Ransomware

Remove LLEE Ransomware Virus (DECRYPT .llee FILES)

LLEE ransomware was created with intention to extort computer users

LLEE ransomware is recognized as a computer virus that encrypts all files contained in the compromised host. It is a newly discovered variant of STOP/DJVU ransomware strain, a menace that’s been threatening users of unprotected computers since 2018. The way this malware variant works is it encrypts all data stored on a computer using complex cryptography algorithms, then appends .llee file extensions to original filenames and finally drops _readme.txt note in the containing folder. This note suggests that the only way to restore files is to purchase LLEE file decryption tool from those behind the cyberattack.

To understand how encrypted files are renamed, see these examples: a file originally named 1.jpg becomes 1.jpg.llee, 2.txt gets renamed to 2.txt.llee and so on.

This ransomware is a typical example of a computer malware that attempts to extort the computer user after locking one’s files, or, in other words, taking them hostage. The cybercriminals store keys needed for data decryption in their servers and threaten to leave victim with one’s data locked forever if their demands are not met. Speaking of those demands, they are explained in detail in the _readme.txt note.

Ransom note explains the cybercriminals’ intentions

After finding out that all of personal files are no longer accessible due to high-security encryption used, the computer user will soon find out that attempts to restore files or reverse damage inflicted by the malware are hopeless. Therefore, the cybercriminals present a solution in the _readme.txt file. The note suggests that the ransomware has encrypted all important files including documents, photos, videos, databases and archives; in order to restore them to an original condition, the computer user has to purchase a special decryption tool along with a decryption key that specifically works for the victim’s data only.

In other words, decryption key that is used to unlock other victim’s files won’t work on other computers – unless an offline encryption type was used. For most victims, online encryption type is used, which is known by its ability to produce unique encryption/decryption key pairs per infected computer.

The _readme.txt note then introduces the price of these decryption tools: according to the attackers, the victim can purchase these for $490 as long as attempts to contact the criminals are initiated within 72 hours starting from the computer infection timestamp. If delayed any longer, the criminals won’t provide any discounts and will only provide these tools for $980. The only way to contact the attackers is via emails that are provided in the ransom note – support@bestyourmail.ch and supportsys@airmail.cc.

After contacting the criminals via email, the victim discovers that the attackers do not accept regular bank transfers and choose to rely on cryptography-based transactions only. Therefore, the crooks may instruct the victim to visit online cryptocurrency exchange platforms and purchase Bitcoin equal to the same money amount in US dollars. They will also provide a virtual wallet address so that the victim could initiate a money transfer.

For those wondering if transferring the money is a good idea, we can assure you that it is not. Even if the ransom note suggests that the criminals promise to decrypt one sample file for free, this cannot be viewed as an absolute guarantee that paying the ransom will result in a successful data decryption.

There are several reasons to back up this argument – first of all, cybercriminals are very helpful when it comes to convincing victims to make transactions to them, but their enthusiasm might diminish after receiving the money. Second, sending money to virtual criminals only helps them to fund their operations and employ more people for malware development or distribution. Next, cybercriminals often target people who have previously paid the ransom. Finally, paying the ransom might be considered an illegal activity in your country.

Remember that cybersecurity experts as well as law enforcement institutions such as FBI advise against ransom payments. Instead, it is better idea to invest in data storage drives that can be used for data backups and professional antivirus software that could prevent similar malware from damaging your computer.

Additional privacy risks associated with this ransomware attack

Getting infected with ransomware like LLEE virus is extremely dangerous not only because it leaves all of computer-stored data encrypted, but also because it spreads along information-stealing Trojans like VIDAR or AZORULT.

After sneaking into the target system, these threats are able to extract sensitive details including victim’s passwords, cookies, browsing history, cryptocurrency wallets and other valuable information. On top of that, these threats can also collect data such as computer’s name, user’s name, hardware info, installed software list and active processes.

Cybercriminals can make use of such details when planning other attacks against the victim. They might use it to blackmail the computer user and demand more money. For this reason, our team strongly advises victims of STOP/DJVU ransomware variants to get rid of the malware and change all of the passwords used on the compromised device immediately to avoid loss of private online accounts.

