Severity scale:  
  (85/100)

Remove C4H ransomware (Removal Instructions) - Bonus: Decryption Steps

removal by Alice Woods - - | Type: Ransomware

C4H is a malicious file-encrypting virus hailing from the Globeimposter ransomware family

C4H ransomware

C4H is a ransomware-type cyber infection that belongs to the infamous GlobeImposter family. Since 2018, a reduction in the persistence of this ransomware family has been observed up until May 2020 when Petrovic, Russian cybersecurity expert, grasped a virus that encrypts files using .C4H file extension and appends “Decryption INFO.html.” 

The ransomware is distributed via trojanized apps, spam emails, or pirated software like cracks. Upon infiltration, it installs Windows boot-up entries, Registry keys, and executables int the Task Manager. Furthermore, it loads an automatic encryption software, which targets non-system files on D: drive and locks them using AES and RSA encryption with the .C4H extension. As a final point, the ransomware generates a ransom note, which presses the victim to contact criminals via chinarecoverycompany@cock.li or chinarecoverycompany@airmail.cc email. 

Name C4H
Geology GlobeImposter
Type Ransomware virus
Extension .C4H
Ransom note Decryption INFO.html
Developer's email chinarecoverycompany@cock.li
chinarecoverycompany@airmail.cc
Virus files  1589462941_QS_pafish.exe or filetype:peexe[1]
Distribution The predecessors of this ransomware tend to spread via Necurs botnet, malicious spam email attachments, pirated software, infected click-to-download ads, and similar. The C4H shows a tendency to mimic its family members
Symptoms The malware initiates a variety of Windows alterations in the first phase. Therefore, errors, terminated AV programs, unresponsive software, crashes, slowdowns, and similar symptoms may be noticed. The second phase encompasses encryption of victim's files and delivery of ransom instructions
Decryption The previous versions of this malware have been deciphered. The free decryption software is still available for people on the NoMoreRansom project. However, the decryptor has been adapted to retrieve file extensions released until 2018, so there is no guarantee that the current .C4H
Removal C4H ransomware removal can be implemented with a professional anti-virus program. There is no other way to get rid of the whole bundle of malicious files.  
Recovery The system's recovery after ransomware infiltration is not of less importance. Ransomware removal does not restore damaged system's files and registries, so it's imminent to render a reliable Windows optimization tool. We recommend using Reimage Reimage Cleaner Intego

C4H ransomware and other file-encrypting viruses are used by extortionists who seek financial profit on behalf of other people's misfortune. Criminals engage many strategies to disseminate ransomware payloads and the most “successful” way of tricking regular users seems to be email attachments. 

Once the virus finds its place on a target system, criminals engage social engineering techniques to scare victims that the only way to decrypt files is to pay the ransom. For this purpose, C4H virus developers use false claims that running an antivirus program or attempts to self-decrypt files will end up in a permanent loss of encrypted files. 

It is not recommended to trust criminals' promises that the C4H decryptor will immediately be provided as soon as the ransomware demand will be received. Paying the ransom poses a high risk of identity theft and other privacy-related issues. 

ENGLISH
ALL YOUR FILES AND IMPORTANT DATA ARE ENCRYPTED!

To recover data you need decryptor.
To get the decryptor you should:
Send 1 test image or text file chinarecoverycompany@cock.li or chinarecoverycompany@airmail.cc.
In the letter include your personal ID (look at the beginning of this document).

We will give you the decrypted file and assign the price for decryption all files
After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions We can decrypt one file in quality the evidence that we have the decoder.
Attention!

Only chinarecoverycompany@cock.li or chinarecoverycompany@airmail.cc can decrypt your files
Do not trust anyone chinarecoverycompany@cock.li or chinarecoverycompany@airmail.cc
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user's unique encryption key

The ransom note provides two ways to contact the virus developers, i.e. chinarecoverycompany@cock.li or chinarecoverycompany@airmail.cc. However, instead of disputes with criminals, immediate C4H removal is recommended. 

The only way to remove C4H ransomware from the system is to restart Windows into Safe Mode and run a thorough scan with a reputable anti-virus program. Once all malicious entries are removed, you can try to retrieve locked data with a free GlobeImposter decryptor or give a try for alternative recovery methods in case the first one fails. 

C4H ransowmare virusC4H has been detected in Spring 2020 as the newest variant of the notorious GlobeImposter ransowmare

Currently, according to VirusTotal analysis, the C4H virus can successfully be detected and decontaminated by 60 AV engines out of 72. The detection rate is very high, so do not ignore pop-ups of the AV engine if it delivers one of the following warnings:

  • Ransom:Win32/GlobeImposter.180910
  • Trojan[Ransom]/Win32.GlobeImposter
  • Generic.Ransom.GlobeImposter.9F3AF8D5
  • TrojWare.Win32.Necne.AB@7l2s58
  • Generic.Ransom.GlobeImposter.9F3AF8D5 (B)
  • Ransom.GlobeImposter
  • Troj/Ransom-EVE
  • Mal_FakeGlobe, etc.

