Nemucod-AES ransomware virus. How to remove? (Uninstall guide)

removal by Jake Doevan - - | Type: Ransomware
12

Nemucod-AES ransomware takes victim's files hostage to demand ransom

Nemucod-AES virus

Nemucod-AES ransomware [1] is a data-encrypting virus which earned its title by stealthily infiltrating computers, rendering the containing files unreadable with the help of AES-128 and RSA-2048 encryption algorithms, and demanding 0.11471 Bitcoins for their decryption.

The criminals choose cryptocurrency [2] as means of payment deliberately. This method guarantees the anonymity of money transactions and allows the perpetrators to escape prosecution.

That’s why you won’t get any justice if the hackers disappear with your money after you pay for the data recovery key. This should be a sufficient reason to remove Nemucod-AES from the PC rather than collaborate with the criminals.

Typically to most ransomware, the virus developers drop a ransom note on which they list out all the data recovery conditions and instruct victims where they should purchase and transfer the ransom. Here is a transcript of Decrypt.hta file:

ATTENTION!
All your documents, photos, databases and other important personal files were encrypted using a combination of strong RSA-2048 and AES-128 algorithms.
The only way to restore your files is to buy decryptor. Please, follow these steps:
1. Create your Bitcoin wallet here:
xxxxs://blockchain.info/wallet/new
2. Buy 0.11471 bitcoins here:
https://localbitcoins.com/buy_bitcoins
3. Send 0.11471 bitcoins to this address:

4. Open one of the following links in your browser:
xxxx://elita5.md/counter/71GCn9vz73FNDmoVxgxXqjo7dSXyLmfnTDt
xxxx://artdecorfashion.com/counter/71GCn9vz73FNDmoVxgxXqjo7dSXyLmfnTDt
xxxx://goldwingclub.ru/counter/71GCn9vz73FNDmoVxgxXqjo7dSXyLmfnTDt
xxxx://perdasbasalti.it/counter/71GCn9vz73FNDmoVxgxXqjo7dSXyLmfnTDt
xxxx://natiwa.com/counter/71GCn9vz73FNDmoVxgxXqjo7dSXyLmfnTDt
5. Download and run decryptor to restore your files.
You can find this instruction in “DECRYPT” file on your desktop.

Ransom notes can tell a lot about the ransomware developers, their target audience, and their true intentions. In this case, we have to admit that the note is professionally made and detailed, so the hackers behind it are probably native English speakers and serious enough not to leave spelling or grammatical errors on the note.

The ransomware’s target audience is most likely English as well, though it should not stop the virus from infecting users in the European countries, say, Germany or Sweden [3].

Despite where in the world the virus hits, the first thing infected computer owners should do is perform Nemucod-AES removal.

Decrypt files encrypted by Nemucod-AES ransomware for free

Victims who have their files compromised by this ransomware can use a free NemucodAES decryptor to restore all data. The decryptor was successfully created by Emsisoft researchers on July 12th, 2017.

So if your PC was struck by the discussed ransomware and you were hesitating whether to pay up or not, forget these thoughts already. You can restore your files without paying a cent. To find the decryption instructions, look at data recovery section below this post.

The most important thing is to decontaminate the virus and to prevent if from additionally damaging your system. Use the decryptor only after removing the virus from the computer system.

The ransomware is distributed via fraudulent UPS spam

There are several ways Nemucod-AES ransomware can spread around the web. A few of the main vectors may be:

  • compromised downloads,
  • fake software updates,
  • deceptive ads,
  • exploit kits.

Nevertheless, the most salient method of Nemucod-AES distribution campaign are spam emails disguised as UPS service notices. In the two examined samples of spam emails, experts found files called UPS ground-Delivery-005156577.doc.js and UPS ground-Receipt-4424638.doc.js which both obfuscated the malicious JavaScript code by imitating regular Word files.

Please remember this deceptive distribution technique the next time you are on your email. Do not download or, not to mention, open the attachments which may have been sent to you by some unfamiliar senders, because it might be that you are allowing a vicious ransomware on your PC.

Suggestions for Nemucod-AES removal

If you have realized that you can no longer access your files anymore and you see a ransom note demanding you to pay money for their recovery, you should wait no longer and start Nemucod-AES removal procedure immediately.
We recommend you take advantage of specialized utilities, such as Reimage or Malwarebytes Anti Malware, to scan your device automatically and locate all the bad components that might be scattered around your system.

The automatic removal will only take a few minutes, if the ransomware does not attempt to block your security utility and prevent its extermination.

Even if it does block these utilities, you can follow virus decontamination instructions below the article and help your antivirus remove Nemucod-AES from the PC.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove Nemucod-AES ransomware virus you agree to our privacy policy and agreement of use.
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Compatible with OS X
What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Nemucod-AES ransomware virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.

More information about this program can be found in Reimage review.

More information about this program can be found in Reimage review.

Manual Nemucod-AES virus Removal Guide:

Remove Nemucod-AES using Safe Mode with Networking

Reimage is a tool to detect malware.
You need to purchase Full version to remove infections.
More information about Reimage.

Here you will learn how to decontaminate the virus without extra tools. But don't forget to scan your device with sophisticated security tool once you've done with the following steps:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Nemucod-AES

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Nemucod-AES removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Nemucod-AES using System Restore

Reimage is a tool to detect malware.
You need to purchase Full version to remove infections.
More information about Reimage.

If technique described above won't help run your antivirus, you should try performing the following operation

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Nemucod-AES. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Nemucod-AES removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Nemucod-AES from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by Nemucod-AES, you can use several methods to restore them:

Tackling encrypted data using Data recovery pro

Below, we explain how to use Data Recovery Pro and potentially recover some of your lost data

Rolling back the encrypted files using Windows Previous Versions feature

The guide to Windows Previous Versions feature use is provided below

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Employing Shadow Explorer for the data recovery

Shadow Explorer is a method you should definitely try out if the virus has not destroyed the Volume Shadow Copies of your files

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Use NemucodAES decryptor

Download NemucodAES decryptor (by Emsisoft) and launch the executable file. Once the User Account Control prompt appears, click Yes. Now you have to be patient, because the decryptor might need a couple hours or so to check your computer system. The decryption tool will display a message once it finds all files. Click OK and then click Decrypt button in the Emsisoft Decrypter application. Stay patient until it decrypts all of your files.

Once you complete the procedure, delete encrypted file copies from the system.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Nemucod-AES and other ransomwares, use a reputable anti-spyware, such as Reimage, Plumbytes Anti-MalwareWebroot SecureAnywhere AntiVirus or Malwarebytes Anti Malware

About the author

Jake Doevan
Jake Doevan - Computer technology expert

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

More information about the author

References

Removal guides in other languages