To remove LLEE virus, we advise booting your computer in Safe Mode with Networking and running an up-to-date antivirus from there. Make sure you use a genuine antivirus copy only. On top of that, you may want to download to repair virus damage on Windows OS files.

Ransomware Summary

NameLLEE Ransomware Virus
TypeRansomware; Crypto-malware; Virtual Extortion Virus
FamilySTOP/DJVU
Encryption typeRSA 2048 + Salsa20
Previous versionsHKGT, EFVC, EIJY, LLOO, LLTT, LLEE (find full list here)
Version506th
Extension.lltt
Cybercriminal emailssupport@bestyourmail.ch and supportsys@airmail.cc
Additional malware droppedAzorult or Vidar Trojan
DamageThe ransomware uses encryption to maliciously modify all files on the PC and marks their original names with .llee extension. Ransom notes called as _readme.txt will be dropped in every computer folder. This piece of malware usually drags VIDAR Stealer alongside it and also eliminates VSS from the system. On top of that, it tends to modify Windows HOSTS file to restrict computer user’s access to cybersecurity-related websites online.
Ransom note_readme.txt
Ransom demand$490-$980 in Bitcoin
DistributionVictims often download this ransomware along illegal torrent downloads, cracked software, activators, key generators or tools like KMSPico.
Known software cracks to contain this malwareCorel Draw, Tenorshare 4ukey, Adobe Photoshop, Cubase, Adobe Illustrator, Internet Download Manager, Tally, League of Legends.
Detection namesRansom:Win32/StopCrypt.PAL!MTB (Microsoft), Trojan.Crypt (A) (Emsisoft), HEUR:Trojan-Ransom.Win32.Stop.gen (Kaspersky), Trojan.GenericKD.47850419 (BitDefender), Trojan.MalPack.GS (Malwarebytes), ML.Attribute.HighConfidence (Symantec) see all detection name variations on VirusTotal
RemovalRemove ransomware and related malware from your PC using trustworthy software. To repair virus damage on Windows OS files, consider scanning with RESTORO (secure download link).

REPAIR VIRUS DAMAGE

Scan your system for FREE to detect security, hardware and stability issues. You can use the scan results and try to remove threats manually, or you can choose to get the full version of software to fix detected issues and repair virus damage to Windows OS system files automatically. Includes Avira spyware/malware detection & removal engine.

See the screenshot provided below to understand how files encrypted by this ransomware appear in computer folders.

How to avoid ransomware attacks

Ransomware-type computer threats are distributed via malicious email attachments, illegal online downloads (mostly pirated software versions or other copyright-protected content in a form of torrents or password-protected archives), fake software update tools, malicious ads and other methods.

When it comes to STOP/DJVU variants such as LLEE virus, cybersecurity experts have noticed that it almost solely relies on illegal downloads when it comes to its distribution. The cybercriminals seem to control a set of rogue websites offering “cracked” versions of various popular computer software such as Adobe Photoshop, AutoCAD, Virtual DJ Pro and others. These sites suggest that they provide downloads that would allow computer users to install and activate full versions of these programs for free. If the users fall for this scam, they end up downloading the malware either via torrent file or they get redirected to a site that “generates” a download URL of a password-protected archive with malware inside of it.

We encourage computer users to support legitimate software developers by purchasing legitimate software activation keys rather than relying on anonymous people claiming the download is “100% secure and free.” This can lead to severe damages caused to your computer.

Another popular malware distribution technique relies on malicious email attachments. Cybercriminals tend to use techniques to craft documents containing malicious scripts that are used to download the ransomware from an external source and run it on victim’s computer. If the victim opens such file without having an active antivirus protection on, the system shortly gets compromised by a file-encrypting virus.

Some of the key recommendations to avoid such malicious emails we would like to provide are:

  • Avoid suspicious-looking emails that you didn’t await for.
  • Check for generic greeting lines, such as “dear customer,” “Valued client” and so on. Remember that legitimate companies have your name associated with your email address and use your full name when greeting you.
  • Check for grammar, spelling or typo mistakes in the email message. Legitimate companies do not leave such errors in the emails composed for their customers.
  • If you can feel a sense of urgency or a threat in the email, stay away from its attachments or included links. Typical catching lines may look somewhat similar to these: “check the attached document and reply as soon as possible” or “your ___ account will be closed in 24 hours” and so on.

