• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

.Domn file extension. Remove virus, Restore .domn files (without decryption)

Myantispyware team September 16, 2019    

.Domn file extension on your documents, images and other files means only one thing – you have become a victim of a ransomware attack. During this attack, ransomware was installed on your computer, and all files were encrypted. Many users, like you, have become victims of this virus. Unfortunately, at the moment, there is no way to decrypt files. But, there is one possibility that can allow you to completely restore all encrypted files (files with .Domn extension) to their original state, and you do not need to buy any programs or use difficult steps. Below in our instructions, we will describe in detail how to recover files without decryption.

Files encrypted by .Domn virus

Files encrypted by .Domn virus

According to users who became victims of this virus, each of them installed a program that he had previously downloaded from the Internet. After a short time, they noticed that unexpectedly the extension of their files changed to .domn, e.g. ‘document.doc‘, suddenly became a ‘document.doc.domn‘. Security experts confirm that that this virus is distributed through hacked games, infected free programs, key generators. Immediately after launching the infected program, the virus is activated and begins to encrypt files sequentially, and then change their extension to ‘.domn’. In this way, the virus indicates that the files are encrypted. The virus can encrypt many of the most common file types, such as:

.xls, .xbplate, .wp5, .dbf, .y, .wbmp, .mdb, .zdb, .bc6, .crt, .dcr, .x3d, .dazip, .epk, .xll, .ybk, .cdr, .bkp, .js, .jpeg, .rwl, .jpe, .mddata, .3fr, .rim, .3dm, .ai, .x, .rgss3a, .wp7, .erf, .1, .syncdb, .wpg, .wmv, .hplg, .sis, .ff, .wmf, .desc, .bc7, .odt, .cfr, .wp, .odp, .wmd, .bay, .wgz, .wpd, .wdp, .rtf, .wma, .sav, .wpd, .xar, .menu, .wot, .itl, .rb, .ptx, .p7b, .xpm, .bkf, .big, .m2, .pem, .hkx, .webp, .wri, .sie, .pdf, .rofl, .sql, .vpk, .vcf, .wbz, .t13, .zabw, .wm, .1st, .docx, .forge, .slm, .sum, .xx, .dwg, .bar, .psd, .fsh, .nrw, .itm, .qdf, .ztmp, .iwd, .yml, .cr2, .wp6, .mlx, .py, .mcmeta, .pst, .der, .wbd, .wmv, .wav, .sr2, .w3x, .ods, .pkpass, .sidd, .wsc, .apk, .t12, .wpl, .xlsx, .ppt, .wp4, .indd, .mef, .esm, .dba, .xlgc, .wpw, .wpb, .ltx, .d3dbsp, .mdbackup, .ws, .xlsm, .map, .xld, .eps, .blob, .odb, .p7c, .upk, .png, .xyw, .xml, .mp4, .raw, .srf, .wire, .yal, .wotreplay, .litemod, .mdf, .csv, .wbk, .0, .xmind, .xlsm, .odm, .qic, .xmmap, .gdb, .jpg, .vpp_pc, .xxx, .pak, .orf, .wpt, .xdb, .re4, .docm, .xlk, .lbf, .xlsx, .fos, .rar, .pptx, .xbdoc, .dmp, wallet, .x3f, .asset, .pfx, .avi, .gho, .dng, .ysp, .bik, .itdb, .lrf, .arw, .kdb, .layout, .mov, .xwp, .zdc, .wn, .snx, .wpa, .x3f, .z, .kdc, .pef, .wma, .accdb, .wsh, .hkdb, .zip

When the files are encrypted, in the same directory, the virus creates a file with the name ‘_readme.txt‘, in which the authors of the virus report that all documents are encrypted and require ransom. The authors of the virus suggest that the user write them an email letter in which he will inform his personal code. Upon receiving this email, the attackers will send the address of the Bitcoin wallet to which the ransom must be transferred.

