Removal guides

Remove BOOT Ransomware Virus (2022 Guide)

BOOT ransomware virus is a strain of DJVU malware

BOOT ransomware virus is a file-encrypting malware from STOP/DJVU ransomware family (v0167). It encrypts all files on victim’s computer and connected cloud accounts using AES/RSA cryptography, making them impossible to open. The malware marks each file with .boot file extension and then creates a ransom note in _readme.txt file, which contains instructions regarding data recovery.

The ransom note left by ransomware developers informs the user that all photos, databases, documents and other files have been encrypted, and the only way to restore them is to pay a ransom in Bitcoin.

The criminals suggest sending some files to them to get them decrypted as a proof of the STOP/DJVU decryption tool’s functionality. There are two contact email addresses provided: gorentos@bitmessage.ch and gerentoshelp@firemail.cc.

The ransom note informs about the encrypted files which can be recognized from modified extensions appended to filenames.

The cybercriminals state ransom price rules same as in previously distributed NESA ransomware variant:

  • If the victim pays within 72 hours after getting files encrypted with .boot file extensions, the ransom price is $490.
  • If the victim fails to pay within 3 days, the ransom price doubles to $980.

The virus typically encrypts all files using ONLINE key (if it manages to connect to its command&control server). However, in some cases it might encrypt some files using OFFLINE key or a combination of both. Speaking of BOOT file decryption, it can be done only on files locked using OFFLINE key. You can also use your data backup to restore encrypted files.

However, in case your personal ID ends with t1, there might be some hope to restore your files because it indicates that files were locked with an OFFLINE key. See the main article about DJVU for decryption details.

In case your files were encrypted with ONLINE key, which is the most common way of encryption since each infected computer typically is connected to network – there are no BOOT decryption tools available.

There are no options to recover .boot file extension data encrypted by the virus using Volume Shadow Copies – the virus deletes them using a command prompt. It also runs these commands to stop particular Windows services and disable recovery options.

sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

Beware of additional malware on your system

The STOP ransomware (also known as DJVU) is known to distribute additional malware called Azorult password-stealing Trojan Several victims have already reported that the attackers managed to steal their passwords and use their financial data illegally.

It is clear that if you want to avoid that, you must remove Boot ransomware virus along with all other threats from your PC immediately. Please follow the instructions given at the end of this article. After that, change all your important passwords (online shops you used recently, other accounts connected to your credit cards) IMMEDIATELY.

Screenshot of the infected computer kindly submitted to us by one of the victims.

Content of the ransom note (_readme.txt or _openme.txt) is shown below.

ATTENTION!

Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
[removed link]
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:
gorentos@bitmessage.ch

Reserve e-mail address to contact us:
gerentoshelp@firemail.cc

Your personal ID:
0165hTlGeRsMTHVpwDk4Ylm4RWx1y69zcacA5hSp3l60BnYwdby

Boot ransomware note (_readme.txt)

Threat Summary

NameBOOT ransomware virus
TypeRansomware (STOP/DJVU family)
Ransom note_readme.txt, _openme.txt
Ransom price$490-$980
EncryptionAES combined with RSA
DecryptionImpossible; unless an offline key is used.
DistributionMalicious emails, infected downloads
RemovalRemove using antivirus software

Ransomware distribution tactics

Boot ransomware, as well as the whole STOP/DJVU virus variants are known to reach the targets via classic malware distribution channels, such as:

  • Malicious spam;
  • Malicious links;
  • Compromised ad networks;
  • Compromised web pages.
  • Illegal downloads.

Please be very careful when browsing online to avoid unexpected data loss. Cyber criminals are highly professional nowadays and they can obfuscate a malicious file almost without leaving no traces. Resist the temptation to open an interesting e-mail you received but never waited for – it is most likely a trap that will destroy all of your files.

One wrong click on an email attachment or malicious link can turn all your files useless, so please be extremely attentive what you open when browsing the world wide web. We suggest reading these ransomware prevention guidelines.

BOOT ransomware removal tips

You must remove BOOT ransomware virus instantly due to the privacy hazards it causes. Some variants of this malware spreads along with Azorult data-stealing Trojan, so we strongly recommend using a robust malware cleaner – antivirus.