On top of that, computer users should avoid installing alleged software update tools from aggressive online ads that may appear on your screen during web browsing sessions. Sometimes, these ads appear when the user browses rogue websites that use less-than-reputable ad networks to generate revenue from. Downloading fake software updates can compromise the computer since they are often filled with potentially dangerous executables.

Finally, we’d like to recommend ransomware victims to rely on trustworthy online cybersecurity blogs when searching for data decryption or recovery tools. There were cases when cybercriminals related to other ransomware strains used fake STOP/DJVU decryption tools as a bait to trick people into downloading more malware on their computers. That being said, we’d like to remind you that the only confirmed and trustworthy tools capable of repairing some of STOP/DJVU encrypted files were created by Emsisoft and DiskTuna.

Remove LLEE Ransomware Virus and Repair or Decrypt .llee Files

Please follow the tutorial provided below to understand how to remove LLEE ransomware virus from your computer safely. Do not forget to use a genuine antivirus software for this task, and make sure you install required updates it to ensure that all of the newest virus’ definitions are added to its database. Afterward, consider downloading RESTORO to repair some of virus-affected Windows OS files.

Once the LLEE virus removal is finalised, do not forget to change all of your passwords (saved in web browsers or used in apps or installed programs). Afterward, you can use data backups to restore your files or try the methods explained in this guide for STOP/DJVU victims.

OUR GEEKS RECOMMEND

Our team recommends removing malware using a professional antivirus software and then using the following tool to repair virus damage to Windows system files:

REPAIR VIRUS DAMAGE TO YOUR COMPUTER

DOWNLOAD RESTORO

RESTORO provides a free scan that helps to identify hardware, security and stability issues and presents a comprehensive report which can help you to locate and fix detected issues manually. It is a great PC repair software to use after you remove malware with professional antivirus. The full version of software will fix detected issues and repair virus damage caused to your Windows OS files automatically.

RESTORO uses AVIRA scanning engine to detect existing spyware and malware. If any are found, the software will eliminate them.

Read full review here.

GeeksAdvice.com editors select recommended products based on their effectiveness. We may earn a commission from affiliate links, at no additional cost to you. Learn more.

LLEE Ransomware Virus Removal Guidelines

Method 1. Enter Safe Mode with Networking

Step 1. Start Windows in Safe Mode with Networking

Before you try to remove LLEE Ransomware Virus virus, you must start your computer in Safe Mode with Networking. Below, we provide the easiest ways to boot PC in the said mode, but you can find additional ones in this in-depth tutorial on our website – How to Start Windows in Safe Mode. Also, if you prefer a video version of the tutorial, check our guide How to Start Windows in Safe Mode on Youtube.

Instructions for Windows XP/Vista/7 users

  1. First of all, turn off your PC. Then press the Power button to start it again and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. This launches the Advanced Boot Options menu.
  2. Use arrow keys on the keyboard to navigate down to Safe Mode with Networking option and press Enter.

Instructions for Windows 8/8.1/10/11 users

  1. Open Windows Start menu, then press down the Power button. On your keyboard, press down and hold the Shift key, and then select Restart option.
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Networking. In this case, it is the F5 key.
Step 2. Remove files associated with the virus

Now, you can search for and remove LLEE Ransomware Virus files. It is very hard to identify files and registry keys that belong to the ransomware virus, Besides, malware creators tend to rename and change them repeatedly. Therefore, the easiest way to uninstall such type of a computer virus is to use a reliable security program such as INTEGO Antivirus, which also includes data recovery software. For virus damage repair, consider using RESTORO.

Special Offer

Compatibility: Microsoft Windows
See Full Review

RESTORO is a unique PC Repair Tool which comes with an in-built Avira scan engine to detect and remove spyware/malware threats and uses a patented technology to repair virus damage. The software can repair damaged, missing or malfunctioning Windows OS files, corrupted DLLs, and more. The free version offers a scan that detects issues. To fix them, license key for the full software version must be purchased.

Method 2. Use System Restore

In order to use System Restore, you must have a system restore point, created either manually or automatically.

Step 1. Boot Windows in Safe Mode with Command Prompt

Instructions for Windows XP/Vista/7 users

  1. Shut down your PC. Start it again by pressing the Power button and instantly start pressing F8 button on your keyboard repeatedly in 1-second intervals. You will see Advanced Boot Options menu.
  2. Using arrow keys on the keyboard, navigate down to Safe Mode with Command Prompt option and press Enter.

