Severity scale:  
  (98/100)

.Good ransomware. How to remove? (Uninstall guide)

removal by Olivia Morelli - - | Type: Ransomware

.Good ransomware – a file locking cyber threat which offers to decrypt 3 files for free as evidence

.Good ransomware
.Good virus - a file locking cyber threat which ads the .good appendix to each corrupted document.

.Good ransomware is a file locking virus which appears in a computer system due to a secret infiltration. It usually comes via spam messages. However, sometimes it might appear after clicking on a malicious link or fake ad. Once installed, .Good file virus starts modifying the Windows Registry section which lets the cyber threat to perform its actions. The ransomware uses AES encryption to corrupt files on the infected computer and ads the .good extension to each of it. After that, a ransom note called HOW_TO_RECOVER_FILES.txt is displayed. Crooks urge victims to pay the demanded ransom for the decryption tool and offer three files for free unlocking.

Name .Good
Category Ransomware
Extension .good
Ransom note HOW_TO_RECOVER_FILES.txt
Encryption algorithm AES cipher is used for file encryption
Ransom It is known that cybercrooks urge for Bitcoin as the type of currency
Email address dsupport@airmail.cc
Special offers Crooks offer to decrypt three files for free as evidence that the decryption key does exist
Changes Modifications are seen in the Windows Registry
Removal Install Reimage

.Good ransomware provides dsupport@airmail.cc email address which should be a way for contacting. Users are urged to pay Bitcoin. This is the most famous cryptocurrency used by cybercriminals as it lets the transfer to remain secret. You can detect .Good files virus from such text message:

Your personal identifier: –
Your important files are now encrypted due to a security problem with your PC!
Now you should send us email with your personal identifier.
This email will be as confirmation you are ready to pay for decryption key.
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
Contact us using this email address: dsupport@airmail.cc
Free decryption as guarantee!
Before paying you can send us up to 3 files for free decryption.
The total size of files must be less than 10Mb (non archived), and files should not contain valuable information (databases, backups, large excel sheets, etc.).
How to obtain Bitcoins?
* The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click'Buy bitcoins', and select the seller by payment method and price:
hxxps://localbitcoins.com/buy_bitcoins
* Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins
Attention!
* Do not rename encrypted files.
* Do not try to decrypt your data using third party software, it may cause permanent data loss.
* Decryption of your files with the help of third parties may cause increased price
(they add their fee to our) or you can become a victim of a scam.

We recommend staying away from any contact with the cybercriminals. Especially, do not get tricked by their false promises and avoid paying the demanded price. It is known that users are very likely to get scammed by cybercrooks. After they get the money from their victims, criminals run off and leave the users desperate. As an alternative, we suggest performing the .Good ransomware removal ASAP.

You need to remove .Good virus from your computer system as soon as you spot the first ransomware-related symptoms to avoid further damaging consequences. You can fix the damage that was done by the infection with the help of an anti-malware tool. We suggest using Reimage or any other similar program if you are likely too.

Remember that you can never be fully protected from ransomware-type infections. If you want to avoid viruses such as .Good ransomware, you need to take some precautionary measures which are written in this article. Moreover, purchase a USB drive and keep important files there. If you do so, no hackers will be able to corrupt data that is safely kept on your external device.

Prevent ransomware from infecting your PC

According to IT specialists who investigate malware[1], ransomware-type viruses are often spread via spam messages. Such hazardous payload comes in the form of an attachment which is clipped to the phishing email, or as a link which is inserted into the message. If you overcome a dubious-looking email message, better eliminate it as you cannot know what can be hidden behind it.

Moreover, if you like visiting various rogue sites, especially third-party ones, you are very likely to catch a dangerous infection which will cause various harm to the system. Questionable pages often lack protection and might be infected will virus-related content that once clicked launches that same minute.

Additionally, get an antivirus[2]. Scan your computer with the security tool after you visit rogue sites. Perform system scans once in a while just to make sure that no cyber threat managed to slip through the security system. Of course, take care of all updates that are recommended. If not, you might overcome outdated registry entries in the future.

Get rid of .Good virus

If you spot encrypted files and other symptoms that show the ransomware[3] infection, you need to remove .Good virus from your computer permanently. Use professional anti-malware tools for this process. We advise installing Reimage, Malwarebytes MalwarebytesCombo Cleaner, or Plumbytes Anti-MalwareMalwarebytes Malwarebytes. Note that you need to get rid of the cyber threat before you start recovering your corrupted data. Otherwise, the virus will lock up files again because it will still be inside your computer system.

After you perform the .Good ransomware removal, you should carry out some system backups to be sure that the system is fully clean. After that, you can start thinking about data recovery techniques. We offer some third-party software which might be helpful in such situation. You can find these methods below this article. Complete each step carefully to reach best results possible.

Offer
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Malwarebytes.
Alternative Software
Different security software includes different virus database. If you didn’t succeed in finding malware with Reimage, try running alternative scan with Combo Cleaner.

To remove .Good virus, follow these steps:

Remove .Good using Safe Mode with Networking

Enable the Safe Mode function on your computer system to deactivate the cryptovirus. Follow these instructions:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove .Good

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete .Good removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove .Good using System Restore

Turn on the System Restore feature to avoid various damage which might be caused by the .Good ransomware:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of .Good. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that .Good removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove .Good from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If you have spot files with the .good extension, we guess that you are wondering, how to restore important documents. You can see some few methods that we provided below. Complete each step cautiously to achieve best results.

If your files are encrypted by .Good, you can use several methods to restore them:

Try using the Data Recovery Pro method:

If you want to restore corrupted documents, you can give this method a try.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by .Good ransomware;
  • Restore them.

Windows Previous Versions feature might let you get important files back:

Perform each step as shown in the instructions. However, note that such a method will not work if you did not activate the System Restore function before the virus infiltration.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Use Shadow Explorer for data recovery:

This method might be helpful if the virus did not eliminate Shadow Volume Copies of affected documents, otherwise, choose another technique.

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

There is no official decryptor for this ransomware discovered yet. IT experts are hoping to find it out in the following future.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from .Good and other ransomwares, use a reputable anti-spyware, such as Reimage, Malwarebytes MalwarebytesCombo Cleaner or Plumbytes Anti-MalwareMalwarebytes Malwarebytes

About the author

Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions

References