Adame Ransomware - How to remove

Adame is a computer virus that is classified as ransomware. Why? Because it can completely overwhelm your system, encrypt all personal files stored on it, and then demand a ransom to be paid.

Basically, ransomware is one of the two most scary common viruses – another one is trojan viruses that can steal your sensitive data, gain logins to your online banking, etc. That doesn’t mean that the damage done by Adame ransomware isn’t devastating, though: personal files from documents to movies and music get corrupted by the Adame virus.

Adame Might Ask for $500-$1500 ransom

Here at 2-viruses, we are dedicated to helping our users solve problems regarding computer viruses and online fraud, so we have successfully guided our users through removal guides of severe ransomware infections such as Budak, Kromber, or Godes. However, Adame ransomware is slightly different and restoring the files is a bit more complicated. You see, Adame was spawned by the Phobos family of ransomware – viruses that target businesses and sometimes encrypt the computers of individual PC users. This ransomware is made by cyber-criminals who know what they’re doing and who’ve been extorting people for many months without being caught.

Adame short memo:

ID
Cause
Possible harm
  • Locked files
  • Lost time
  • Lost money
  • Other infections infiltrated into your computer
Solution
  • Remove the virus itself
  • Restore encrypted files
  • Keep your computer protected with anti-malware software

Adame’s ransoms are quite big. If you were willing to deal with the crypto-extortionists and pay them (because they promise to fix your files if you do), you’d be asked for over a thousand dollars. The criminals behind Adame refuse to even deal with anyone who doesn’t have that kind of money.

Please continue reading this article if you have problems regarding this infection, or if you simply want to learn more about ransomware and what it can do to your system. It is said that you have to know your enemy in order to efficiently deal with it, so it’s never a bad idea to learn about online threats that are lurking around the corner. Plus, if you have some thoughts or questions on this particular topic, feel free to contact us at the comments section below.

Adame Ransomware removal

How Adame infects computers

First discovered by a famous malware researcher ’Amigo-A’, Adame ransomware uses a few distribution methods that have allowed Phobos to become one of the most widespread ransomware families:

  • Adame is infiltrated by other malware that was already operating on your computer. Backdoors and trojans that had already infected the computer might be used to download Adame.
  • Pirated and fake software is used to distribute Adame. The ransomware is updated online by the extortionists. It’s disguised as some useful program, like a crack of an Office suite or a free selection of template documents.
  • Adame is sent out in emails as a fake antivirus scanner. Fake Microsoft virus detection emails are used to trick people into running the attached fake antivirus software – which turns out to be the Adame ransomware.
  • Malicious documents and links in emails are also used. Macro viruses, double extensions,  and techniques are used to trick people to download and run Adame without even realizing it.
  • Finally, Remote Desktop Protocol is used by cyber-criminals who guess or steal your password and use it to gain access to your computer. Adame can be installed while your anti-malware tools are all disabled or uninstalled to prevent them from interfering with the ransomware.

Once that is done, there is no way back – the virus will automatically initiate the installation and all malicious files will be downloaded to your computer before you can even blink. Crooks behind Adame virus only needs to upload the installer on your computer, everything else will be done automatically.

Adame ransomware symptoms

The next process after that – your computer will be scanned to detect files that can be encrypted. Unfortunately, Adame is capable of encrypting most of the files, so all your videos, photos or text documents will be blocked. They are using a strong encryption algorithm that changes the structure of your files, so you can’t use them any longer. You will notice an extension “.adame” at the end of every encrypted file, as well as an ID and an email address:

text.doc.id[random-2275].[[email protected]].adame

With or without the new extension, the locked Adame files cannot be opened normally.

Immediately after Adame ransomware is done encrypting your files, you will notice a ransom note on your desktop. It goes like this:

All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected]
Write this ID in the title of your message 1E857D00-2275
In case of no answer in 24 hours write us to this e-mail:[email protected]
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 4Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price.
hxxps://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

We highly suggest avoiding following those instructions. The people behind Adame want you to act quickly and don’t think too much, but paying the ransom can’t guarantee that you will retrieve your files. There are other, better methods to do that thus we recommend to rely on them instead of paying the ransom.

Remove Adame and Restore Files

The very first thing you must do in a situation like this – eliminate the aggressor. You need to remove Adame right away and the best way to do that is to scan your computer with Spyhunter or another trusted anti-malware tool. It will automatically detect and eliminate the infection from your system. Sadly, anti-malware software can’t restore your locked files, so you will have to do that yourself.

It’s not that difficult if you have a valid backup of your hard drive that was created before the virus hit your system. Simply perform a system restore and your files should be good to go once again. If you can’t do that or if it seems to be ineffective, please follow the in-depth instructions provided below.

Try data recovery tools. Some of Adame’s victims have been able to restore a lot of their files with the help of data recovery. Be careful and follow all the procedures.

Automatic Malware removal tools

Download Spyhunter for Malware detection
(Win)

Note: Spyhunter trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions,

Download Combo Cleaner for Malware detection
(Mac)

Note: Combo Cleaner trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions, Refund Policy ,



How to recover Adame Ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before Adame Ransomware has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of Adame Ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to Adame Ransomware. You can check other tools here.  

Step 3. Restore Adame Ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually Adame Ransomware tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover Adame Ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.

2 responses to “Adame Ransomware

  1. Question is why are all these sites putting so much emphasis on Spy Hunter when in reality it does nothing for the infected drive. It doesn’t find one infected file on the drive when there are plenty, Are they paying for these ads? It is a great program and does do a lot in certain instances but this isn’t one of them. I know you guys are some smart individuals and I respect that but give us some real help, most of us are in the process of losing years of work be it through our carelessness or these $#^^^$### who infected our systems, by the way I would love to have 15 minutes alone time. Please help us. Thank-you.

  2. Hi Larry.
    First, don’t get infected and reinfected.
    Some of the ransomware has a keylogger component, that will try to steal your data if you consider paying for them on the infected device. That is why we recommend cleaning computer from the malware.
    As of file recovery, we post several procedures that might work (shadow copies, if turned on and not disabled by malware and file recovery with data recovery program, if the hard drive had enough empty space). Also, we post free decryptors, if one exists. However, in many cases, it takes time for decryptors to be released.

Leave a Reply

Your email address will not be published. Required fields are marked *