Severity scale:  

Remove Enc1 ransomware (Virus Removal Guide) - Bonus: Decryption Steps

removal by Gabriel E. Hall - - | Type: Ransomware

Enc1 ransomware is a cryptovirus that uses the AES algorithm to encode your data 

 Enc1 ransomware

Enc1 ransomware — a virus that encrypts files to request a ransom for the alleged data recovery. During the encryption process, cryptovirus changes the original code of such files as photos, videos or audio files. However, documents and even databases can also be encrypted. Then, it adds _enc1 file extension to every encrypted data, for example, xxxx.jpg becomes xxxx.jpg_enc1 and cannot be opened. The file appendix reminds a different cyber threat – MOTD ransomware, but there are not enough similarities to state that Enc1 ransomware is yet another version of another cryptovirus. When the encryption process is done, the victim gets a ransom note in a file called decrypt_<10characters>.txt. The ransom message provides a unique identification key, a contact email alongside the instructions on how to pay. Ransomware-type threats demand payments in chosen cryptocurrency and focus on getting money from the victim. 

Name Enc1 ransomware
Type Cryptovirus
File marker _enc1
Contact email
Encryption method AES algorithm
A pattern of the ransom note decrypt_.txt
Elimination Use trustworthy anti-malware for Enc1 ransomware removal and clean the system using Reimage Reimage Cleaner Intego

Enc1 ransomware virus was discovered on the first half on January 2019 and researchers haven't found much information about it. However, like many other ransomware-type threats, this one has a few distinct features because it can:

  • encrypt your files;
  • alter registry entries;
  • disable or launch programs;
  • manipulate system processes;
  • install additional files or programs.

There are a few changes this Enc1 ransomware can make on the system without your permission, but the most dangerous one is the file-locking.[1] For the encryption this threat employs the AES encryption algorithm that helps to change the original code of a file. 

After the Enc1 ransomware encryption files get _enc1 file marker, hence the name of the threat. However, the more significant danger is when the ransom note gets placed on the screen. In the file named with random characters, virus developers ask for a ransom that most likely depends on the number of files that need to be recovered or the time you've waited before contacting criminals.

Enc1 ransomware ransom message is generated in the decrypt_.txt file which reads the following:

Ooops. your important files are encrypted.
If you see this text, then your files are no longer accessible,
because they
have been encrypted.Perhaps you are busy looking for a way to recover your
files, but don’t waste your time. Nobody can recover your files without our
decryption service.
We guarantee that you can recover all your files safely and easily.All you
need to do is submit the payment and purchase the decryption key.
Do not try to recover your files on your own or with someone else,
because after the intervention you can remain without your data forever.
Please follow the instructions :
1.Contact us at e-mail:
or bitmessage: BM-2cVs4XGzzFtA7wiM6TPDnohTKh47vvCS1k
2.Get your KEY and IV
3.Have a Nice Day
Key: tWEY8zHJabpyNapKGHcFR***A6zDo=
IV: 67+TjI1EikzpMpONPOI8Og==

You shouldn't consider paying the ransom for the locked files. Remove Enc1 ransomware and restore files from a backup instead. You can only do so on a malware-free device because ransomware can encrypt your data again if not eliminated correctly. 

You should focus on Enc1 ransomware removal and clean the computer further using Reimage Reimage Cleaner Intego or another PC repair tool. This way you can eliminate any virus damage and improve the performance of your machine. We also provide a few additional tips below the article to help with your malware termination.

Enc1 ransomware virusEnc1 ransomware is a threat developed by cybercriminals and contacting them via the provided email is not recommended.

Documents from suspicious emails come embedded with macros

Malicious programs like ransomware mostly get distributed via email spam because payload droppers can be sent in bulk and this way ransomware is distributed on a handful of machines at the time.[2] In most cases, these emails impersonate well-known companies or services to trick users into downloading the attached document. 

Unfortunately, when the file gets installed on the system malicious executable can launch the necessary process and infiltrate the system with various malware. Researchers[3] always advise paying more attention to emails you get so you can avoid these infiltrations. You should delete emails you were not expecting and always scan the file before downloading on the computer. 

Delete all files related to Enc1 ransomware virus

The vital step of Enc1 ransomware elimination is to double-check before anything else because deleting the main file might not be enough. You should employ professional anti-malware tools, so you can be sure that every related program is eliminated entirely. 

Also, you need to remove Enc1 ransomware from the computer entirely before data recovery especially. If you plug in the external device containing your file backups when the device is not clean, you can lose your data permanently. Double-check after the initial virus termination to make sure.

Use Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes for the Enc1 ransomware removal or choose other anti-malware programs that are reputable and trustworthy. Make sure to get them from an official website or legitimate provider to avoid additional software bundles. 

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Enc1 virus, follow these steps:

Remove Enc1 using Safe Mode with Networking

You may need to reboot your PC in Safe Mode with Networking, so your antivirus program could work properly in Enc1 ransomware removal:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Enc1

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Enc1 removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Enc1 using System Restore

When you deal with Enc1 ransomware, you can try System Restore feature to get rid of it:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Enc1. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Enc1 removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Enc1 from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Enc1, you can use several methods to restore them:

Try Data Recovery Pro for your encrypted files

If you have no file backups, employ Data Recovery Pro as an alternative. This program can also work for accidentally deleted files

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Enc1 ransomware;
  • Restore them.

Windows Previous Versions feature restores locked files after Enc1 ransomware removal

If System Restore was enabled before, you could try Windows previous Versions feature in data recovery

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer is another program that could help with encrypted files

However, Enc1 ransomware might delete Shadow Volume Copies. If not, try ShadowExplorer and restore your data

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

There is no decryption tool for Enc1 ransomware yet

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Enc1 and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Gabriel E. Hall
Gabriel E. Hall - Passionate web researcher

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Gabriel E. Hall
About the company Esolutions


Your opinion regarding Enc1 ransomware