Threat Summary

Name Domn virus
Type Ransomware, Crypto malware, Filecoder, File locker, Crypto virus
Encrypted files extension .domn
Ransom note _readme.txt
Ransom amount $980 in Bitcoins
Symptoms Your files fail to open. Your documents, photos and music now have a new extension. Files called like ‘_readme.txt’, ‘READ-ME’, ‘_open me’, _DECRYPT YOUR FILES’ or ‘_Your files have been encrypted” in every folder with an encrypted file. Ransom note in every folder.
Distribution methods Spam mails that contain malicious links. Drive-by downloads from a compromised web page. Social media, such as web-based instant messaging applications. Misleading web sites.
Removal To remove Domn ransomware use the removal guide
Decryption To decrypt Domn ransomware use the free STOP Djvu Ransomware Decryptor

 
If you become a victim of the Domn ransomware attack, then the first – do not panic. If you did not have an antivirus, or if your antivirus skipped this virus, and in all other cases, we advise you to check your computer for malware. There is a possibility that the virus is still active on your computer.

Quick links

  1. How to remove Domn virus
  2. Is it possible to decrypt .domn files?
  3. How to restore .domn files (without decryption)

How to remove Domn virus

Most experts say that removing ransomware virus manually without using special tools is very difficult, as it requires special knowledge. If you find instructions where you can press a few ‘magic’ buttons, use safe mode, and so on, then you should know that this is a hoax. We suggest you use several malware removal tools that will allow you to find and remove the Domn virus.




Remove Domn ransomware with Zemana Anti Malware

To find and remove Domn virus, use Zemana Anti Malware. It has powerful capabilities, it can detect and remove a variety of malware, including ransomware. This tool has a simple interface, a quick scanner, and most importantly, all found malware can be removed for free. That is, you do not need to buy anything.

Zemana Anti Malware (ZAM) detect Domn ransomware, other malicious software, worms and trojans

Using the Zemana Anti Malware to remove Domn ransomware is very simple, follow these simple steps.

  • Download Zemana AntiMalware from the following link:
    Zemana AntiMalware
    Zemana AntiMalware
    164985 downloads
    Author: Zemana Ltd
    Category: Security tools
    Update: July 16, 2019
  • Open a directory in which you saved it and run Zemana.AntiMalware.Setup.
  • You will see the “Setup wizard”, follow the prompts.
  • Once setup is complete, click the “Scan” button.
  • When the scan is complete, simply click “Next” button.

Use KVRT to remove Domn virus

if the Zemana AntiMalware did not find anything, then use the Kaspersky virus removal tool. This program was developed by (c) Kaspersky anti-virus company and has great capabilities. It can easily identify and remove various malicious programs and ransomware. As in the case of Zemana, found malware can be removed completely free of charge.

Kaspersky virus removal tool scanning

Using the Kaspersky virus removal tool to remove Domn virus is very simple, use the steps below.

  • Download Kaspersky virus removal tool (KVRT) from the link:
    Kaspersky virus removal tool
    Kaspersky virus removal tool
    129279 downloads
    Author: Kaspersky® lab
    Category: Security tools
    Update: March 5, 2018
  • Run KVRT.
  • Press Start scan button.
  • After that process is done, Kaspersky virus removal tool will display a scan report.
  • Press Continue to remove detected malware.

Is it possible to decrypt .domn files?

At the moment, all experts say one thing, files encrypted with ‘.domn file extension’ cannot be decrypted. But you must not despair! And of course, do not pay the ransom that attackers demand. All experts are united in this. There is no guarantee that after the transfer of the ransom, your files will be decrypted. Moreover, by paying the ransom, you will push the creators of the virus to develop new ransomware, the victims of which will be even more people. So you need to follow these steps:

  • Do not panic
  • Do not pay ransom
  • Report ransomware attack to the police
  • Remove ransomware
  • Look for backups of encrypted files
  • Try to restore .domn files (without decryption)

Update: good news! A few days ago a free decryptor was released. Below I provide a link where you will find detailed information on where to download it and how to use it to decrypt .domn files.

STOP Djvu Ransomware Decryptor – Free way to decrypt encrypted files

How to restore .domn files (without decryption)

Although it is impossible to decrypt files without an unique key and decryptor, you have a chance to recover all your files for free. Several programs, which are listed below, can help you with this. Once again, I want to note, before you start recovering files, you definitely need to check your computer for malware! Before using the file recovery process, try to use your computer as little as possible, otherwise the chance of successful file recovery will greatly decrease.




