How to remove PAHD ransomware (Ext: .PAHD Files)

PAHD Ransomware

The DJVU/STOP virus family that one of the most popular ransomware types in recent years. Among the newest spotted threats of this class is the PAHD ransomware. When researchers uncovered and dissected this threat, they found a variant of the infamous ransomware family. Without a doubt, the STOP Ransomware family has been the most active ransomware family throughout 2019, claiming numerous victims.

Infection and Encryption

The authors of the PAHD ransomware are likely using different methods for distribution:

  • hidden installation along with other apps, especially the utilities that work as freeware or shareware;
  • dubious link in spam emails leading to the virus installer
    online free hosting resources;
  • using illegal peer-to-peer (P2P) resources for downloading pirated software.

The PAHD Ransomware will scan the data on the user’s system to locate the files targeted for encryption. Then, the PAHD Ransomware will trigger its encryption process and lock all the targeted data. When the PAHD Ransomware locks a file, it also alters its name by appending an additional extension – ‘.PAHD.’ For example, a file that was called ‘1.jpg’ previous to the attack will be renamed to ‘1.jpg.pahd’ after the encryption process is through.

pahd ransomware

PAHD Ransomware Files

The Ransom Note _readme.txt

Then, the PAHD Ransomware will drop a ransom note called ‘_readme.txt.’ In the note, the attackers state that the ransom fee is $980, but all victims who contact them within 72 hours will obtain a 50% discount and will have to pay $490 instead of the full fee. The creators of the PAHD Ransomware offer to unlock one file for free so that the users are convinced that they have a working decryption key. There are two email addresses that the attackers provide –helpteam@mail.ch and helpmanager@airmail.cc.

ATTENTION!

Don't worry. You can return all your files!

All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.

What guarantees you have?

You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.

You can get and look video overview decrypt tool:

https://we.tl/t-WJa63R98Ku

Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.

Please note that you'll never restore your data without payment.

Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

helpteam@mail.ch

Reserve e-mail address to contact us:

helpmanager@airmail.cc

Your personal ID:
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX 


PAHD Virus Detection

PAHD Virus Detection

Stay away from the creators of the PAHD Ransomware. Nothing good comes out of cooperating with cybercriminals. Even if they have promised to provide you with the decryption key you need, likely, they will not bother as soon as they get their hands on your cash. This is why you should look into downloading and installing a reputable anti-malware tool instead. Not only will the security tool keep your computer safe in the future, but you also can use it to remove the PAHD virus from your system safely.

Gridinsoft Anti-Malware v.4.1.95
Report file date: 6/3/2021 10:39:19 PM
Last update:      6/3/2021 10:39:19 PM

Scanning for 30084760 virus strains and unwanted programs.

Standard Scan started
Scanning process...
----- %LocalAppData%\211a17d5-4cad-4c26-9b62-da7842af0df9\9505A819565A3DC6144E4F646477AC92.exe ---- Startup Threat
	Startup: Trojan.RPL.Agent.sd
	RegPath: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|syshelper
	Signature verification: False
	MD5: 9505A819565A3DC6144E4F646477AC92:839168
	RIC: ADB46609A2383664CEF4C06B9146A764:9640
	RFH: 192:5LwJTmAODYmqOnyZDKK8a826L71ZeV4i3A:5LwstqOyZkatGyP3A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE876BB0000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE6840B34B00686064400064A1000000005083C498535657A110D9
	EPSEC: 0
	EPRVA: 00001FF0
	IBASE: 00400000
	SEC:
		.text:60000020:C9C396C4F7FEC0ADC07ED4934A070A5A:728576
		.rdata:40000040:A0CC1D13F89E692AF9C8B0F61E854A3D:38400
		.data:C0000040:3A65029C775817683DFA598B1067F3E6:21504
		.rsrc:40000040:7DE2AF274C9F50079366EE0FEBCD6CD6:49664


----- HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Time Trigger Task ---- Registry Threat
	Trojan.RPL.Agent.dd


