcoin payment for the decryption.
    Please send Ä300 (~$330) worth of Bitcoin to this address: 1K61gjGnsRsWNHm3kRZezgXD1r6mSpzeWp

Q:  Can I recover my files by other means?
A:  No. There is not such a computing power nowadays to find this key within the time of a human could live. Even if you use Tianhe-2 (MilkyWay-2), currently the fastest supercomputer in the world, it will take millions of years.

Q:  How much time do I have?
A:  You have 5 days since your files were encrypted. Specifically until XXXX/XX/XX 09:15. After this period your key will be automatically destroyed (except for the case of having made the transaction within the period but because of the transaction remains pending of being confirmed by the blockchain this time period is excedeed. In this case the key will remain safe throughout all this “pending of being confirmed” status of your transaction and additionally it will remain 7 days more after your transaction is confirmed in order that you have enough time to recover your files)

Q:  How can I trust?
A:  We strongly guarantee you can recover your files. Besides, if we didn’t do it nobody trust us and we wouldn’t get any payment. In fact, we built the decryptor in the own encryptor software as well in order to make the decryption process as simple as possible for you, thus avoiding having to download an external decryptor. Just make the payment, click and if your payment is approved the button will become enable to click.

 

If all of the data on your computer has suddenly become inaccessible, with all the files receiving some new and unfamiliar file extension that no software you have can recognize, then you have most definitely gotten your computer attacked by a Ransomware and this Ransomware has encrypted your files. This is how those nasty viruses operate – upon infiltrating their victims’ computers, they scan the hard-drives for files that may be important and valuable to the user and then they lock them with the help of their advanced encryption algorithms. Usually, it all happens without visible symptoms and signs and most users only find out about the malware infection once they realize that their files cannot be opened any more. LooCipher, .Truke and .Neras are an example of such an encryption-based infection that was recently reported. Though it is a very new threat, the number of users attacked by it is already quite big and more and more are getting infected as we are writing this post. Since you are probably on our site, reading this article about LooCipher Ransomware, because you are yet another victim of this insidious infection, it would be a good idea if you read the whole write-up and then have a look at the LooCipher Virus removal guide available on this page. The instructions there and the linked removal tool should enable you to get rid of this infection and liberate your computer. Removing the cryptovirus, however, is not the same as getting your files back – it is only the first step towards recovering your data. In order yo restore some of the files, you will need to try some specific data-restoration methods. Some such methods can be found in our guide but we can give no promises or guarantees with regard to the effectiveness of those methods. A big problem with Ransomware cryptoviruses like this one is that a method that may have worked against an older version may not be all that effective against a newer one.

But what about the ransom – is paying it such a bad idea?

Once the files get locked, there is only thing left that the cryptovirus is supposed to do – it is supposed to present you with a note from the hackers, in which they state that there is a special decryption key in their possession, which key can restore your files. And all that they want in exchange for this key is for you to pay them a certain amount of money. Needless to say, the note also includes instructions on how to pay the said money. Of course, this is the end-goal of all such infections – to extort money from their victims through blackmailing. However, if this can restore your files and the demanded sum is manageable, why shouldn’t you pay? Well, the simple answer is, because you can’t know if you are really going to get that promised key from the hackers. Many users have lost their money in this way only to realize in the end that they are still not getting their files back. Therefore, we believe that you should first exhaust all other alternatives before considering trying this one last option.

SUMMARY:

Name LooCipher
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms There are usually no symptoms – the only thing that some users may notice is an unusual and unexpected decrease in the free hard-disk space that they have on their computers while the encryption process is still ongoing.
Distribution Method Malicious and misleading ads inside unsafe sites, illegally distributed software, various types of spam and more.
Data Recovery Tool Currently Unavailable
Detection Tool

Remove LooCipher Virus Ransomware


Step1

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

malware-start-taskbar

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at: https://howtoremove.guide/online-virus-scanner/




Scan Results


Virus Scanner Result
ClamAV
AVG AV
Maldet


After you open their folder, end the processes that are infected, then delete their folders. 

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.

Step3

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

hosts_opt (1)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Type msconfig in the search field and hit enter. A window will pop-up:

msconfig_opt

Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.

  • Please note that ransomware may even include a fake Manufacturer name to its process. Make sure you check out every process here is legitimate.

Step4

WARNING!
To remove parasite, you may have to meddle with system files and registries. Making a mistake and deleting the wrong thing may damage your system.
Avoid this by using SpyHunter - a professional Parasite removal tool.

Keep in mind, SpyHunter’s malware & virus scanner is free. To remove the infection, you'll need to purchase its full version. More information about SpyHunter and steps to uninstall.

Type Regedit in the windows search field and press EnterOnce inside, press CTRL and F together and type the virus’s Name. 

Search for the ransomware  in your registries and delete the entries. Be extremely careful –  you can damage your system if you delete entries not related to the ransomware.

Type each of the following in the Windows Search Field:

  1. %AppData%
  2. %LocalAppData%
  3. %ProgramData%
  4. %WinDir%
  5. %Temp%

Delete everything in Temp. The rest just check out for anything recently added. Remember to leave us a comment if you run into any trouble!

Step5 

How to Decrypt LooCipher Virus files

We have a comprehensive (and daily updated) guide on how to decrypt your files. Check it out here.

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


Leave a Comment