Nemucod-AES ransomware / virus (Removal Guide) - Tutorial

Nemucod-AES virus Removal Guide

What is Nemucod-AES ransomware virus?

Nemucod-AES ransomware takes victim's files hostage to demand ransom

Nemucod-AES virus

Nemucod-AES ransomware [1] is a data-encrypting virus which earned its title by stealthily infiltrating computers, rendering the containing files unreadable with the help of AES-128 and RSA-2048 encryption algorithms, and demanding 0.11471 Bitcoins for their decryption.

The criminals choose cryptocurrency [2] as means of payment deliberately. This method guarantees the anonymity of money transactions and allows the perpetrators to escape prosecution.

That’s why you won’t get any justice if the hackers disappear with your money after you pay for the data recovery key. This should be a sufficient reason to remove Nemucod-AES from the PC rather than collaborate with the criminals.

Typically to most ransomware, the virus developers drop a ransom note on which they list out all the data recovery conditions and instruct victims where they should purchase and transfer the ransom. Here is a transcript of Decrypt.hta file:

All your documents, photos, databases and other important personal files were encrypted using a combination of strong RSA-2048 and AES-128 algorithms.
The only way to restore your files is to buy decryptor. Please, follow these steps:
1. Create your Bitcoin wallet here:
2. Buy 0.11471 bitcoins here:
3. Send 0.11471 bitcoins to this address:

4. Open one of the following links in your browser:
5. Download and run decryptor to restore your files.
You can find this instruction in “DECRYPT” file on your desktop.

Ransom notes can tell a lot about the ransomware developers, their target audience, and their true intentions. In this case, we have to admit that the note is professionally made and detailed, so the hackers behind it are probably native English speakers and serious enough not to leave spelling or grammatical errors on the note.

The ransomware’s target audience is most likely English as well, though it should not stop the virus from infecting users in the European countries, say, Germany or Sweden [3].

Despite where in the world the virus hits, the first thing infected computer owners should do is perform Nemucod-AES removal.

Decrypt files encrypted by Nemucod-AES ransomware for free

Victims who have their files compromised by this ransomware can use a free NemucodAES decryptor to restore all data. The decryptor was successfully created by Emsisoft researchers on July 12th, 2017.

So if your PC was struck by the discussed ransomware and you were hesitating whether to pay up or not, forget these thoughts already. You can restore your files without paying a cent. To find the decryption instructions, look at data recovery section below this post.

The most important thing is to decontaminate the virus and to prevent if from additionally damaging your system. Use the decryptor only after removing the virus from the computer system.

Illustration of Nemucod-AES ransomware virusThe image above illustrates Nemucod-AES ransomware ransom note that the virus drops on the computer as a way of demanding money for the decryption of encrypted data.

The ransomware is distributed via fraudulent UPS spam

There are several ways Nemucod-AES ransomware can spread around the web. A few of the main vectors may be:

  • compromised downloads,
  • fake software updates,
  • deceptive ads,
  • exploit kits.

Nevertheless, the most salient method of Nemucod-AES distribution campaign are spam emails disguised as UPS service notices. In the two examined samples of spam emails, experts found files called UPS ground-Delivery-005156577.doc.js and UPS ground-Receipt-4424638.doc.js which both obfuscated the malicious JavaScript code by imitating regular Word files.

Please remember this deceptive distribution technique the next time you are on your email. Do not download or, not to mention, open the attachments which may have been sent to you by some unfamiliar senders, because it might be that you are allowing a vicious ransomware on your PC.

Suggestions for Nemucod-AES removal

If you have realized that you can no longer access your files anymore and you see a ransom note demanding you to pay money for their recovery, you should wait no longer and start Nemucod-AES removal procedure immediately.
We recommend you take advantage of specialized utilities, such as FortectIntego or Malwarebytes, to scan your device automatically and locate all the bad components that might be scattered around your system.

The automatic removal will only take a few minutes, if the ransomware does not attempt to block your security utility and prevent its extermination.

Even if it does block these utilities, you can follow virus decontamination instructions below the article and help your antivirus remove Nemucod-AES from the PC.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Nemucod-AES virus. Follow these steps

Manual removal using Safe Mode

Here you will learn how to decontaminate the virus without extra tools. But don't forget to scan your device with sophisticated security tool once you've done with the following steps:

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove Nemucod-AES using System Restore

If technique described above won't help run your antivirus, you should try performing the following operation

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Nemucod-AES. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that Nemucod-AES removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Nemucod-AES from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Nemucod-AES, you can use several methods to restore them:

Tackling encrypted data using Data recovery pro

Below, we explain how to use Data Recovery Pro and potentially recover some of your lost data

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Nemucod-AES ransomware;
  • Restore them.

Rolling back the encrypted files using Windows Previous Versions feature

The guide to Windows Previous Versions feature use is provided below

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Employing Shadow Explorer for the data recovery

Shadow Explorer is a method you should definitely try out if the virus has not destroyed the Volume Shadow Copies of your files

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Use NemucodAES decryptor

Download NemucodAES decryptor (by Emsisoft) and launch the executable file. Once the User Account Control prompt appears, click Yes. Now you have to be patient, because the decryptor might need a couple hours or so to check your computer system. The decryption tool will display a message once it finds all files. Click OK and then click Decrypt button in the Emsisoft Decrypter application. Stay patient until it decrypts all of your files.

Once you complete the procedure, delete encrypted file copies from the system.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Nemucod-AES and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Jake Doevan
Jake Doevan - Computer technology expert

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Jake Doevan
About the company Esolutions

Removal guides in other languages