How to remove [[email protected]].fair ransomware and recover encrypted files

Complete [[email protected]].fair ransomware removal with data recovery guide

[[email protected]].fair ransomware is a file-locking virus that targets non-system files stored on the compromised host computer. It encodes them using some strong cipher algorithms and then asks bitcoin payment transfer for the decryption tool/ software. This malware belongs to Makop ransomware group.

During the file-encryption process, all affected files are renamed by the following pattern: victims’ ID, email address belongs to the crooks and .fair extension. For example, a file 1.jpg would appear something similar to “1.jpg.[8A42AD67].[[email protected]].fair.”The ransomware then drops Readme-warning.txt file on each compromised folders containing encrypted files. This file contains the ransom demanding message.

There seems nothing change in the text message in this new Makop variant from all its predecessors. The ransom note at first explains the victims about the data encryption happened to their device and that the only possible option to get them back is to pay the hackers using the Bitcoin cryptocurrency. The crooks free decryption service of two files as a proof that their decryption tool can be trusted. Only the users need to do is to establish contact to themvia [email protected] email address.

The ransom note ends with warnings that if victims rename the encrypted files and use third party tools this might lead to permanent data loss. As always recommended, you should avoid contact/pay to the crooks and remove [[email protected]].fair ransomware from the infected system immediately. To do that, use some reputable antivirus tool that can find and delete the ransomware with all associated components.

After [[email protected]].fair ransomware removal is done, experts recommend using existing backups to restore the files in the previously accessible condition. If the ransomware does not affect the Shadow Copies, you will automatically have another data recovery option – check below the post in the data recovery section for the complete guide to restore files using Volume Shadow Copies. Data recovery tools are nowadays designed with special functionality added and therefore you can use such tools for the data recovery, as well.

Full text presented in [[email protected]].fair ransomware’s created ransom note:

::: Greetings :::

Little FAQ:

.1.

Q: Whats Happen?

A: Your files have been encrypted and now have the “fair” extension. The file structure was not damaged, we did everything possible so that this could not happen.

.2.

Q: How to recover files?

A: If you wish to decrypt your files you will need to pay in bitcoins.

.3.

Q: What about guarantees?

A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities – nobody will cooperate with us. Its not in our interests.

To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc… not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.

.4.

Q: How to contact with you?

A: You can write us to our mailbox: [email protected]

.5.

Q: How will the decryption process proceed after payment?

A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.

.6.

Q: If I don’t want to pay bad people like you?

A: If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice – time is much more valuable than money.

:::BEWARE:::

DON’T try to change encrypted files by yourself!

If you will try to use any third party software for restoring your data or antivirus solutions – please make a backup for all encrypted files!

Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Common ransomware distribution techniques

Most often, ransomware viruses are distributed through scam campaigns, where thousands of spam emails are designed and delivered to trick people into believing that they are coming from some legit institutions, companies, organizations. However, the letters contain infectious files or links for such files, if clicked- the malware download/ installation process is triggered. Untrustworthy downloading channels like peer-to-peer networks, free file hosting sites and third party downloaders/ installers can cause system infection with malware. They spread malware by presenting it as legit software. Similarly, fake software updaters and unofficial cracking tools can be used for ransomware distribution purposes.

Guidelines to avoid ransomware infection

  • Always have backup option available for all crucial files stored on the system,
  • Employ legit AV tools and keep its databases up-to-date,
  • Keep OS up-to-date and install the latest updates soon they are available,
  • Be aware of techniques used by crooks for malware distribution – never click on spam emails, hyperlinks or attachments in them,
  • Never visit high risky websites such as torrents,
  • Main registry and other core system settings.

Remove [[email protected]].fair ransomware

Manual malware removal guide is provided below in step by step manner. Follow it so that you will not find any trouble during removal process. You can use some reputable antivirus tool to automatically remove [[email protected]].fair ransomware from the system.

Special Offer (For Windows)

[[email protected]].fair ransomware can prove dangerous if remains on your computer for longer duration. So, we suggest you to try for Spyhunter to scan entire PC and find out malicious threat.

For more information, read SpyHunter’s EULA, Threat Assessment Criteria, and Privacy Policy. Spyhunter checks that your computer has malware with its free trial version. If found any threat, it takes 48 hours time for its removal. If you need to eliminate [[email protected]].fair ransomware instantly, you are required to purchase licensed version of this software.

Data Recovery Offer

To restore encrypted data or files out of your ransomware infected machine, using a lately created backup file is highly suggested. The users can also take a trial with a data recovery software to check if it can help recovering files. Take a free trial with the app here.

In order to remove [[email protected]].fair ransomware, follow any of the two steps:

  1. Remove [[email protected]].fair ransomware using “Safe Mode with Networking”
  2. Remove [[email protected]].fair ransomware using “System Restore”

Remove [[email protected]].fair ransomware using Safe Mode with Networking

Step 1: Restart the system in Safe Mode with Networking before you attempt to eliminate [[email protected]].fair ransomware.

