Severity scale:  

Remove ZES ransomware (Virus Removal Guide) - Free Instructions

removal by Alice Woods - - | Type: Ransomware

ZES ransomware is a dangerous computer infection that locks people out of their files until they pay ransom

ZES ransomwareZES ransomware is a file locking virus that holds personal files hostage until ransom is paid

ZES ransomware is a data-locking virus that belongs to the Makop malware family. First spotted in early August in 2020, this computer infection targets users all over the world and encrypts pictures, videos, documents, databases, and other files with the help of a powerful encryption algorithms RSA and AES.[1] Suchlike data becomes inaccessible to victims – they can clearly see that file icons are gone, and that a marker .[].zes is appended to each of the files.

Besides the locked files, victims can also find a ransom note readme-warning.txt, which is placed on their desktops. Inside the note, threat actors explain that all the personal files on the computer were encrypted and that a unique decryption key is needed to unlock them. Of course, cybercriminals are not willing to provide it for free, and asking for a ransom payment in bitcoin cryptocurrency.

Name ZES ransomware
Type File locking virus
Related  Makop, Oled, Paymen45
File extension Each of the personal files is appended with .[].zes extension; for example, a file picture.jpg is converted into picture.jpg[ID].[].zes and can no longer be accessed
Encryption algorithm Malware uses a combination of AES + RSA to lock all non-executable and non-system files
Ransom note readme-warning.txt is dropped on users' desktops and/or other folders on the system
Contact & payment Victims are asked to email crooks via and negotiate the payment in bitcoin (the sum is not provided)
File recovery If no backups are available, recovering .[].zes files can be very difficult, although not impossible. In case automated Windows backups are not erased during the infection, users might be able to use third-party recovery software or built-in Windows tools to retrieve encrypted data
Malware removal You should delete the ransomware infection with the help of powerful security software – we recommend using SpyHunter 5Combo Cleaner or another reputable tool
System fix  Malware infection might damage your Windows system files, which can cause significant damage to its performance once the infection is removed. If you are experiencing crashes, lag, errors, or other issues after you eliminate malware, use automated repair tools such as ReimageIntego 

[].zes virus authors can use several distribution techniques to deliver the malicious program to as many people as possible. For example, hackers can make use of malicious email attachments that are sent to thousands of users regularly – malspam remains one of the leading causes of malware infections to this day.[2] Other ZES ransomware delivery methods include:

  • Exploits and software vulnerabilities;
  • Fake updates for Flash, Java, Chrome, Firefox, etc.;
  • Incorrectly protected Remote Desktop or WiFi connections;
  • Software cracks/keygens/loaders or pirated program installers;
  • Backdoors, etc.

You could prevent malware infections by using precautionary measures – you should always ensure that your system and software is up to date, equip your machine with security software, avoid high-risk websites, and backup your most important files regularly. However, while there is nothing you can do to undo the infection currently, you should instead focus on ZES ransomware removal and ways to recover your data without paying cybercriminals.

Once inside the system, the ZES file virus performs the necessary Windows modifications in order to perform file encryption uninterrupted. For example, most malware of such type is programmed to delete Shadow Volume Copies and other built-in recovery solutions within the Windows environment. As a result, .[].zes file recovery becomes almost impossible without a decryption key that is in possession of cybercriminals.

ZES ransomware virusZES ransomware is a a cryptovirus that stems from Makop virus family

To cause maximum damage and make the infected users pay the ransom, malware targets the most commonly used file types, such as PDF, MS Office documents, archives, and others. Once the .[].zes is appended, data can no longer be used, as it requires the key that only crooks have access to.

However, paying the ransom is not recommended, as you might never receive the decryption tool, so you might also lose your money (along with your files). Hence, you should seek alternative solutions for data recovery, although keep in mind that you have to remove ZES ransomware prior to that – you will need an anti-malware program from that.

Once you scan your device and are sure that the infection is eliminated, you should proceed with the data recovery options we provide below. If you are experiencing system crashes or BSODs after malware is terminated, you don't have to reinstall your Windows OS – we recommend using automatic repair software ReimageIntego instead.

[].zes file decryption options are limited

Many users who never had to deal with ransomware are shocked when they realize that they can't open [].zes files. Due to its file locking capability, ransomware is considered one of the most dangerous and destructive pieces of malware out there, although it might sometimes not work as intended – and that is where the opportunity to recover .zes files without paying ransom comes in.

Ransomware uses a combination of symmetric and asymmetric encryption, making data recovery without the key that cybercriminals have access to always impossible. However, if the data locking process is interrupted or something else goes wrong, ZES ransomware might fail to delete Shadow Volume Copies or erase System Restore.

Of course, cybercriminals claim that nothing can go wrong and that the only way to recover [].zes files is to pay the ransom:

::: Greetings :::

Little FAQ:
Q: Whats Happen?
A: Your files have been encrypted and now have the “zes” extension. The file structure was not damaged, we did everything possible so that this could not happen.

Q: How to recover files?
A: If you wish to decrypt your files you will need to pay in bitcoins.

Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities – nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc… not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.

Q: How to contact with you?
A: You can write us to our mailbox:

Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.

Q: If I donít want to pay bad people like you?
A: If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice – time is much more valuable than money.

DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions – please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

If you are willing to pay the ransom, it is up to you, although most security researchers[3] vouch against it. Not only might you lose your money, but it only boosts the profits of criminals, motivating them to create more malware and infect more people.

ZES ransomware encrypted filesIf the encryption process is performed correctly, it is extremely difficult to get .[].zes files back without paying cybercriminals

So, if you are not going to pay, what options to you have to recover [].zes without paying criminals? The answer to this question is a bit complicated, as it depends on many factors. Here are a few examples that sometimes might be helpful when trying to recover files after a ransomware attack:

  • Use third-party solutions that could be able to recover at least some portion of your files from your hard drive;
  • Utilize automated Windows backup systems such as Windows Previous Versions feature;
  • Wait until security researchers find weaknesses within malware code and provide a free decryption tool (this might take a long time).

However, each of these solutions has downfalls, and would only work if malware did not perform its tasks as it was intended. For more details on how to perform these steps when trying to retrieve ZES virus files.

Backup encrypted files, remove ZES ransomware and only then attempt to recover your data

We recommend not giving into cybercriminals' demands and avoiding all negotiations with them. There were cases when malicious actors asked for more money after the first payment was provided by victims – you simply never know what ZES virus developers might do.

However, you should not remove ZES ransomware right away, as you might permanently lose access to your files. Thus, you should first copy your data over to a flash drive or another medium – encrypted files do not have malicious code inside them, so you are safe to do so.

Once that is complete, you can proceed with ZES ransomware removal. For that, install powerful security software and perform a full system scan – access Safe Mode with Networking if needed. You can then refer to the alternative [].zes file recovery methods.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove ZES virus, follow these steps:

Remove ZES using Safe Mode with Networking

In case ZES files virus prevents its termination, access Safe Mode with Networking as explained below:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove ZES

    Log in to your infected account and start the browser. Download ReimageIntego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete ZES removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove ZES using System Restore

Use System Restore if the option is still available:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of ZES. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that ZES removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove ZES from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by ZES, you can use several methods to restore them:

Data Recovery Pro might be the solution to your problem

Data recovery software might sometimes be able to recover some copies of your files from the hard drive.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by ZES ransomware;
  • Restore them.

Make use of Windows Previous Versions feature

This solution will only work if malware did not delete Shadow Volume Copies.

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer might be the best solution

This method can recover Zes files automatically when Shadow Copies are available.

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

No decryption software is currently available

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from ZES and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

Stream videos without limitations, no matter where you are

There are multiple parties that could find out almost anything about you by checking your online activity. While this is highly unlikely, advertisers and tech companies are constantly tracking you online. The first step to privacy should be a secure browser that focuses on tracker reduction to a minimum.

Even if you employ a secure browser, you will not be able to access websites that are restricted due to local government laws or other reasons. In other words, you may not be able to stream Disney+ or US-based Netflix in some countries. To bypass these restrictions, you can employ a powerful Private Internet Access VPN, which provides dedicated servers for torrenting and streaming, not slowing you down in the process.

Data backups are important – recover your lost files

Ransomware is one of the biggest threats to personal data. Once it is executed on a machine, it launches a sophisticated encryption algorithm that locks all your files, although it does not destroy them. The most common misconception is that anti-malware software can return files to their previous states. This is not true, however, and data remains locked after the malicious payload is deleted.

While regular data backups are the only secure method to recover your files after a ransomware attack, tools such as Data Recovery Pro can also be effective and restore at least some of your lost data.

About the author
Alice Woods
Alice Woods - Likes to teach users about virus prevention

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Alice Woods
About the company Esolutions


Your opinion regarding ZES ransomware