Green_Ray Ransomware - How To Remove?

 

Green Ray refers to a natural phenomenon of a flash of green light sometimes seen on the horizon as the sun sets. It is believed that after seeing this expression you will gain insight into your true self. In this case of Green_Ray Ransomware, it can be interpreted that this virus appears right before the ‘sunset’ of your files that become encrypted and are sentenced to exist in the dark. However, after suffering from this Trojan, you might get a deeper intuitive understanding of your computer safety and be more cautious. So, basically, the creators tried to be very ironic with this title.

About Green_Ray Ransomware

Green_Ray ransomware comes as a virus that has the needed proficiency in infecting users’ computers and proceeding to strip their files naked of any possible purpose. Earlier editions of the equivalently modeled Trojans include: JohnyCryptor or Mahasaraswati. People who have experienced the demands by these ransomware viruses might start flinching from bitter memories.
After entering the picture, Green_Ray ransomware does not wait around and quickly starts encrypting various files from your computer. These casualties are identified with the mark of “green_ray(@)aol.com.xtbl” that exposes the locked content to the user. However, ransomware is not capable of encrypting files that are bigger than 50MB. Encrypted files can be saved only with the help from a private decryption key that only hackers can reach.

Green_Ray ransomware generates a new background image for your computer and a file called “How to decrypt your files.txt”. The new desktop appearance is appealing to the eye but that does not indicate that this ransomware is not planning to play dirty. It dictates all the rules and shocks users by demanding for a solid ransom for your files. The price can differ for users as it depends on the material that is locked. Usually, these threats aim for prices from 0.30 to 2 Bitcoins. This system of transactions is favored by criminals as their identity can successfully remain concealed.

What troubles us is the untrustworthy actions known to be performed by the people behind this virus. Even after you deliberately transfer them the needed amount of bitcoins, your locked files can remain just like that. Hackers do not bother wasting their time to actually decrypt your files. They have better deeds to do: infect other computers and play the same game with them.

How is Green_Ray Spread?

The usual course of ransomware viruses is known to the researches. Still, the problem remains that people are clueless to the dangers of the Internet. Email accounts are regularly flooded with spam letters, on the hunt for another victim. The composed messages might appear to be initiated from trustable sources. However, never dare to download attachments from these letters. Curiosity killed the cat. Do not be that ‘cat’ and clean out your Spam folder regularly. In addition to this, start browsing more responsibly and do not visit shady-looking websites or be inattentive during installation processes of free software.

How to Decrypt Files Encrypted by Green_Ray Ransomware?

Obeying to the rules of Green_Ray Ransomware will not lead you anywhere. Hackers will vanish from the surface and leave you forever waiting for decryption that will never come. You can try to restore your files with the help of PhotoRec or R-studio tools. However, there is no guarantee that they will be capable of performing this life-saving procedure. If you managed to get your files stored in backup sites, you can recover them there.

Green_Ray Ransomware might be undetected by less efficient antivirus software because of its ability to disguise itself like a Trojan. If you have Reimage, SpyHunter, StopZilla or Malwarebytes, they will preempt the situation by detecting it. Even after being infected, they will find a way to help you.

How to recover Green_Ray Ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again. CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before Green_Ray Ransomware has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3

Step 2. Complete removal of Green_Ray Ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Reimage and remove all malicious files related to Green_Ray Ransomware. You can check other tools here.


Step 3. Restore Green_Ray Ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually Green_Ray Ransomware tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so.

Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer.

a) Native Windows Previous Versions

Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.


Previous version
b) Shadow Explorer

It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover Green_Ray Ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:

  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download Data Recovery Pro (commercial)
  • Install and scan for recently deleted files. Data Recovery Pro

Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.

Manual removal

 

Important Note: Although it is possible to manually remove Green_Ray Ransomware, such activity can permanently damage your system if any mistakes are made in the process, as advanced spyware parasites are able to automatically repair themselves if not completely removed. Thus, manual spyware removal is recommended for experienced users only, such as IT specialists or highly qualified system administrators. For other users, we recommend using Reimage or other tools found on 2-viruses.com.

Processes:
Extensions:
External decryptor:
       
 

About the author

 - Main Editor
I have started 2-viruses.com in 2007 after wanting to be more or less independent from single security program maker. Since then, we kept working on this site to make internet better and safer place to use.
 
June 2, 2016 08:53, January 4, 2017 06:14
   
 

Leave a Reply

Your email address will not be published. Required fields are marked *