Instructions for Windows 8/8.1/10/11 users

  1. Launch Windows Start menu, then click the Power button. On your keyboard, press down and hold the Shift key, and then choose Restart option with the mouse cursor.
  2. This will take you to Windows Troubleshoot screen. Choose Troubleshoot > Advanced Options > Startup Settings > Restart. Tip: If you can't find Startup Settings, click See more recovery options.
  3. In Startup Settings, press the right key between F1-F9 to enter Safe Mode with Command Prompt. In this case, press F6 key.
Step 2. Start System Restore process
  1. Wait until system loads and command prompt shows up.
  2. Type cd restore and press Enter, then type rstrui.exe and press Enter. Or you can just type %systemroot%system32restorerstrui.exe in command prompt and hit Enter.
  3. This launches System Restore window. Click Next and then choose a System Restore point created in the past. Choose one that was created before ransomware infection.
  4. Click Yes to begin the system restoration process.

After restoring the system, we recommend scanning the system with antivirus or anti-malware software. In most cases, there won't be any malware remains, but it never hurts to double-check. In addition, we highly recommend checking ransomware prevention guidelines provided by our experts in order to protect your PC against similar viruses in the future.

Alternative software recommendations

Malwarebytes Anti-Malware

Removing spyware and malware is one step towards cybersecurity. To protect yourself against ever-evolving threats, we strongly recommend purchasing a Premium version of Malwarebytes Anti-Malware, which provides security based on artificial intelligence and machine learning. Includes ransomware protection. See pricing options and protect yourself now.

System Mechanic Ultimate Defense

If you're looking for an all-in-one system maintenance suite that has 7 core components providing powerful real-time protection, on-demand malware removal, system optimization, data recovery, password manager, online privacy protection and secure driver wiping technology. Therefore, due to its wide-range of capabilities, System Mechanic Ultimate Defense deserves Geek's Advice approval. Get it now for 50% off. You may also be interested in its full review.

Disclaimer. This site includes affiliate links. We may earn a small commission by recommending certain products, at no additional cost for you. We only choose quality software and services to recommend.

Decrypt LLEE files

Fix and open large LLEE files easily:

It is reported that STOP/DJVU ransomware versions encrypt only the beginning 150 KB of each file to ensure that the virus manages to affect all files on the system. In some cases, the malicious program might skip some files at all. That said, we recommend testing this method on several big (>1GB) files first.

  1. Create a copy of encrypted file to a separate folder using Copy > Paste commands.
  2. Now, right-click the created copy and choose Rename. Select the LLEE extension and delete it. Press Enter to save changes.
  3. In the prompt asking whether you want to make the changes as file might become unusable, click OK.
  4. Try opening the file.

STOP/DJVU decryption tool usage guide

STOP/DJVU ransomware versions are grouped into old and new variants. LLEE Ransomware Virus is considered the new STOP/DJVU variant, just like HKGT, EFVC, EIJY, LLOO, LLTT, LLEE (find full list here). This means full data decryption is now possible only if you have been affected by offline encryption key. To decrypt your files, you will have to download Emsisoft Decryptor for STOP DJVU, a tool created and maintained by a genius security researcher Michael Gillespie.

Note! Please do not spam the security researcher with questions whether he can recover your files encrypted with online key - it is not possible.

In order to test the tool and see if it can decrypt LLEE files, follow the given tutorial.

  1. Download the decryption tool from Emsisoft.
  2. Click the little arrow next to your download and choose Show in Folder.
  3. Now, right-click the file and choose Run as Administrator. If asked, enter administrator's password.
  4. In UAC window, click Yes.
  5. Click Yes to agree to software terms in both windows.
  6. The tool will automatically include C:// disk as a location to decrypt. The file recovery tool will prepopulate the locations to scan, including connected data storage drives or network drives. Click Add folder if you wish to add additional locations.
    In Options tab, you can choose to keep encrypted file copies. We recommend leaving this option selected, especially if you do not know if the decryption tool will work.
  7. Click Decrypt to start restoring LLEE files. You will see the progress in the Results tab. Here, you can see messages from the tool, such as whether the decryption procedure is successful, or you need to wait for an update.
    You might also be informed that online key was used to encrypt your files. In such case, the decryption tool won't work for you, and the only way to recover your files is to use a data backup.

