Runsomewere ransomware / virus (Removal Instructions)

Runsomewere virus Removal Guide

What is Runsomewere ransomware virus?

Is Runsomewere virus really serious?

Runsomewere virus is a new crypto-ransomware which follows the footsteps of other, already established cyber threats including Hidden Tear, EDA2 and Jigsaw virus. Various security providers detect this virus under different names. Atros4.BAIR, Trojan.GenericKD.3758603, Ransom.Cryptear.Gen!c and Ransom_CRYPTEAR.SM are just a few of them. This only suggests that the virus may be spreading via different channels, though its true distribution strategies have not been officially confirmed. We can only presume that the virus developers employ the typical ransomware distribution techniques — software bundles and spam emails. What certainly know though that once it accesses the computer (either brought by a Trojan or downloaded as an email attachment) Runsomewere malware drops its executable called Runsome.exe which is the file responsible for initiating data encryption process. The primary targets of this virus are poorly protected or unstable Windows operating systems, but we should never turn down the possibility of OS X systems getting infected, too. Besides, there are thousands of other cyber parasites that are waiting to infect your computer online. So, it is important to keep both of these operating systems updated according to the latest security standards and protected with top-notch antivirus equipment such as FortectIntego or SpyHunter 5Combo Cleaner for Macs. Nevertheless, even if after taking all the security measures the parasite still manages to enter the system and lock the files, remove Runsomewere straight away. You can use the same antivirus tools to do this task.

Runsomewere virus lock screen example

Runsomewere works like most crypto-viruses, so it should not be regarded as less dangerous only because its seemingly misspelled title suggests so. It locks data within hours, and after the encryption done, it appends .locked extensions to the affected files. Please note that since the virus is still under development, the extensions might change with each new version. So far we have no information about the ransom note, the payment system or the amount of ransom that the hackers demand in exchange for the files. We can make something of the Jigsaw PNG file that the virus drops on the infected computer. This file featuring an image of the famous character from the horror movie “Saw” replaces the regular desktop picture which is a typical thing Jigsaw ransomware and some of its later variants do. Is Runsomewere a Jigsaw follow-up? Time will tell. As for now, you should focus on Runsomewere removal and file recovery in case you currently find yourself with this parasite on your computer.

How contagious is this virus?

As you are already aware, Runsomewere is still a “freshly-baked” virus, so virus analysts can only speculate about its distribution capabilities. Presumably, though, this virus infects computers through malicious spam. Cybercriminals behind Runsomewere may have a full arsenal of deceptive emails that they spread around with the ransomware attached to them. These emails employ persuasion and deception techniques to get the users to download infected attachments. So, the virus is not contagious. Its infiltration success largely depends on you, whether you are cautious enough not to get tricked by one of the scammers emails. So we encourage you to keep yourself informed and avoid downloading suspicious email attachments.

Methods of Runsomewere removal:

Though more advanced users may try to approach Runsomewere virus elimination manually, it is not recommended for the regular home users. This virus is a mix of complex codes which are designed to aggravate the Runsomewere removal. This means that the virus may even try to block your antivirus from running the system scan or initiate other actions of resistance. If you can’t remove Runsomewere due to this reason, follow the guidelines below, decontaminate the virus and repeat the scan.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Runsomewere virus. Follow these steps

Manual removal using Safe Mode

When the virus infects computer it usually locks the screen to prevent the user from accessing his/her files. To remove the lock screen, boot your device in safe mode or terminate the Runsome.exe process on your Windows Task Manager (you can access it via quick key combination ALT + CTRL +DEL)

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove Runsomewere using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Runsomewere. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that Runsomewere removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Runsomewere from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by Runsomewere, you can use several methods to restore them:

Get started with Data Recovery Pro

One of the initial data recovery assistants that can be put to use after the Runsomewere attack. This program will run the process automatically so you will not have to look ways to recover files yourself.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Runsomewere ransomware;
  • Restore them.

Use Windows Previous Versions feature for data recovery

Windows Previous Versions feature is not an automatic data recovery option, but by investing some of your time in it, you may successfully get some of your files back. The guidelines below explain how to use this feature:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Decode your data with ShadowExplorer

Last but not least, you can try to recover your files from the Volume Shadow Copies. To extract the necessary information, you will need to get the ShadowExplorer running. This can be done by following the steps here:

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Runsomewere and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Do not let government spy on you

The government has many issues in regards to tracking users' data and spying on citizens, so you should take this into consideration and learn more about shady information gathering practices. Avoid any unwanted government tracking or spying by going totally anonymous on the internet. 

You can choose a different location when you go online and access any material you want without particular content restrictions. You can easily enjoy internet connection without any risks of being hacked by using Private Internet Access VPN.

Control the information that can be accessed by government any other unwanted party and surf online without being spied on. Even if you are not involved in illegal activities or trust your selection of services, platforms, be suspicious for your own security and take precautionary measures by using the VPN service.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions