• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

.zzzzz files restore (Remove ZZZZZ virus)

Myantispyware team November 25, 2016    

Are your personal files, such as documents, photos, music does not open normally, their names changed or .zzzzz added at the end of their name? Then your PC is infected with a new virus from a family of the Locky file-encrypting ransomware like the previous version called Odin, Sh*t, Thor and Aesir. The main difference is that the new version of Locky virus switched to use the .zzzzz extension on encrypted files. Once started, it will encrypt all personal files stored on a computer drives and attached network drives.

ZZZZZ virus ransomnote

ZZZZZ virus ransomnote

The new version of Locky uses very strong AES encryption with a huge key. When the ransomware encrypts a file, it will add the .zzzzz extension to each encrypted file. Once the virus finished enciphering of all files, it will create a file named “-INSTRUCTION.html” with an instructions on how to decrypt all encrypted files.

The ZZZZZ (Locky) virus offers to make a payment in Bitcoins to get the .zzzzz decryptor and private key to decrypt files. Important to know, currently not possible to decrypt the .zzzzz files encrypted by this ransomware without the private key and decrypt program, but you can try to restore the encrypted files using a few free utilities.

If you choose to pay the ransom, there is no 100% guarantee that you can get back your files! If you do not want to pay for a decryption key, then you have a chance to restore your files. Use the step-by-step guide below to remove the virus itself and try to restore your files.

Table of Contents

  1. What is ZZZZZ (Locky) ransomware?
  2. Is my system infected with ZZZZZ (Locky) ransomware?
  3. How does my computer get infected with ZZZZZ (Locky) virus ?
  4. How to decrypt .zzzzz files ?
  5. How to remove ZZZZZ (Locky) virus?
  6. How to restore zzzzz files ?
  7. How to prevent my computer from becoming infected by ZZZZZ (Locky) ransomware?

What is ZZZZZ (Locky) ransomware?

The ZZZZZ virus is a new variant of the Locky ransomware infection. It affects all current versions of Windows operating systems such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10. This virus uses a hybrid AES + RSA encryption mode to eliminate the possibility of brute force a key, which will allow to decrypt all encrypted files.

When the virus infects a computer, it loads a core file to the system %Temp% folder from the World Wide Web, decodes it and starts using the legitimate Windows program called “rundll32.exe”.

Immediately after the launch, the ransomware scans all available disks, including network and cloud storage, to determine which files will be encrypted. The ransomware uses the file name extension, as a way to define a group of files that will be subjected to encrypting. Encrypted almost all types of files, including common as:

0, .1, .1st, .2bp, .3dm, .3ds, .sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt, .wav, .wbc, .wbd, .wbk, .wbm, .wbmp, .wbz, .wcf, .wdb, .wdp, .webdoc, .webp, .wgz, .wire, .wm, .wma, .wmd, .wmf, .wmv, .wn, .wot, .wp, .wp4, .wp5, .wp6, .wp7, .wpa, .wpb, .wpd, .wpe, .wpg, .wpl, .wps, .wpt, .wpw, .wri, .ws, .wsc, .wsd, .wsh, .x, .x3d, .x3f, .xar, .xbdoc, .xbplate, .xdb, .xdl, .xld, .xlgc, .xll, .xls, .xlsm, .xlsx, .xmind, .xml, .xmmap, .xpm, .xwp, .xx, .xy3, .xyp, .xyw, .y, .yal, .ybk, .yml, .ysp, .z, .z3d, .zabw, .zdb, .zdc, .zi, .zif, .zip, .zw

Once a file is encrypted, its name will be changed on something like “A3C7BD12D-36AD-8D9CE-FE1A-2A5A8BD1F0” and appended the .zzzzz extension. An example, if a file named ‘photo.jpg’, then once encrypted, it will be renamed to ‘A3C7BD12D-36AD-8D9CE-FE1A-2A5A8BD1F0.zzzzz’.

In every directory that contains at least one encrypted file, the virus will drop a file named with _0-INSTRUCTION.html or _INSTRUCTION.bmp or _[2 digits]-INSTRUCTION.html. This file contain instructions on how to decrypt all encrypted files. An example of these instructions:

!!! IMPORTANT INFORMATION !!!!

All of your files are encrypted with RSA-2048 and AES-128 ciphers.
More Information about the RSA and AES can be found here:

xxx

Decrypting of your files is only possible with the private key and decrypt program
To receive your private key follow one of the links:

xxx

If all of this addresses are not available, follow these steps:
1. Download and install Tor Browser:xxx
2. After a successful installation, run the browser and wait for Initialization.
3. Type In the address bar: xxx.

Your persons identificalon ID:

When all users files are encrypted, it will opemn the ransomnote with instructions on How to descrypt .zzzzz files, or rather, the instructions describes in details on how to pay the ransom to get the ‘zzzzz decryptor’ and the private key needed to decrypt all files.

This ransomware actively uses scare tactics by giving the victim a brief description of the encryption algorithm and showing a threatening message on the desktop. It is trying to force the user of the infected computer, do not hesitate to pay a ransom, in an attempt to recover encrypted files.

Is my system infected with ZZZZZ (Locky) ransomware?

Identify that your personal computer is infected with ZZZZZ (Locky) ransomware quite easily. If your personal files, such as documents, photos, music does not open normally, that is, for example, when you try to open a document, Word reports that it is an unknown file type, then it is likely that the document is encrypted, and your computer is infected. Of course, the presence on the desktop a ransom screen or threatening message is a sign of infection.

If you suspect that you have opened a email that infected with ZZZZZ (Locky) ransomware, but you does not see any symptoms of the infection, then follow the steps in this guide, see How to remove the ZZZZZ (Locky) virus as soon as possible! Another option, shut down the computer, remove the hard drive and check it on another computer.

How does my computer get infected with ZZZZZ (Locky) virus

ZZZZZ (Locky) virus is distributed through the use of spam emails. Below is an email that is infected with a randomware such as ZZZZZ (Locky) virus.

zzzzz virus spam email

Once this attachment has been opened, this virus will be started automatically as you do not even notice that. ZZZZZ (Locky) ransomware will start the encryption process. When this process is done, it will display the usual ransom instructions like above on -INSTRUCTION.html.

How to decrypt .zzzzz files

Currently there is no available method to decrypt zzzzz files for free. The ransomware repeatedly tells the victim that uses a strong encryption algorithm with 2048-bit key. What does it mean to decrypt the files is impossible without the private key. Use a “brute forcing” method is also not a way because of the big length of the key. Therefore, unfortunately, the only payment to the makers of the ZZZZZ (Locky) ransomware entire amount requested – the only way to try to get the decryption key.

There is absolutely no guarantee that after the payment of the auzzzzzs of the ZZZZZ (Locky) ransomware will provide the necessary key to decrypt your files. In addition, you must understand that paying money to the cyber criminals, you are encouraging them to create a new virus.

How to remove ZZZZZ (Locky) virus

The following instructions will help you to remove ZZZZZ (Locky) malicious software. Before doing it, you need to know that starting to remove the virus, you may block the ability to decrypt files by paying creators of the virus requested ransom.

Kaspersky Virus Removal Tool and Malwarebytes Anti-malware can detect different types of active ransomware and easily remove it from your computer, but they can not recover encrypted files.

Remove ZZZZZ (Locky) virus with MalwareBytes Anti-malware

Download MalwareBytes Anti-malware (MBAM) from the link below.

MalwareBytes Anti-malware download link

Once downloaded, close all programs and windows on your computer. Open a directory in which you saved it. Double-click on the icon that named mbam-setup like below.

Malwarebytes Anti-Malware setup file icon

When the installation begins, you will see the Setup – Wizard that will help you install MalwareBytes Anti-malware on your computer.

Malwarebytes Anti-Malware installation

Once installation is complete, you will see window similar to the one below.

Malwarebytes scan now

Now click on the Scan Now button to start scanning your computer. This procedure can take some time, so please be patient.

Malwarebytes detects istartsurf

When the scan is finished, make sure all entries have “checkmark” and click Remove Selected button. MalwareBytes Anti-malware will start to remove ransoware related files, folders, registry keys. Once disinfection is completed, you may be prompted to Restart.

Remove ZZZZZ (Locky) virus with Kaspersky virus removal tool

Download Kaspersky virus removal tool from here and save it directly to your Windows Desktop.

Double-click on the KVRT icon found on your desktop. Once initialization process is finished, you will see the Kaspersky virus removal tool screen as shown below.

kvrt main window

Click Change Parameters and set a check near all your drives. Click OK to close the Parameters window. Next click Start scan button. Kaspersky virus removal tool will now start scanning your computer for known infections. This procedure can take some time, so please be patient.

kaspersky virus removal tooll scanning

When KVRT has finished scanning, you will see a screen like shown below.

kvrt scan report

Click on Continue to start a cleaning process.

How to restore zzzzz files

In some cases, you can recover files encrypted by ransomware. Try both methods. Important to understand that we cannot guarantee that you will be able to recover all encrypted documents, photos and other files.

Restore zzzzz files with ShadowExplorer

Download ShadowExplorer from the following link.

ShadowExplorer download link

Open a directory in which you saved it. Right click to ShadowExplorer-0.9-portable and select Extract all. Follow the prompts. Next please open the ShadowExplorerPortable folder as shown below.

ShadowExplorer folder

Double click ShadowExplorerPortable to run it. You will see the following screen.

ShadowExplorer
In top left corner, select a Drive and a latest restore point as shown on the example below (1 – drive, 2 – restore point).

ShadowExplorer

On right panel look for a file that you want to restore, right click to it and select Export. An example below.

ShadowExplorer restore file

Restore zzzzz files with PhotoRec

Download PhotoRec from the link below.

PhotoRec download link

Open a directory in which you saved it. Right click to testdisk-7.0.win and select Extract all. Follow the prompts. Next please open the testdisk-7.0 folder as shown below.

testdisk photorec folder

Double click on qphotorec_win to run PhotoRec for Windows. It will open a screen like below.

PhotoRec for windows

Select a drive to recover from as shown below.
photorec select drive

You will see a list of available partitions. Select a partition that holds the lost and encrypted files. An example below.

photorec select partition

Click on File Formats button and select file types to recover. You can to enable or disable the recovery of certain file types. When this is done, click OK button.

PhotoRec file formats

Next, click Browse button to select where recovered files should be written, then click Search.

photorec

Count of recovered files is updated in real time. All recovered files are written in a folder that you have selected on the previous step. You can to access the files even if the recovery process is not finished.

When the recovery is completed, click on Quit button. Next, open the directory where recovery files are stored. You will see a contents like below.

PhotoRec - result of recovery

All recovered files are written in recup_dir.1, recup_dir.2 … sub-directories. If you are looking for a specific file, then you can to sort your recovered files by extension and/or date/time.

How to prevent my computer from becoming infected by ZZZZZ (Locky) ransomware?

Most antivirus programs already have built-in protection system against the ransomware. Therefore, if your computer does not have an antivirus program, make sure you install it. As an extra protection, use the CryptoPrevent.

Download CryptoPrevent from the link below.

www.foolishit.com/download/cryptoprevent/

Run it and follow the setup wizard. Once the installation is completed, you will be shown a window where you can select a level of protection, as shown in the following example.

CryptoPrevent

Click the Apply button to activate the protection.

The End.

Your computer should now be free of the ZZZZZ (Locky) virus infection. If you need help with the instructions, then ask for help here.

Virus

 Previous Post

How to remove goingads.xyz redirect [Chrome, Firefox, IE]

Next Post 

How to remove Googletab.com (Chrome, Firefox, IE, Edge)

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

2 Comments

  1. Don Hart
    ― December 23, 2016 - 3:17 pm  Reply

    I followed everything down to the “In top left corner, select a Drive and a latest restore point as shown on the example below (1 – drive, 2 – restore point).” I did not see where the selecting of a restore point was shown. Where are the restore points?

    I also cannot understand selecting the file I want to restore. I want to restore all ZZZZZ files to their original title and content. How do I do that?

    Thank you for your help.

  2. Patrik (Myantispyware admin)
    ― December 28, 2016 - 9:37 pm  Reply

    Looks like that your system don’t have any restore points. So, skip this step an try to use PhotoRec software.

Leave a Reply Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

ads by adware
How to remove Adware from Windows 10 (Virus removal guide)
How to reset Internet Explorer settings to default
Best free malware removal tools
Best Free Malware Removal Tools 2025
How to remove browser hijacker virus (Chrome, Firefox, IE, Edge)
adwcleaner
AdwCleaner – Review, How to use, Comments

Recent Guides

How to remove goingads.xyz redirect [Chrome, Firefox, IE]
How to remove gutrosoft.com pop-ups (Chrome, Firefox, IE, Edge)
How to remove Goooglesearch.net (Chrome, Firefox, IE, Edge)
How to remove internetwait.com [Chrome, Firefox, IE, Edge]
How to remove Webshields ‘Search Engine’

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.