Severity scale:  
  (90/100)

Like ransomware. How to remove? (Uninstall guide)

removal by Ugnius Kiguolis - - | Type: Ransomware

Like ransomware is a virus that stealthily infiltrates the system and gives you 72 hours to unlock your encrypted files

Like ransomware virus
Like ransomware is a virus that places .like file extension to modified files and gives its victim 72 hours to pay the ransom.

Like ransomware is a file encrypting virus that modifies most of the data stored on the system. As typical ransomware, this virus encrypts files as soon as its executable[1] file is installed on the system. For that, it uses a sophisticated encryption method[2] and marks the affected data with .like file extension. After this procedure, the user's images, videos, documents and similar files become useless. Additionally, Like ransomware virus generates a ransom note called infoinfo.txt and, in this case, places this file in every existing folder on your PC system. The ransom note is used to convince the victim into paying a required ransom in exchange for files' decryption. However, you can always use alternative methods to recover your encrypted files.

Name Like ransomware
Type Cryptovirus
File extension .like
Ransom note infoinfo.txt
Contact email BM-2cWrd12TuEzGmnPMHBMwmB32w45fZ5rZS3@bitmessage.ch
Distribution Spam email campaigns
Symptoms Files become locked without the ability to open them; a ransom message appears on every folder
Elimination Use Reimage to remove Like ransomware

Like ransomware encrypts most of your stored data and locks it with the .like appendix. It is still unknown what family this malware is hailing from. However, it is very similar to Support_wc@bitmessage.ch ransomware or Waiting ransomware which is using waiting@bitmessage.ch email for making a contact with potential ransom payers.

To make victim's files useless, the malware is using either symmetric or asymmetric algorithm. After the encryption procedure is finished, files cannot be used in any way. According to the ransom note, Like virus gives for its victim only 72 hours to send the money to the provided bitcoin wallet. Hackers are also offering to test their decryption services by sending them a few encrypted files which are no bigger than 10Mb. However, even if this test works, there is no guarantee that the decryption tool for this ransomware really exists.

In the ransom note that Like ransomware virus places on every folder, you may see hackers' contact email which is BM-2cWrd12TuEzGmnPMHBMwmB32w45fZ5rZS3@bitmessage.ch. However, as we have already warned you, you shouldn't write them or pay the ransom. The people behind this software are criminals, and cannot be trusted in any way.

Once the virus encrypts files, it displays such ransom note:

Your data set are encrypted.
All files with .like extension are encrypted.
We can help decrypted files.
You will get decrypt soft + personal key(for your personal id) + manual.
For you to be sure, that we can decrypt your files
You can send us 1-2 encrypted files and we will send back it in a decrypt format FREE.
For download files use only dropmefiles.com not more then 10 Mb
Send us an email:
1.Personal ID 
2.link dropmefiles.com 
after wait decrypted files and further instructions.
You can send a message within 72 hours after encrypting, else full decrypt will be heavily.
Please use public email for contact: gmail etc.
For recover your files – contact us email:
BM-2cWrd12TuEzGmnPMHBMwmB32w45fZ5rZS3@bitmessage.ch
Your personal ID: –

If your files are locked by this malware, make sure that you get rid of this virus at first and only then try to recover the encrypted data from a backup. To make your system clear again, remove Like ransomware using anti-malware like Reimage. Then, try data recovery suggestions that are provided down below. 

Note that ransomware can disable your antivirus program. In addition, viruses like this can change the Windows Registry or write new tasks to make sure that they become active each time your PC is rebooted. This means that the virus can silently work in the background without your knowledge. However, if you happen to notice any suspicious activity, reboot your PC to Safe mode to disable the malware on your computer and proceed with Like ransomware removal.

Hackers adopt different approaches to install malware on the target computer

During the last couple of years, virus developers have found many different techniques to infiltrate computers. When dealing with ransomware, the most common spreading technique is spam email campaigns. Beware that email messages can be filled with malicious content, including:

  • Malicious attachments (.pdf, .xls, .xlsx, .png, etc.);
  • Fraudulent links;
  • Other fake information.

Researchers[3] always advise paying more attention to emails you find in your email inbox. Make sure you always double check every message you find in your inbox. Malicious people often can disguise their content behind the legal names of other services or companies, so you should always check these messages for grammar or typo mistakes. Alternatively, contact the sender to see if it is a real person. Finally, clean your spam email box more often and do not open any suspicious attachments.

Terminate Like ransomware with reputable anti-malware 

To remove Like ransomware and get back to safe use on the computer, you should use trustworthy anti-malware programs like Reimage or Plumbytes Anti-MalwareNorton Internet Security. These tools can detect and remove malware you already have on your system. Besides, they will block potential threats in the future. It is crucial not to use manual removal methods when dealing with ransomware because of the possibility to lead your system into damage.

When proceeding with Like ransomware removal, remember to use the latest programs' versions. If you cannot launch the scanner, reboot your computer to Safe mode with Networking or use System Restore to bring your computer to the previous state. However, make sure you double check the system with anti-malware software when on normal mode as well. Then, check our suggestions down below for data recovery methods.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove Like ransomware you agree to our privacy policy and agreement of use.
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Compatible with OS X
What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to uninstall Like ransomware. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.
Press mentions on Reimage
Alternate Software
Plumbytes Anti-Malware
We have tested Plumbytes Anti-Malware's efficiency in removing Like ransomware (2018-08-03)
Malwarebytes
We have tested Malwarebytes's efficiency in removing Like ransomware (2018-08-03)
Hitman Pro
We have tested Hitman Pro's efficiency in removing Like ransomware (2018-08-03)
Malwarebytes
We have tested Malwarebytes's efficiency in removing Like ransomware (2018-08-03)

To remove Like virus, follow these steps:

Remove Like using Safe Mode with Networking

First, try rebooting your PC to Safe Mode with Networking to disable Like ransomware:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Like

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Like removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Like using System Restore

System Restore feature might also help you when dealing with ransomware virus:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Like. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Like removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Like from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by Like, you can use several methods to restore them:

Try Data Recovery Pro for restoring locked files

Data Recovery Pro can restore encrypted or accidentally deleted data:

If you want to restore individual files, try using Windows Previous Versions feature

Although, this feature can work if only System Restore was enabled beforehand:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer can recover data encrypted by Like ransomware

Use ShadowExplorer if ransomware left Shadow Volume Copies:

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Decryption tool is not availiable

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Like and other ransomwares, use a reputable anti-spyware, such as Reimage, Malwarebytes Malwarebytes or Plumbytes Anti-MalwareNorton Internet Security

About the author

Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

References