GruzinRussian@aol.com Ransomware Removal Guide

Do you know what GruzinRussian@aol.com Ransomware is?

GruzinRussian@aol.com Ransomware is almost identical to Opencode@india.com Ransomware and Grand_car@aol.com Ransomware because they all come from the same developer. You should refrain from paying the ransom because there is no guarantee that you will get the promised decryption software and key. Therefore, we advise that you remove it from your PC as soon as you can before it encrypts newly added files. Hence, this application’s primary purpose is to encrypt the files stored on your PC’s hard drive and demand that you pay a ransom to get them back.

GruzinRussian@aol.com Ransomware comes from a developer that has been hard at work releasing new clones of the same ransomware over and over again. Previously, this developer has also released Makdonalds@india.com Ransomware, Alex.vlasov@aol.com Ransomware, Radxlove7@india.com Ransomware and many others. All of these applications including this new ransomware are disseminated using email spam. The email features an attachment, a fake attachment that may look like an ordinary Microsoft Word (.doc, .docx) file that, when opened, shows distorted text and the undistorted text asks you to enable macros. If you enable them, then this fake file will secretly download the malicious executable and execute it without your knowledge or authorization. Therefore, you should be suspicious of emails that come from DHL, FedEx, and other shipping companies if you did not expect anything to arrive.GruzinRussian@aol.com Ransomware Removal GuideGruzinRussian@aol.com Ransomware screenshot
Scroll down for full removal instructions

According to our malware researchers, this particular ransomware is set to drop its file in several locations that vary with each infection case. While testing it, they found that the executable file is dropped in %WINDIR%\Syswow64 and %WINDIR%\System32. However, additional research has also shown that the executable can be dropped in %ALLUSERSPROFILE%\Start Menu\Programs\Startup, %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup, and several other locations. Also, the ransomware creates several registry strings, such as the randomly named strings placed in HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run that ought to contain the Value data of %WINDIR%\Syswow64\Payload1.exe and %WINDIR%\System32\Payload1.exe. Take note that the name of the executable is subject to change.

Researchers say that this ransomware uses the RSA-2048 key (AES CBC 256-bit encryption algorithm) to encrypt the files. The key it uses is 2048 bits long, so it is quite difficult to crack and given how many clones this ransomware has, we suspect that security researchers might not bother with creating a decryption tool for each ransomware, but anything is possible nonetheless. GruzinRussian@aol.com Ransomware appends the encrypted files with the .xtbl file extension, but the extension also includes a unique user ID and the email address to which you have to write a response and send three encrypted files. Therefore, the full extension should look like id-B4500900.{gruzinrussian@aol.com}.xtbl. After the encryption is complete, it will change the desktop wallpaper with an image called Decryption instructions.jpg that is dropped in C:\Users\user. Also, it will drop another file named How to decrypt your files.txt on the desktop. These two files are actually ransom notes and ask you to contact the developer using one of two provided email addresses. We have received information claiming that the cyber criminal will ask you to make a transaction of 4 BTC (2301.64 USD.) The sum may vary, however. Still, there is no reason to pay such a vast amount of money for something that you might not get. Therefore, we suggest that you delete this malware and restore as many of your files from backup drives or other storage devices.

In conclusion, GruzinRussian@aol.com Ransomware is an application whose purpose is to encrypt your valuable data and demand that you pay a ransom to get them back. However, there is no guarantee that you will after you pay the ransom, so there is no use trusting the developer of this malicious program. Our security experts have made a manual removal guide that will aid you in locating and deleting all of GruzinRussian@aol.com Ransomware’s files and registry keys. Nevertheless, you can opt for SpyHunter that will get rid of the infection for you. Regardless, of the method you choose, both are effective, so take your pick.

How to remove this ransomware

  1. Simultaneously press Windows+E keys on the keyboard.
  2. In the File Explorer, enter the following file paths.
    • %WINDIR%\System32
    • %WINDIR%\Syswow64
    • %ALLUSERSPROFILE%\Application Data\Microsoft\Windows\Start Menu\Programs\Startup
    • %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup
    • %USERPROFILE%\Microsoft\Windows\Start Menu\Programs\Startup
    • %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup
    • %ALLUSERSPROFILE%\Start Menu\Programs\Startup
  3. Find an executable named Payload1.exe or with a similar name.
  4. Right-click it and click Delete.
  5. Close the File Explorer.
  6. Simultaneously press Windows+R keys on the keyboard.
  7. Enter regedit in the dialog box and click OK.
  8. In the Registry editor, navigate to HKCU\Control Panel\Desktop
  9. Locate the Wallpaper string, right-click it and click Modify.
  10. Delete the Value data C:\Users\user\Decryption instructions.jpg
  11. Then, go to HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Wallpapers
  12. Find BackgroundHistoryPath0 and delete it.
  13. Finally, go to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
  14. Find two randomly named strings whose Value data of %WINDIR%\Syswow64\name.exe and %WINDIR%\System32\name.exe

In non-techie terms:

GruzinRussian@aol.com Ransomware is set to encrypt your files and make them inaccessible. It uses a strong encryption algorithm, so decrypting them is currently not possible. The cybercriminal behind this ransomware wants you to purchase the decryption software for a hefty sum of money, but we do not recommend that you do that because you might not receive it. Not only that, but we recommend that you delete it as soon as you can.