If the data on your PC has been encrypted, a ransom note created on the desktop and other folders, desktop background were changed and other signs evidence a ransomware attack, do not postpone C4H removal. Such and similar cyber infections often bear secondary payloads for trojans and spyware. Therefore, the longer you keep an intruder on the system, the higher the danger gets. 

Strategies that criminals use to spread ransomware

Our colleagues from LosVirus.es[2] warn users about various insecurities online that can help ransomware to get inside the system. In many cases, ransomware viruses are launched as second payloads of trojans, which usually get installed after vulnerability exploits or pirated software. However, the most infamous online places where people encounter the highest risk to get a ransomware infection are email accounts (spam section), torrent websites, questionable gaming websites, or adult content (gambling, porn) websites. 

Apart from having a powerful AV engine with real-time protection enabled, there are other precautionary measures that people should render to stay away from file-encrypting and other malware:

  • Manage your email with extreme carefulness. Do not rely on email messages that fall into the spam section. The biggest danger hides under messages that carry attachments or links. 
  • Avoid visiting unprotected websites and secondary networks. Poorly protected third-party websites can easily be exploited by criminals and infected with malicious ransomware code. 
  • Avoid visiting adult-content websites. Although there are some potentially secure porn websites[3], clicking on shady ads positioned on those sites poses a risk of being redirected to a phishing website.

A combination of precaution and powerful anti-virus program should be enough to protect your personal information, software, identity, and money from violations. 

C4H malwareC4H is a file-encrypting virus that corrupts personal files and urges their owners to pay the ransom for a decryption software

C4H ransomware elimination and data recovery guidelines

C4H ransomware removal process is implemented by both regular users and skilled users in the same way – a full scan with a professional anti-virus program is required. Manual removal is not possible in any way and any attempt to change malicious files can put the system at risk. 

Before you take any actions to remove C4H ransomware, we strongly recommend making the backups of the locked files. That's a measure to ensure that you'll have copies in case the virus gets removed alongside files with .c4h file extensions. For that, you can use a USB flash drive or cloud storage. 

Once ready, restart Windows into Safe Mode with networking as explained below, and launch the scanner of your AV tool. A professional tool will detect all ransomware-related entries, processes, and registries that have to be terminated together to successfully finish the C4H removal. For a full system check, we recommend using SpyHunter 5Combo Cleaner or Malwarebytes tools. 

Finally, do not forget to fix virus damage. Ransomware affects the Windows system severely and, unfortunately, AV programs cannot fix system damage. For that, use a tool like Reimage Reimage Cleaner Intego

Offer
do it now!
Download
Reimage Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove C4H virus, follow these steps:

Remove C4H using Safe Mode with Networking

Restart Windows into Safe Mode with Networking to terminate all malicious processes triggered by C4H ransomware.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove C4H

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete C4H removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove C4H using System Restore

The System Restore function on Windows can help with the C4H removal and retrieval of encrypted data.

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of C4H. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that C4H removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove C4H from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

.C4H extension files can be encrypted with the help of third-party data recovery tools or a free decryptor that has been designed for the previous versions of this cyber infection.

If your files are encrypted by C4H, you can use several methods to restore them:

Use Data Recovery Pro to retrieve some of the compromised files and documents

Files encrypted by C4H ransomware virus can be recovered with the help of third-party software. However, successful decryption is possible when a process is performed step-by-step as shown below. 

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by C4H ransomware;
  • Restore them.

Windows Previous Versions can be of use when dealing with ransomware encrypted files

This software can be used to restore some files affected by file-encrypting malware. However, this option is only available when a System Restore feature was enabled on the system before. 

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Take advantage of the Shadow Explorer

In case C4H ransomware fails to remove Volume Shadow Copies of the data stored on the system, most of the files can be retrieved by following these steps:

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

C4H ransomware decryption software hasn't been developed yet

Despite the fact that there's no official C4H decrypter, you can give a free GlobeImposter decryption software a try since both viruses stem from the same family. 

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from C4H and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Do not let government spy on you

The government has many issues in regards to tracking users' data and spying on citizens, so you should take this into consideration and learn more about shady information gathering practices. Avoid any unwanted government tracking or spying by going totally anonymous on the internet. 

You can choose a different location when you go online and access any material you want without particular content restrictions. You can easily enjoy internet connection without any risks of being hacked by using Private Internet Access VPN.

Control the information that can be accessed by government any other unwanted party and surf online without being spied on. Even if you are not involved in illegal activities or trust your selection of services, platforms, be suspicious for your own security and take precautionary measures by using the VPN service.

Backup files for the later use, in case of the malware attack

Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.

It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.

About the author

Alice Woods
Alice Woods - Likes to teach users about virus prevention

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Alice Woods
About the company Esolutions

References