DoNotChange Ransomware - How To Remove?
We concluded that DoNotChange crypto-virus focuses on English and Russian speaking part of the online society because the ransom note, inserted into victims’ machines, is translated into both of these languages. Naturally, ransomware is known for encrypting files: DoNotChange ransomware will certainly turn files useless, but this specific sample also incorporates identification codes into every encrypted executable. Original filename remains, but is joined by additional information (victim’s ID number and original .cry extension instead of its original one). Good news is that if victims’ ID number is 7ES642406, security researchers are able help them decrypt files completely for free.
More details about DoNotChange ransomware
DoNotChange crypto-virus began its career on the 29th of March, 2017. The things might have looked bright for hackers, but since security researchers are already able to help some of the victims restore their files, the atmosphere should feel more gloomy. Developers of DoNotChange virus made a choice to operate with AES algorithm to encrypt files, generate two keys and store the private one for decryption in their private server. For this key and a program for decoding, crooks require 250 US dollars. The primary instructions do not disclose information about a bitcoin wallet to which the payment should be sent. The to how the DECODE FILES !!!.txt and how to decipher FILES !!!.TXT files direct people to contact hackers via an email.
After victims send their ID numbers to Tom.firstname.lastname@example.org, DE_CODER@mail2tor.com or email@example.com, they will receive further instructions. Presumably, the exact bitcoin wallet will be revealed. However, if victims transmit their ID codes to all three email addresses but receive to response, it is possible to contact crooks in another way. People are supposed to download and install TOR browser. Via this application it is possible to access websites that are not available for users of more popular browsers. 5akvz3kp6qbqmpoo.onion is the site that users should access in case their attempts to establish conversation via email conversation fails.
The title of DoNotChange derived from the fact the ransom note strictly forbids people from making alterations to filenames. If they do, this action could tamper with the possibility of file-restoration. Do not be gullible and do not believe that authors of DoNotChange ransomware will actually intend to share the private key for decryption.
The extension .cry is appended not only by DoNotChange ransomware. CryPy is an older variant that also uses this mark. Quite recently, we disclosed information about a group of hackers that call themselves the Mafia Malware Indonesia. Whether DoNotChange virus could be related back to these crooks it is not confirmed yet. As soon as security researchers disclosed information about their recent discovery, they emphasized that under no circumstances should ransomware victims pay the sum DoNotChange virus demands as a ransom.
Recovering files that DoNotChange ransomware encoded
If your ID number matches 7ES642406, you should contact MalwareHunterTeam via twitter or their official website. It is presumable that they will be able to help decrypt files that DoNotChange marked with .cry extension. Alternative methods of restoring files are explained below, but one thing we like to emphasize. Users should keep data in multiple locations to make sure that in case the data in one location is lost, it would be possible to restore it from another. Back up your data in storages or keep valuable executables in USB flash drives. However, do not keep USBs connected to the device at all times: it is possible that the ransomware will be designed to encrypt files that are found in the flash drive.
How to become infected with DoNotChange ransomware?
An exact way that DoNotChange virus is spread has not been confirmed. We assume that hackers will exploit similar tricks: malicious emails, exploit kits or infected advertisements. You should remember that these are the three most prevalent sources for ransomware infections. The payloads are inserted as attachments to letters and if people download them, they invite a crypto-virus over to play.
Let’s move onto removal of DoNotChange ransomware. Before files are to be restored, victims have to eliminate every trace of malware from their device. Spyhunter, Malwarebytes and Plumbytes can help you initiate and conclude a successful elimination process.
- More details about DoNotChange ransomware
- Recovering files that DoNotChange ransomware encoded
- How to become infected with DoNotChange ransomware?
- Automatic DoNotChange ransomware removal tools
- How to recover DoNotChange ransomware encrypted files and remove the virus
- Step 1. Restore system into last known good state using system restore
- Step 2. Complete removal of DoNotChange ransomware
- Step 3. Restore DoNotChange ransomware affected files using Shadow Volume Copies
- Step 4. Use Data Recovery programs to recover DoNotChange ransomware encrypted files
- Removal guides in other languages
Automatic DoNotChange ransomware removal tools
How to recover DoNotChange ransomware encrypted files and remove the virus
Step 1. Restore system into last known good state using system restore
1. Reboot your computer to Safe Mode with Command Prompt:
for Windows 7 / Vista/ XP
- Start → Shutdown → Restart → OK.
- Press F8 key repeatedly until Advanced Boot Options window appears.
- Choose Safe Mode with Command Prompt.
for Windows 8 / 10
- Press Power at Windows login screen. Then press and hold Shift key and click Restart.
- Choose Troubleshoot → Advanced Options → Startup Settings and click Restart.
- When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings.
2.Restore System files and settings.
- When Command Prompt mode loads, enter cd restore and press Enter.
- Then enter rstrui.exe and press Enter again.
- Click “Next” in the windows that appeared.
- Select one of the Restore Points that are available before DoNotChange virus has infiltrated to your system and then click “Next”.
- To start System restore click “Yes”.
Step 2. Complete removal of DoNotChange ransomware
After restoring your system, it is recommended to scan your computer with an anti-malware program, like Reimage and remove all malicious files related to DoNotChange virus. You can check other tools here.
Step 3. Restore DoNotChange ransomware affected files using Shadow Volume Copies
If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually DoNotChange virus tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so.
Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer.a) Native Windows Previous Versions
Right-click on an encrypted file and select Properties → Previous versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
b) Shadow Explorer
It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Step 4. Use Data Recovery programs to recover DoNotChange ransomware encrypted files
There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
- We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
- Download Data Recovery Pro (commercial)
- Install and scan for recently deleted files.
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.