Home » Cybersecurity » How to remove Scarab (Virus Removal Guide)
Scarab

How to remove Scarab (Virus Removal Guide)

Scarab virus

The Scarab virus is a ransomware infection that encrypts personal files on a computer it infects, adds a new file extension to the end of the filenames (such as .horsia@airmail.cc), drops a ransom note file throughout root directory folders, and changes the desktop background to a new image that says “Congratulations! All your files have been encrypted! If you want to restore them, write us to horsia@airmail.cc“on it.

Scarab

The ransom note dropped by the Scarab virus explains in the malware authors words what happened to the files on the machine and how to make a ransom payment to allegedly decrypt the files (the way the malware author wants you to). It should be noted that paying the ransom will not guarantee that you will recover your files or that the infection is removed and will not happen again in the future.

=======================================
________________________________
/ __/ / / __ / / __ / / __/ / __/ / __ /
/ __ / / /_/ / / _/ /__ / _/ /_ / __ /
\/ __/ \___/ \/\__\ \___/ \___/ \/ __/
=======================================
Your files are now encrypted!
Your personal identifier:
6A02000000000000***C4BFD00
All your files have been encrypted due to a security problem with your PC.
Now you should send us email with your personal identifier.
This email will be as confirmation you are ready to pay for decryption key.
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.
After payment we will send you the decryption tool that will decrypt all your files.
Contact us using this email address: horsia@airmail.cc
If you don’t get a reply or if the email dies, then contact us to saviours@airmail.cc
Free decryption as guarantee!
Before paying you can send us up to 3 files for free decryption.
The total size of files must be less than 10Mb (non archived), and files should not contain valuable information (databases, backups, large excel sheets, etc.).
How to obtain Bitcoins?
* The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price:
https://localbitcoins.com/buy_bitcoins
* Also you can find other places to buy Bitcoins and beginners guide here:
http://www.coindesk.com/information/how-can-i-buy-bitcoins
Attention!
* Do not rename encrypted files.
* Do not try to decrypt your data using third party software, it may cause permanent data loss.
* Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
=======================================

Scarab ransomware is typically spread like most ransomware is these days. It can be introduced to a machine from a website that hosts malware or through malicious email attachments. Emails messages often contain malicious attachments, that when executed, will launch the malware across the machine.


Removal Instructions

The Scarab ransomware removal guide on this page will help you remove Scarab virus and other malware from your computer for free. This guide will also help you decrypt and recover files encrypted by the ransomware.

1. Remove malicious files with Malwarebytes and HitmanPro
2. Clean up with CCleaner

Decryption
Troubleshoot


1. Remove malicious files with Malwarebytes and HitmanPro

1. Download and Install Malwarebytes to run a scan and remove malicious files from your computer.

download malwarebytes

buy now button

2. Once installed, open Malwarebytes and click the Scan Now button – or go to the Scan tab and click the Start Scan button.

3. When the Malwarebytes scan is complete click the Quarantine Selected button.

4. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.

5. Download and Install HitmanPro to perform a second-opinion scan and remove any remaining malicious trace files.

download hitmanpro

6. Once installed, open HitmanPro and click Next to start scanning your computer. *If you are using the free version you may chose to create a copy or perform a one-time scan.

7. When the HitmanPro scan is complete click the Next button.

8. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.

9. Click the Reboot button.

2. Clean up with CCleaner

1. Open your browser window and download CCleaner Professional or CCleaner Free.

download ccleaner

2. Open the executable file (ccsetup.exe or other) to begin installing CCleaner.

3. Click the Install button to begin stalling the program.

4. Click Run CCleaner to open the program when installation is complete.

5. Select the Cleaner tab and click the Analyze button.

6. When the Analyze process is complete click the Run Cleaner button to clean all files.

7. Next, select the Registry tab and click the Scan for Issues button to scan for issues in your registry.

8. When the scan is complete click the Fix selected Issues button and Fix All Selected Issues button to fix the issues.

9. Next, select the Tools tab and click Startup. Examine each area, search for suspicious entries, and delete any suspicious startup entries by selecting the entry and clicking the Delete button.

10. Next, click Browser Plugins and search each internet browser for unwanted browser add-ons and extensions. Click the extension you want to delete and click the Delete button to remove it.


File Recovery Software

NAME DESCRIPTION DOWNLOAD
Shadow Explorer Restores lost or damaged files from Shadow Copies Download (Free)
Photorec Recovers lost files Download (Free)
Recuva Recovers lost files Download (Free) | Buy

Troubleshoot

Alternative methods are suggested if there are issues removing Scarab ransomware from an infected computer.

How to Restore your computer

If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.

There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

How to Recover your computer to factory settings

A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.

There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.

A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.

Jared Harrison

Jared Harrison is an accomplished tech author and entrepreneur, bringing forth over 20 years of extensive expertise in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. He has made significant contributions to the industry and has been featured in multiple esteemed publications. Jared is widely recognized for his keen intellect and innovative insights, earning him a reputation as a respected figure in the tech community.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

What is the .EMAN file extension and how do I remove it?

How to remove hb15 ransomware

How to remove Curumim (Virus Removal Guide)