Meanings of decryptor's messages

The LLEE decryption tool might display several different messages after failed attempt to restore your files. You might receive one of the following messages:

Error: Unable to decrypt file with ID: [example ID]

This message typically means that there is no corresponding decryption key in the decryptor's database.

No key for New Variant online ID: [example ID]
Notice: this ID appears to be an online ID, decryption is impossible

This message informs that your files were encrypted with online key, meaning no one else has the same encryption/decryption key pair, therefore data recovery without paying the criminals is impossible.

Result: No key for new variant offline ID: [example ID]
This ID appears to be an offline ID. Decryption may be possible in the future.

If you were informed that an offline key was used, but files could not be restored, it means that the offline decryption key isn't available yet. However, receiving this message is extremely good news, meaning that it might be possible to restore your LLEE extension files in the future. It can take a few months until the decryption key gets found and uploaded to the decryptor. We recommend you to follow updates regarding the decryptable DJVU versions here. We strongly recommend backing up your encrypted data and waiting.

Report Internet crime to legal departments

Victims of LLEE Ransomware Virus should report the Internet crime incident to the official government fraud and scam website according to their country:

If you can't find an authority corresponding to your location on this list, we recommend using any search engine to look up "[your country name] report cyber crime". This should lead you to the right authority website. We also recommend staying away from third-party crime report services that are often paid. It costs nothing to report Internet crime to official authorities.

Another recommendation is to contact your country's or region’s federal police or communications authority.

Frequently Asked Questions

✓ How can I open .LLEE files?

You can only open LLEE files if you have the decryption key, or if you were affected by offline encryption type.

✓ How do I know if my files were encrypted with offline or online encryption?

To figure out whether you were affected by offline encryption, please go to C:/SystemID/PersonalID.txt and see if the string inside of it ends in t1. You can also try using Emsisoft Decryptor for STOP/DJVU.

✓ My files contain very important information (family memories). Every tool I used says it is impossible to decrypt. What should I do?

Please follow the guidances provided by the official LLEE decryption tools and believe what they say. If they say it is impossible to decrypt, it really is so. There is no magic tool or human capable of decrypting your files hiding somewhere. Encryption is a technique created to be nearly impossible to decrypt without a special private key (held by the criminals).

✓ I am afraid virus is still in my computer system. What should I do?

We advise scanning with anti-virus, anti-malware, malware removal tools or software like RESTORO to eliminate virus damage on the system. If you do not trust using a single tool, try running one after another. However, we do not recommend keeping several security programs on a computer at once as they can interfere with each other's work.

✓ I saw several Youtube videos suggesting secret decryption tools. Can I trust them?

Beware of fake LLEE decryption tools circulating around the web. Cyber criminals are uploading them to various shady websites, also might be promoting them via suspicious Youtube videos. These programs can infect your computer even more heavily (Trojans, miners, etc.). We suggest being extremely cautious around the web. If there will be an official STOP/DJVU decryption tool available, it will be widely discussed in public media.

Recent Posts

Remove LLTT Ransomware Virus (DECRYPT .lltt FILES)

LLTT ransomware is being spread by cybercriminals to attack victims LLTT ransomware is a computer…

1 day ago

Remove LLOO Ransomware Virus (DECRYPT .lloo FILES)

LLOO Ransomware Virus Is A Threat To All Computers LLOO ransomware is a file-encrypting virus…

2 days ago

Remove EIJY Ransomware Virus (DECRYPT .eijy FILES)

EIJY ransomware is distributed via rogue websites to encrypt files on computers EIJY ransomware is…

1 week ago

Remove EFVC Ransomware Virus (DECRYPT .efvc FILES)

EFVC Ransomware Virus Is A New Threat To All Computer Users EFVC is a newly…

1 week ago

Remove HKGT Ransomware Virus (DECRYPT .hkgt FILES)

HKGT Ransomware Is Being Used By Cybercriminals To Encrypt Files HKGT is a new ransomware-type…

1 week ago

Geek Squad Email Scam Explained

Geek Squad Scam claims your subscription will be renewed Geek Squad Email Scam is a…

1 week ago