Start Boot ransomware removal using the self-help guide given below. It is extremely important to use an up-to-date antivirus so that it could have this virus’ detection details. Once you get rid of the malware on your computer, start data recovery using a backup you have. If you don’t, there may be no ways to restore your files.

If that’s the case, we still do not encourage you to pay the ransom – cyber criminals aren’t the ones to be trusted, so even after paying you might never get your files back.

OUR GEEKS RECOMMEND

Our team recommends a two-step rescue plan to remove ransomware and other remaining malware from your computer, plus repair caused virus damage to the system:

STEP 1. REMOVE AUTOMATICALLY WITH ROBUST ANTIVIRUS

Get INTEGO ANTIVIRUS for Windows to remove ransomware, Trojans, adware and other spyware and malware variants and protect your PC and network drives 24/7.. This VB100-certified security software uses state-of-art technology to provide protection against ransomware, Zero-Day attacks and advanced threats, Intego Web Shield blocks dangerous websites, phishing attacks, malicious downloads and installation of potentially unwanted programs.

Use INTEGO Antivirus to remove detected threats from your computer.

Read full review here.

STEP 2. REPAIR VIRUS DAMAGE TO YOUR COMPUTER

RESTORO provides a free scan that helps to identify hardware, security and stability issues and presents a comprehensive report which can help you to locate and fix detected issues manually. It is a great PC repair software to use after you remove malware with professional antivirus. The full version of software will fix detected issues and repair virus damage caused to your Windows OS files automatically.

RESTORO uses AVIRA scanning engine to detect existing spyware and malware. If any are found, the software will eliminate them.

Read full review here.

GeeksAdvice.com editors select recommended products based on their effectiveness. We may earn a commission from affiliate links, at no additional cost to you. Learn more.

BOOT ransomware Removal Guidelines

Method 1. Enter Safe Mode with Networking

Step 1. Start Windows in Safe Mode with Networking

Before you try to remove the virus, you must start your computer in Safe Mode with Networking. Below, we provide the easiest ways to boot PC in the said mode, but you can find additional ones in this in-depth tutorial on our website – How to Start Windows in Safe Mode. Also, see a video tutorial on how to do it:

Instructions for Windows XP/Vista/7 users

  1. First of all, turn off your PC. Then press the Power button to start it again and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. This launches the Advanced Boot Options menu.
  2. Use arrow keys on the keyboard to navigate down to Safe Mode with Networking option and press Enter.

Instructions for Windows 8/8.1/10 users

  1. Open Windows Start menu, then press down the Power button. On your keyboard, press down and hold the Shift key, and then select Restart option.
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Networking. In this case, it is the F5 key.
Step 2. Remove files associated with the virus

Now, you can search for and remove BOOT ransomware files. It is very hard to identify files and registry keys that belong to the ransomware virus, Besides, malware creators tend to rename and change them repeatedly. Therefore, the easiest way to uninstall such type of a computer virus is to use a reliable malware removal program. In addition, we suggest trying a combination of INTEGO antivirus (removes malware and protects your PC in real-time) and RESTORO (repairs virus damage to Windows OS files).

REMOVE MALWARE & REPAIR VIRUS DAMAGE

1 Step. Get robust antivirus to remove existing threats and enable real-time protection

INTEGO Antivirus for Windows provides robust real-time protection, Web Shield against phishing and deceptive websites, blocks malicious downloads and blocks Zero-Day threats. Use it to remove ransomware and other viruses from your computer professionally.

2 Step. Repair Virus Damage on Windows Operating System Files

Download RESTORO to scan your system for FREE and detect security, hardware and stability issues. You can use the scan results and try to remove threats manually, or you can choose to get the full version of software to fix detected issues and repair virus damage to Windows OS system files automatically.

Method 2. Use System Restore

In order to use System Restore, you must have a system restore point, created either manually or automatically.

Step 1. Boot Windows in Safe Mode with Command Prompt

Instructions for Windows XP/Vista/7 users

  1. Shut down your PC. Start it again by pressing the Power button and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. You will see Advanced Boot Options menu.
  2. Using arrow keys on the keyboard, navigate down to Safe Mode with Command Prompt option and press Enter.