----- %Desktop%\05.exe ---- General Threat
	Trojan.Win32.Packed.vb
	Signature verification: False
	MD5: 9505A819565A3DC6144E4F646477AC92:839168
	RIC: ADB46609A2383664CEF4C06B9146A764:9640
	RFH: 192:5LwJTmAODYmqOnyZDKK8a826L71ZeV4i3A:5LwstqOyZkatGyP3A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE876BB0000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE6840B34B00686064400064A1000000005083C498535657A110D9
	EPSEC: 0
	EPRVA: 00001FF0
	IBASE: 00400000
	SEC:
		.text:60000020:C9C396C4F7FEC0ADC07ED4934A070A5A:728576
		.rdata:40000040:A0CC1D13F89E692AF9C8B0F61E854A3D:38400
		.data:C0000040:3A65029C775817683DFA598B1067F3E6:21504
		.rsrc:40000040:7DE2AF274C9F50079366EE0FEBCD6CD6:49664


----- %LocalAppData%\211a17d5-4cad-4c26-9b62-da7842af0df9\9505A819565A3DC6144E4F646477AC92.exe ---- General Threat
	Trojan.Win32.Packed.vb
	Signature verification: False
	MD5: 9505A819565A3DC6144E4F646477AC92:839168
	RIC: ADB46609A2383664CEF4C06B9146A764:9640
	RFH: 192:5LwJTmAODYmqOnyZDKK8a826L71ZeV4i3A:5LwstqOyZkatGyP3A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE876BB0000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE6840B34B00686064400064A1000000005083C498535657A110D9
	EPSEC: 0
	EPRVA: 00001FF0
	IBASE: 00400000
	SEC:
		.text:60000020:C9C396C4F7FEC0ADC07ED4934A070A5A:728576
		.rdata:40000040:A0CC1D13F89E692AF9C8B0F61E854A3D:38400
		.data:C0000040:3A65029C775817683DFA598B1067F3E6:21504
		.rsrc:40000040:7DE2AF274C9F50079366EE0FEBCD6CD6:49664


----- %LocalAppData%\211a17d5-4cad-4c26-9b62-da7842af0df9\ ---- General Threat
	Trojan.FMPL.Downloader.vl


----- %LocalAppData%\97010854-8688-4cff-b3fb-4839d36cc003\ ---- General PartOfThreat
	Trojan.FMPL.Downloader.vl


----- %LocalAppData%\211a17d5-4cad-4c26-9b62-da7842af0df9\9505A819565A3DC6144E4F646477AC92.exe ---- Task Threat
	Task: [time trigger task] Trojan.PL.Gen.dd
	Arguments: --Task
	Signature verification: False
	MD5: 9505A819565A3DC6144E4F646477AC92:839168
	RIC: ADB46609A2383664CEF4C06B9146A764:9640
	RFH: 192:5LwJTmAODYmqOnyZDKK8a826L71ZeV4i3A:5LwstqOyZkatGyP3A
	SUBS: Win32 GUI
	PE: x86
	EP: 8BFF558BECE876BB0000E8110000005DC3CCCCCCCCCCCCCCCCCCCCCCCCCCCCCC8BFF558BEC6AFE6840B34B00686064400064A1000000005083C498535657A110D9
	EPSEC: 0
	EPRVA: 00001FF0
	IBASE: 00400000
	SEC:
		.text:60000020:C9C396C4F7FEC0ADC07ED4934A070A5A:728576
		.rdata:40000040:A0CC1D13F89E692AF9C8B0F61E854A3D:38400
		.data:C0000040:3A65029C775817683DFA598B1067F3E6:21504
		.rsrc:40000040:7DE2AF274C9F50079366EE0FEBCD6CD6:49664



Memory Process: PID:384 9505A819565A3DC6144E4F646477AC92.exe (Trojan.Win32.Packed.vb)
Memory Process: 9505A819565A3DC6144E4F646477AC92.exe (Trojan.Win32.Packed.vb) - terminated
----- "%LocalAppData%\211a17d5-4cad-4c26-9b62-da7842af0df9\9505a819565a3dc6144e4f646477ac92.exe" --autostart ---- Startup Threat
	Startup: Trojan.RPL.Agent.sd
	RegPath: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|SysHelper


Scan completed

Scan result:         8 detected items
Scan completed in:   Scan completed in 12 minute(s) 8 sec.
Files were scanned:  11385

READ  MPPQ Virus (.MPPQ File) Ransomware

Leave a Reply

Your email address will not be published. Required fields are marked *