Severity scale:  
  (99/100) ransomware virus. How to remove? (Uninstall guide)

removal by Lucia Danes - - | Type: Ransomware is a file encrypting virus that is used to blackmail people virus is a ransomware virus,[1] and its primary goal is to encrypt certain computer files. This crypto-locker is a part of Xorist ransomware family that been lurking around the world wide web since 2016. It uses XOR or TEA cipher to encrypt data and appends file extension. The virus then drops ransom note HOW TO DECRYPT FILES.txt which explains that payment of 3 BTC should be transferred to crooks in order to obtain a decryption key. Nevertheless, victims can use a free Xorist decryptor that might be useful for data recovery.

Type Ransomware
Encryption algorithm XOR or TEA
Family Xorist ransomware
Demanded ransom 3 BTC
Contact email
Distribution Spam emails, software vulnerabilities, malicious websites, etc.
Elimination Automatic only – use Reimage or Malwarebytes

Criminals put victims under time pressure and give mere 24 hours to make the payment. If the ransom isn’t transferred within this time, the extortionists threaten with the complete destruction of the encrypted data. This way, different documents, files archives, video and audio material will supposedly be destroyed. We don’t know whether the criminals stick to this promise, but it is definitely not worth risking it. A safer solution is to remove virus from the PC and prevent further data encryption.

The ransom note states the following [sic]:

All your important files were encrypted on this computer. You can verify this by click on see files an try open them. Encryption was produced using unique KEY generated for this computer.

To decrypt files, you need to obtain private key. The single copy of the private key, with will allow you to decrypt the files, is locate on a secret server on the internet; The server will destroy the key within 24 hours after encryption completed. Payment have to be made in maxim 24 hours. To retrieve the private key, you need to pay 3 BITCOINS.

Bitcoins have to be sent to this address: 

After you've sent the payment send us email to: with subject : ERROR-ID-random(3BITCOINS) . If you are not familiar with bitcoin you can buy it from here: SITE : 

After we confirm the payment, we send the private key so you can decrypt your system.

Security specialists[2] advise not to contact malware creators under any circumstances. Even if you manage to get the decryptor, you will be doing a big favor to cybercriminals and encourage them to produce more viruses. Thus, instead stick to Xorist decryptor or use third-party software to recover your files. 

There is no much that the cybersecurity experts know about this virus. Its distribution is rather low, and it is quite challenging to come across its samples. Judging from the ransom note, it is clear that hackers are not native English speakers, as the message is littered with mistakes.

Nevertheless, what the experts do know is how to recognize the threat once it is on the computer. The infected device starts working slower, its RAM and CPU utilization[3] will increase to the highest levels, and different strange processes will show up in the Windows Task Manager. Additionally, ransomware viruses are known to weaken the system which allows other infections to slip through into machines easily.

Even if you don’t notice the initial processes of the ransomware attack, you will inevitably become aware of this problem after you unexpectedly lose access your files and find a ransom note on your PC demanding you to pay. Of course, you should refuse any collaboration with the cybercriminals and perform removal instead. Fix your PC with Reimage or similar antivirus software. Professional tools will make sure that the virus is banished from the system to the last bit of its malicious components.

Ransomware distribution: spam emails dominate

There are a few techniques that modern ransomware use for the system infiltration. One of these methods relies on spam emails and their attachments. Malicious spam campaigns send around counterfeited emails with an attached files disguised as invoice or tax information. The virus payload is activated once the victim opens an infected attachment.

Another way that crypto-ransomware can infiltrate computer is through brute force attacks. Weak passwords of RDP[4] networks and outdated software vulnerabilities highly increase the chances of ransomware attack.

Finally, ransomware developers may employ exploit kits and Trojans to deploy their malicious creations on the victim’s computer. Typically such infectious programs will be delivered through Torrent networks or other peer-to-peer file sharing domains as well as unsafe websites. virus spreads via spam emails

As you can see, file-encrypting malware can easily catch you off guard. Thus, we highly recommend following these simple precautions:

  • Install a reputable anti-malware software and keep it up to date;
  • Always update your software and operating system as soon as new patches are out;
  • Only download updates from trusted sources;
  • Protect your RDP with a strong password;
  • Do not open spam emails (especially attachments);
  • Avoid suspicious websites, such as porn, gambling, file-sharing and other similar domains.

Quick suggestions for removal

If you find yourself in a situation when you have to remove virus from your PC but have no experience in any malware elimination whatsoever, you should not panic and trust this job to the specialized antivirus software, such as Reimage, Malwarebytes or Plumbytes Anti-MalwareNorton Internet Security. These tools will locate hazardous components on your computer and expose virtual threats, including exploits, rootkits, and trojans.

After removal, you will then be able to attempt data recovery. Though there is official decryption tool for Xorist invented, it might not help with this version of ransomware. Nevertheless, you should be able to restore at least some of your files using alternative recovery suggestions below.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software you agree to our privacy policy and agreement of use.
do it now!
Reimage (remover) Happiness
Reimage (remover) Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.

If you decided to select another anti-spyware, uninstall Reimage from your computer.
Press mentions on Reimage
Alternate Software
Alternate Software

To remove virus, follow these steps:

Remove using Safe Mode with Networking

Some users may encounter problems removing this parasite from their computers. To make the elimination procedure easier, experts recommend running the system scan with an antivirus utility in Safe Mode. Learn to activate this mode below:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove using System Restore

If the Safe Mode does not help decontaminate the virus, you may try the following steps:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by, you can use several methods to restore them:

Recovery with Data Recovery Pro

Go through the guidelines below to learn how to use Data Recovery Pro and recover your files

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by ransomware;
  • Restore them.

Windows Previous Versions feature recovery option

If you had System Restore feature enabled prior malware attack, you should have no problems recovering your important files using Windows Previous Versions feature. 

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Recover files with Shadow Explorer

If you aren't sure how to use Shadow Explorer, follow the instructions below.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Try Xorist decryptor

You can use Xorist decryptor by Emisoft and see if it can be useful for you.

About the author

Lucia Danes
Lucia Danes - Virus researcher

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Lucia Danes
About the company Esolutions