Windows 7/Vista/XP

  • Click Start > Shutdown > Restart > Ok
  • Wait till the computer becomes active
  • After the Windows screen appear, start pressing F8 multiple times until you see Advanced Boot Options Window
  • Select Safe Mode Networking from the list

Windows 10/Windows 8

  • Press the Power button on Windows login screen and then press and hold Shift button on the keyboard
  • Then, click on Restart
  • Now, Select Troubleshoot> Advanced options> Start up settings and finally press Restart
  • When computer becomes active, click Enable Safe Mode with Networking in startup settings Window

Step 2: Remove [[email protected]].fair ransomware

Login to the infected device, start the browser and download Spyhunter or other legit anti-virus program. Before performing system scan, update it and remove the malicious files belong to the ransomware and then complete the [[email protected]].fair ransomware removal.

If the ransomware has blocked the Safe Mode with Networking, try further method.

Remove [[email protected]].fair ransomware using System Restore

This feature offers the ability to restore the device to the previous state.

Step 1: Reboot the device with Safe Mode with Command Prompt

Windows 7/Vista/XP

  • Click StartShutdown > Restart >OK
  • When system becomes active, press F8 button multiple times till Advanced Boot options Window appear
  • Select Command Prompt from the list

Windows 10/Windows 8

  • Press the Power button at the Windows login screen and then press and hold Shift button on the keyboard and click Restart
  • Select Troubleshoot > Advanced options > Startup Settings and finally press Restart
  • Once the computer becomes active, select the Enable Safe Mode with Command Prompt in Startup settings Window

Step 2: Restore the system files and settings

  1. Once the Command Prompt Window shows up, enter cd restore and click Enter

2. Now, type rstrui.exe and press Enter

3. In the opened Window, click “Next” 

4. Select the zonal point that is prior the infiltration of [[email protected]].fair ransomware. After doing this, click “Next

5. Now click yes to Start System restore

Once you restore the system to the previous data, download and scan the device some reputable antivirus tool such as Spyhunter to ensure that [[email protected]].fair ransomware removal is performed successfully.

You can use Windows Previous Version feature to restore the individual files that were affected. This method will be the effective one if the System Restore function was enabled on the compromised device.

Note that, some of the [[email protected]].fair ransomware variants are known to delete Shadow Volume Copies of the files, and therefore, this method is not the sure shot for the data recovery.

Why Spyhunter?

SpyHunter is an anti-malware tool that scans the device for searching and identifying malware attacks, block malware, adware, spyware and other potentially unwanted applications. Its scanning algorithm and programming logics are continually updated and therefore it tactics the latest malware infections as well.

More about Spyhunter

SpyHunter is a very advanced scanning architecture. It features multi layered system scanner that helps it on detecting old as well as new viruses. It provides an option to customize the scans as well. Its other helpful feature includes the cloud based capability for detecting highly advanced and sophisticated malware and providing complete protection from it. It also offers the feature of scanning the particular drivers or folders, previous scan log view, manage the quarantined objects and also pick that objects that you wish to be excluded from the future scan.

The antivirus tool especially focused son taking quick action on the newly detected threats. Its real time blocking capability helps you to prevent the attacks, downloads and installation of any kinds of kinds and removing most aggressive malware. It has special feature to perform system booting in customized environment and remediate malware at the lower level of the system.  Most importantly, Spyhunter scans the cookies that are possibly representing privacy issues.

Instructions to Download and Install the latest Spyhunter 5

    • You can simply download Sphunter from link given below.

Special Offer (For Windows)

[[email protected]].fair ransomware can prove dangerous if remains on your computer for longer duration. So, we suggest you to try for Spyhunter to scan entire PC and find out malicious threat.

For more information, read SpyHunter’s EULA, Threat Assessment Criteria, and Privacy Policy. Spyhunter checks that your computer has malware with its free trial version. If found any threat, it takes 48 hours time for its removal. If you need to eliminate [[email protected]].fair ransomware instantly, you are required to purchase licensed version of this software.

  • After the download, you will see SpyHunter-Installer.exe file on the browsers at the bottom-left corner. Double-click on it to open it:
  • Confirm With “Yes” on the User Account Control
  • Choose the Preferred language

  • Click Continue to precede the installation steps

  • Read and click on accept button to agree to End User License Agreement and Privacy Policy. Then, click on Install button

  • Now the installation process will begin. Wait, till the process is completed. It takes a few minutes

  • Once the process is completed, you will see a Finish Click on it to complete the process of installation of the application.

