Towz Virus

7-day Free Trial w/Credit card, no charge upfront or if you cancel up to 2 days before expiration; Subscription price varies per region w/ auto renewal unless you timely cancel; notification before you are billed; 30-day money-back guarantee; Read full terms and more information about free remover.

*Towz is a variant of Stop/DJVU. Source of claim SH can remove it.

Towz

Towz is ransomware-based infection that hackers use to blackmail web users for money. Towz is file encrypting software that keeps important user information hostage to request a ransom for its decryption.

Towz 1024x603
The Towz ransomware will leave a _readme.txt file with instructions

Users typically need a lot of support in removing Towz from their computers and restoring their encrypted files to their normal state. That’s why, if you have been infected by this ransomware, we suggest you read carefully the next lines where we will explain everything you need to know about this especially risky infection. The paragraphs below are filled with information on how this virus infected your computer, how it encrypts your files without any visible symptoms and how you can remove the infection from your system without causing more harm. To help even inexperienced web users to deal with Towz, below we have created a full removal guide with a free file-recovery section. A professional Towz removal tool is also available to help remove the harmful infection as quickly and as risk-free as possible.

The Towz virus

The Towz virus is malicious software that operates as ransomware and is programmed to detect and encrypt a broad range of file formats on a given computer. Office documents, databases, archives, images, audio, and video files, as well as any other frequently used digital data, are of great interest to the Towz virus.

Towz Virus 1024x616
The Towz virus will encrypt your files

In general, all files that the ransomware considers of great value to the victim are encrypted using a highly complicated algorithm that cannot be reversed without a key for decryption. The attack of the infection normally happens in stealth and users are not able to detect any visible symptoms that can hint them that they are a subject of an extortion virus. Sadly, having an antivirus program may not be very effective in detecting and stopping a threat like Towz, Adww or Fargo 3 since the file encryption that this infection uses to restrict access to user files does no damage to anything and simply renders the targeted digital information as inaccessible. By default, most security programs consider the file encryption as a data protection method and do nothing to stop it or notify the victims.

The criminals behind Towz, however, use this data protection method as a framework for an online extortion scheme. After encryption is applied to the victims’ most valuable files, a ransom demanding message pops-up on the screen of the infected machine. The message states that if you want to obtain the decryption key that can recover your files, you’ll have to pay a ransom.

The Towz file encryption

The Towz file encryption is a malicious process that enables hackers to apply unbreakable encryption code to user files in order to restrict access to them. The Towz file encryption is typically reversible, but the user must pay for the decryption key.

Of course, it is up to the individual user whether to pay the demanded ransom or not. However, meeting the demands of the hackers will NOT guarantee that your data will be restored. In fact, the victims may never get a decryption key in return for their money. This is why our “How to remove” team advises that anonymous criminals should not be given any money. Instead, we propose that Towz’s victims take the necessary steps to remove Towz from their computers through alternative means.

SUMMARY:

NameTowz
TypeRansomware
Data Recovery ToolNot Available
Detection Tool

anti-malware offerOFFER Read more details in the first ad on this page, EULA, Privacy Policy, and full terms for Free Remover.

*Towz is a variant of Stop/DJVU. Source of claim SH can remove it.

Towz Ransomware Removal


Step1

First, make sure that you Bookmark the page of this guide so you can quickly get back to it and complete all the ransomware-removal steps, as, at some point, you will be required to quit the browser.

Next, for the easier detection of Towz, we recommend that you enter the infected computer in Safe Mode If you don’t know how, use the instructions from the active link and then, get back to this guide that you have bookmarked.

Step2

WARNING! READ CAREFULLY BEFORE PROCEEDING!

*Towz is a variant of Stop/DJVU. Source of claim SH can remove it.

With the computer in Safe Mode, press CTRL + SHIFT + ESC keys from the keyboard. This will call up the Windows Task Manager app on the screen. Select the Processes Tab carefully search for problematic processes that are related to Towz.

malware-start-taskbar

If you have a suspicion that a certain process is dangerous, right-click it and choose Open File Location from the menu that pops up. When you get to the file location of the process, drag its files in our free online virus scanner and start a scan:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Loading
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.


    When you see the results from the scan, you will know if the suspicious process is really dangerous or not. In case the files get flagged as malicious, go to the Processes tab, right-click on the related process and select End Process Tree. Then, go to the file location and delete all the files and folders that are found there.