Use ShadowExplorer to recover .domn files

If you are sure that there are no active malware on your computer, then it’s time to try to recover the encrypted files. First try the tool, which is named ShadowExplorer. It uses the standard feature of the Windows OS 10 (8, 7 , Vista), which is called ‘Previous Versions’. Using this method, you can recover all your files. There is bad news here, unfortunately, most often the virus disables this feature and deletes all previous versions of files. This may lead to the fact that this method of file recovery may not be suitable for you. But you must try it!

ShadowExplorer recover files encrypted by the Domn ransomware virus

  • Download the ShadowExplorer.
    ShadowExplorer
    ShadowExplorer
    439623 downloads
    Author: ShadowExplorer.com
    Category: Security tools
    Update: September 15, 2019
  • Right click to ShadowExplorer-0.9-portable and select Extract all.
  • Open the ShadowExplorerPortable folder and run the ShadowExplorer
  • Select the disk (1) and the date (2).
  • Now navigate to the file or folder that you wish to recover. When ready right-click on it and click ‘Export’ button.

Restore .domn files with PhotoRec

There is another way to recover encrypted files. This is to use a program that is able to find old, deleted and lost files. One such program is a utility called PhotoRec. It has great features, a simple interface, and can recover files for free.

Download PhotoRec from the link below.

PhotoRec
PhotoRec
221290 downloads
Author: CGSecurity
Category: Security tools
Update: March 1, 2018

Right click to testdisk-7.0.win and choose Extract all. Open the testdisk-7.0 folder as on the image below.

testdisk photorec folder

Double click on qphotorec_win to run PhotoRec for Microsoft Windows. It’ll display a screen such as the one below.

PhotoRec for windows

Select a drive to recover as shown in the figure below.

photorec select drive

You will see a list of available partitions. Choose a partition that holds encrypted photos, documents and music as displayed in the figure below.

photorec select partition

Click File Formats button and select file types to restore. You can to enable or disable the recovery of certain file types. When this is complete, press OK button.

PhotoRec file formats

Next, press Browse button to choose where restored documents, photos and music should be written, then click Search.

photorec

Count of recovered files is updated in real time. All restored personal files are written in a folder that you have chosen on the previous step. You can to access the files even if the recovery process is not finished.

When the recovery is complete, click on Quit button. Next, open the directory where recovered documents, photos and music are stored. You will see a contents as shown on the image below.

PhotoRec - result of recovery

All restored files are written in recup_dir.1, recup_dir.2 … sub-directories. If you’re searching for a specific file, then you can to sort your recovered files by extension and/or date/time.

Finish words

We hopes that these instructions was able to remove the virus and restore the encrypted files. If you have any questions, or you could find another way to recover or decrypt .domn files, then write to us about it. If you need more help with Domn virus related issues, go to here.

 

Virus

 Previous Post

How to remove Apple Wants To Make Changes pop-up scam

Next Post 

How to remove Babunenhemted.pro popups [Virus removal guide]

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

1 Comment

  1. Jandão
    ― September 24, 2019 - 7:02 pm  Reply

    The problem got resolved!!!! ” A thing discovered and kept to oneself must be discovered again by others.” Thank you for shared … Thanks a Lot!!! I really appreciate !!!

Leave a Reply Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

Best free malware removal tools
Best Free Malware Removal Tools 2025
Files encrypted by ransomware become useless
How To Recover Encrypted Files (Ransomware file recovery)
Smart Captcha Virus redirect
What is a Virus that Redirects Web Pages? A Comprehensive Guide
How to reset Mozilla Firefox (Updated Apr. 2018)
How to remove pop-up ads [Chrome, Firefox, IE, Opera, Edge]

Recent Guides

Apple Wants To Make Changes
How to remove Apple Wants To Make Changes pop-up scam
Isoamylife.info
How to remove Isoamylife.info pop-ups virus [Chrome, Firefox, Android, Safari]
Putop.me
How to remove Putop.me pop-ups virus
Parowleronter.pro
How to remove Parowleronter.pro pop-ups (Virus removal guide)
Herheparterhan.pro
How to remove Herheparterhan.pro pop-ups (Virus removal guide)

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.