Infected with HappyLocker Ransomware? Need to decrypt your files?
What is HappyLocker Ransomware
When you see the black screen with the message that your files was encrypted with “HappyLocker” it means that your system infected by ransomware. The HappyLocker Ransomware is a threat that is designed to encrypt the victim’s data and demand payment in Bitcoins to release a decryptor. Payment amount is 0.1 BitCoin or approximately 70$. HappyLocker encrypts the files with AES-256 cipher or similar. The authors of the HappyLocker Ransomware deliver the Trojan to users by using spam emails. Users get it when they are opening emails with infected attachments. Latest research shows that cyber bandits also use P2P networks and fake downloads containing malicious files.
Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.
How HappyLocker Ransomware infected your PC
After the malicious files are successfully dropped onto the computer of the user, the Happy Locker ransomware begins to scan and encrypt your files, using the AES-256 encryption algorithm. The makers of the HappyLocker Ransomware stick to their brand of file marker and append the .happy suffix to the original file format. HappyLocker got its name, because it adds .happy extension to affected files. For example, documen1.doc will be changed to documet1.doc.happy and Windows Explorer will not be able to associate a program with the corrupted file. Then HappyLocker creates 2 files: READDDDDDD.txt and READ.bmp that contains following text:
IMPORTANT INFORMATION!!!!
All of your files are encrypted with HAPPY Ciphers
To Decrypt :
– Open This Page : http://ysasite(dot)com/happy
– Follow All Steps
This webpage have a ransom-demand message saying that you need to pay .1 Bitcoin (~$700) to restore your files. You shouldn’t do any payment because as a rule, most victims are ignored once payments are submitted. We highly recommend you don’t visit suspicious sites, don’t download files from untrusted sources to avoid this threat. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.
First of all don’t panic. Follow these easy steps below.
1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the HappyLocker Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.
Recommended Solution:
Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to HappyLocker Ransomware – files, folders, registry keys.
*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.
Step 2: Remove following files and folders of HappyLocker Ransomware:
Remove following registry entries:
no information
Remove following files:
no information
How to decrypt files infected by HappyLocker Ransomware (.happy)?
Use automated decryption tools
There is ransomware decryptor from Kaspersky that can decrypt .happy files. It is free and may help you restore .happy files encrypted by HappyLocker Ransomware virus. Download it here:
You can also try to use manual methods to restore and decrypt .happy files.
Decrypt .happy files manually
Restore the system using System Restore
Although, latest versions of HappyLocker Ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.
- Initiate the search for ‘system restore‘
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – HappyLocker Ransomware by HappyLocker Ransomware). This feature is available in Windows 7 and later versions.
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
Restore .happy files using shadow copies
- Download and run Shadow Explorer.
- Select the drive and folder where your files are located and date that you want to restore them from.
- Right-click on folder you want to restore and select Export.
- Once the scanning process is done, click Recover to restore your files.
Restore encrypted files using Recuva
Some ransomware threats make copy of original files, encrypt them and then remove original files. In this case you can try to restore this files using free Recuva software.
- Download and run Recuva.
- Select type of files you want to restore and click Next.
- Select the drive and folder where your files are located and click Next.
- View restored files and put a check near those you want to recover.
- Click Recover button.
Protect your computer from ransomware
Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.
Information provided by: Alexey Abalmasov