    Step3

     

    If you have a suspicion that your computer is hacked, use the following instructions to check your Hosts file for suspicious IP addresses below Localhost:

    First, press the Start and R keys from the keyboard to open a Run window. In that window, copy the following command:

    notepad %windir%/system32/Drivers/etc/hosts

    Press the Enter key from the keyboard. A file named Hosts will open on the screen. In this file, find where it is written Localhost and check for questionable IPs that are listed under it. See the image below for more clarification on what should Virus Creator IPs look like:

    hosts_opt (1)

     

    The presence of numerous IPs below Localhost may sometimes indicate that the computer is hacked, That’s why if you detect any, it is best to write to us in the comments, so we can take a look at them and advise you on what to do next.

    Next, use again the Start and R key combination to open a new Run window. This time, type msconfig in the text field and hit enter. The System Configuration app will immediately open up.

    msconfig_opt

     

    From the tabs that you see, select the Startup tab. Then carefully look at all the entries that have checkmarks and try to detect the entries that could be linked to Towz. Uncheck these entries, as well as any other entries you don’t trust or have an “Unknown” Manufacturer and look suspicious.

    Step4

     

    Then, again use Start and R keys, open a new Run window and type Regedit. Press Enter and this will launch the Registry Editor. Ransomware threats like Towz may add some entries in the Registry which you need to detect and remove if you want to get rid of the threat fully. 

    Once in the Editor, press CTRL and F keys to use the Find function that will help you to easily search the Registry for entries with the name of the threat. Type the name of the ransomware in the text field and then press Find Next. Delete every result that is detected and perform the search as many times as needed until no more results with that name are found.

    Attention! Be extremely careful as any deletions in the Registry that are not linked to Towz may cause system corruption! If you are not sure what needs to be deleted, you better use a professional removal tool to prevent involuntary system damage!

    Next, type each of these lines in the Windows Search Field:

    1. %AppData%
    2. %LocalAppData%
    3. %ProgramData%
    4. %WinDir%
    5. %Temp%

    Open the folders that are found and check them for any recently added files and folders. When you go to the Temp folder, delete everything that is found in that folder.

    If, during any of the steps in this guide, you find yourself in trouble or have questoins, please feel free to write to us in the comments below this post and we will do our best to help you.

    Step5

    How to Decrypt Towz files

    If you are trying to recover from a ransomware attack, it is important to bear in mind that the variant of ransomware that has infected you may require a different approach and special set of techniques to be totally eliminated. If Towz is the variant that has infected your computer, we will suggest a specific method for dealing with and a file-recovery tool that might be of assistance in your specific case. You can detect if you’ve been infected with Towz by looking at the extensions that it has added to the encrypted files.

    Before trying to decrypt ransomware-encrypted files, you must first make sure that the virus is completely removed from your machine. If you don’t do it, any files that you manage to recover (as well as any backup sources that you connect) may get encrypted again. Professional anti-virus software, like the removal tool and the free online virus scanner on our site, can help you get rid of Towz and other sophisticated threats quickly and without risk of deleting something else that should not be removed.

    New Djvu Ransomware

    Users all over the world are being targeted by the latest Djvu Ransomware variant, known as STOP Djvu. The files encrypted by this malware typically end with the .Towz extension, making it easy to recognize the variant. Unfortunately, decrypting data encoded with this new variant may be very difficult, but still, you can try to regain access to your files by using the decryptor from the link we provided below:

    https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu 

    Once you save the decryptor executable file, click on it and select Run as Administrator, then click the Yes button to confirm. Carefully read the license agreement and follow the on-screen instructions, then press the Decrypt button to start the decryption process. It is important to note that this tool will not be able to decode files encrypted using online encryption or unknown offline keys.

    In case you need more assistance to remove Towz and its traces from your system, you may consider investing in a professional removal program that can deal with the infection and protect the computer in the future. The free online virus scanner from the link is another tool that you can use to scan suspicious-looking files individually. 


    About the author

    Lidia Howler

    Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

    Leave a Comment

    We are here to help! Use SpyHunter to remove malware in under 15 minutes.

    Not Your OS? Download for Windows® and Mac®.

    * See Free Trial offer details and alternative Free offer here.

    ** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

    Spyware Helpdesk 1