Instructions for Windows 8/8.1/10 users

  1. Launch Windows Start menu, then click the Power button. On your keyboard, press down and hold the Shift key, and then choose Restart option with the mouse cursor.
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Command Prompt. In this case, press F6 key.
Step 2. Start System Restore process
  1. Wait until system loads and command prompt shows up.
  2. Type cd restore and press Enter, then type rstrui.exe and press Enter. Or you can just type %systemroot%system32restorerstrui.exe in command prompt and hit Enter.
  3. This launches System Restore window. Click Next and then choose a System Restore point created in the past. Choose one that was created before ransomware infection.
  4. Click Yes to begin the system restoration process.

After restoring the system, we recommend scanning the system with antivirus or anti-malware software. In most cases, there won't be any malware remains, but it never hurts to double-check. In addition, we highly recommend checking ransomware prevention guidelines provided by our experts in order to protect your PC against similar viruses in the future.

Alternative software recommendations

Malwarebytes Anti-Malware

Removing spyware and malware is one step towards cybersecurity. To protect yourself against ever-evolving threats, we strongly recommend purchasing a Premium version of Malwarebytes Anti-Malware, which provides security based on artificial intelligence and machine learning. Includes ransomware protection. See pricing options and protect yourself now.

System Mechanic Ultimate Defense

If you're looking for an all-in-one system maintenance suite that has 7 core components providing powerful real-time protection, on-demand malware removal, system optimization, data recovery, password manager, online privacy protection and secure driver wiping technology. Therefore, due to its wide-range of capabilities, System Mechanic Ultimate Defense deserves Geek's Advice approval. Get it now for 50% off. You may also be interested in its full review.

Disclaimer. This site includes affiliate links. We may earn a small commission by recommending certain products, at no additional cost for you. We only choose quality software and services to recommend.

This article was first published on September 29, 2019 and updated on October 3, 2019.

View Comments

  • Thank you for the education it is very helpful
    I was a victim of Ransomware as a result of installing software that turned out to be a virus.
    This one infected my PC and my network hard drive.
    This is the STOP DJVU Ransomware which appends the .RUGJ. extension to all files
    I tested Emsisoft Decryptor (for STOP DJVU, version 1.0.0.5)
    Here is the result :
    Error: No key for New Variant online ID:
    Notice: this ID appears to be an online ID, decryption is impossible
    I deleted _readme.txt from my computer, now I do not know who to contact. What is the solution to open the file, please cooperate
    Thanks very much.

  • Hello mr Webb. Thank you for your guidance.
    My system has been infected with Righ extension. Can you help me please?

    • I cannot help to extract it. Only cyber security professionals can and they are currently working on it.

  • Thank you for the education it is very helpful. But the solution didn't work for me. I sent one of the encrypted files to them and they decrypted it and sent it back to me. I don't have the money to pay the Ransome now .
    All my files type has changed to .boot . kindly let me know when there is a solution. Thank you ..

    • Dear Hamid,
      Please check your personal ID. If it ends with t1, you might have a chance to recover some files as soon as the OFFLINE key will be extracted. Otherwise, chances are way lower...

  • muito obrigado pelas informações, esses otarios merecem apanhar, mas obrigado novamente

Recent Posts

Remove VLFF Ransomware Virus (DECRYPT .vlff FILES)

VLFF ransomware is a virtual menace to your computer files VLFF ransomware is a newly…

1 day ago

Remove UIGD Ransomware Virus (DECRYPT .uigd FILES)

UIGD ransomware encrypts all files on a computer, asks for a ransom UIGD ransomware is…

2 days ago

Remove EYRV Ransomware Virus (DECRYPT .eyrv FILES)

EYRV ransomware takes your computer files hostage, demands a ransom EYRV ransomware is a destructive…

2 days ago

Private Internet Access Review 2022: Fast, Secure & Cheap VPN

Private Internet Access (PIA) VPN maintains its long-term role as a leader Private Internet Access…

5 days ago

Remove XCBG Ransomware Virus (DECRYPT .xcbg FILES)

XCBG ransomware aims to lock your files and demand a ransom XCBG ransomware is a…

6 days ago

Remove BPQD Ransomware Virus (DECRYPT .bpqd FILES)

BPQD ransomware encrypts all computer files, demands a ransom from the user BPQD ransomware is…

6 days ago