Steps to perform System Scan using SpyHunter

  • After the application installation, the SpyHunter 5 anti-malware tool will launch automatically. However, if it does not, then locate the SpyHunter icon on the desktop or click Start > Programs > Select SpyHunter.
  • On the application page, you will find home tab on the left top corner. Click on it and select Start Scan Now button. The antivirus tool will then start the scanning for threats and system vulnerabilities

  • The scanning results will show system errors, vulnerabilities and malware found, if any

Note: To continue and perform the detected threats, you require full product. Below, the step-by-step instruction to register for the SpyHunter is provided for you:

How to Register for SpyHunter

On the top right corner of the program window, there is a Register option. Click on it and follow the instructions

  • Once you have registered, you will be provided Username and Password. Click on the Account Tab of the settings section and enter the provided username and password. Thereafter, you can avail the full feature of the app for your computer

  • SpyHunter will provide the scanning results in a category wise such as Malware, PUPs, Privacy, Vulnerabilities and Whitelisted objects -as you see below

  • Select the objects that you would like to remove and click the Next button

The selected objects will go SpyHunter’s Quarantine and so you can easily restore it anytime through Restore feature.

  • To locate any object

Go to Malware/PC Scan tab and click on Quarantine tab

In this section, select the checkbox at the left of the object and click on the Restore button

  • To perform removal of an object

Just select the object on the checkbox at the left displayed in the Malware PUPs or Privacy tabs. This allows you select and deselect all objects displayed on specific tab.

Steps to restore individual files

To restore a file, right click over it, go into the properties and select the previous version tab. If this file has the Restore Point, select it and click on Restore button

You should boot your device using a rescue disk, in case you are not able to start your device in Safe Mode with Networking (or with Command Prompt). For this you require access to another computer.

To gain control over the [[email protected]].fair ransomware encrypted files, you can use a program called Shadow Explorer.

More on Shadow Explorer application

After installing this application, you will see the shortcut of it to the desktop in the start menu. Running this app does not require administrative privileges from version 0.5. But in certain circumstances, it can be helpful to run ShadowExplorer with elevated privileges -using right click, run as administrator.

  • When you install the app as administrator, first thing you see is the user account control screen requesting administrator privileges

  • This is the picture of the app when everything works correctly

  • From the drop down list, select one of the available point in the time Shadow Copies

  • You can export any file or folder by a right click on it

  • Then, choose a folder where you want those files from t he Shadow Copy are saved to

  • The image shows the status of the retrieval process

  • The app may ask for your confirmation before overwriting in case if a file or folder in the destination directly already exists. Click on Do not show this dialog box, after this it won’t be shown ever again

  • You will be given an reset the previous decision as well in the settings dialog

Important discussion: Now, you are familiar with ransomware and its impact on the infected PC. What we mean to say that the ransomware viruses are said to be deadly threats. And therefore, better for you to take adequate protection to avoid the attacks on your work station. For safety, you should use some reputable antivirus suite like Spyhunter that artificially implants the group policy objects into the registry to block rogue apps like [[email protected]].fair ransomware.

Note that in Windows 10 Fall Creators Update, you will get a unique feature called Controlled Folder Access that blocks ransomware attempts to encrypt the crucial files like Documents, Pictures, Videos, Music, Favorites and Desktop folders.

 

Thus, Windows 10 users should take this privilege and must install the update to protect their data ransomware attacks. To know more on how to get this update and add an additional protection layer from ransomware infection, click here.

How to recover the data encrypted by [[email protected]].fair ransomware?

We have already discussed two important data recovery methods, i.e., the System Restore and Shadow Volume Copies. Hope so, these methods work in your case. However, if these options are not enough for you for the data recovery, you need to switch to another data recovery option that is use the data recovery tool. Such tools work on the basis of system scanning and recovery algorithm. They operate by searching the partitions to locate the original files (deleted, corrupted or damaged by the malware). Before using this option, certain things you should keep in mind:

  • Do not re-install the Windows OS -this leads the previous copies permanently deleted
  • Clean the work station from [[email protected]].fair ransomware infection
  • Leave the files as they are

Follow these instructions:

  1. Download the data recovery software in the Work-station from the link below

Data Recovery Offer

To restore encrypted data or files out of your ransomware infected machine, using a lately created backup file is highly suggested. The users can also take a trial with a data recovery software to check if it can help recovering files. Take a free trial with the app here.

  1. Execute the installer by clicking on the downloaded files

3. You will see a license agreement page on the screen, click on Accept button to agree its terms to use and then follow the on-screen instruction and then click on Finish button

4. The programs executes automatically after the install. You just select the file types that you want to recover and click on the “Next” button

5. Select the drive on which you want the software to run, execute the recovery process and click on scan button

6. The restoration process begins soon you select the file types for scanning. The process may take times depending on the selected drive and number of files. Once this process gets completed, a preview for the data that are to be recovered appears on a data explorer screen. Here, select the files you want to restore.

7. After this, locate the locations where you want to save the recovered files