How to remove Ykcol ransomware and decrypt .ykcol files

Standard

What is Ykcol Ransomware

Ykcol Ransomware is newest version of previously described Locky ransomware. New variant uses RSA-2048 and AES-128 cryptographic algorithms and appends .ykcol to the end of all encrypted files. Virus also modifies filenames using the following template: [8_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[4_random_hexadecimal_characters]-[12_random_hexadecimal_characters].ykcol. In order to decrypt your files malware demands 0.25 BTC, which is on the date of writing this article is equivalent to $950. Ykcol Ransomware creates two files named ykcol.htm and ykcol.bmp, both contain instructions to pay the ransom and ID. Users can only make payment to anonymous Bitcoin wallets, that is why it is nearly impossible to catch malefactors. We will constantly update this article, but to the date there are no decryptors released to restore encrypted files. Still you can try manual methods and restoring from backup. Complete this guide to remove Ykcol ransomware and decrypt .ykcol files in Windows 10, 8, 7, XP.

ykcol ransom note

Note: Hackers usually do not send any decryptors or decryption keys even if you pay them. Wait until working decryptor appears or try to restore .ykcol files manually from backup or using instructions below.

How Ykcol Ransomware infected your PC

ykcol spam e-mail

Ykcol spreads via e-mails with malicious attachments with 7z extensions. Those e-mails usually have Status of invoice in subject line. Infection is realized via VBS file, that will then download main executable of Ykcol Ransomware. Virus assigns certain ID with the victims, that is used to name those files and supposedly to send decryption key. In order to prevent infection with this type of threats in future we recommend you to use SpyHunter and HitmanPro with Cryptoguard.

Download Ykcol Ransomware Removal Tool

Download Removal Tool

To remove Ykcol Ransomware completely we recommend you to use SpyHunter from EnigmaSoftware Group LLC. It detects and removes all files, folders and registry keys of Ykcol Ransomware.

Alternative remover

Download Malwarebytes Anti-Malware

As a good free alternative to remove Ykcol Ransomware use Malwarebytes Anti-Malware. It will detect core files and processes of Ykcol ransomware and eliminate them to allow you start decryption of your files.

How to remove Ykcol Ransomware manually

It is not recommended to remove Ykcol Ransomware manually, for safer solution use Removal Tools instead.

Ykcol Ransomware files:


Ykcol.bmp
Ykcol.html
Ykcol_[4_digit_number].html

Ykcol Ransomware registry keys:


no information

How to decrypt and restore .ykcol files

Use automated decryptors

kaspersky rannoh decryptor

Ykcol Ransomware allows user to decrypt 1 file for free. This can be used to attempt and decrypt all files by determining encryption key using this decrypted file and comparing it with encrypted one using special tools. Ransomware decryptor from Kaspersky may be useful in this case. It is free and easy to use. Download Kaspersky Ransomware Decryptor here:

Download Kaspersky Ransomware Decryptor

There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.

If you are infected with Ykcol ransomware and removed it from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:

Using Windows Previous Versions option:

  1. Right-click on infected file and choose Properties.
  2. Select Previous Versions tab.
  3. Choose particular version of the file and click Copy.
  4. To restore the selected file and replace the existing one, click on the Restore button.
  5. In case there is no items in the list choose alternative method.

Using Shadow Explorer:

  1. Download Shadow Explorer program.
  2. Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
  3. Select the drive and date that you want to restore from.
  4. Right-click on a folder name and select Export.
  5. In case there is other dates in the list choose alternative method.

If you are using Dropbox:

  1. Login to the DropBox website and go to the folder that contains encrypted files.
  2. Right-click on the encrypted file and select Previous Versions.
  3. Select the version of the file you wish to restore and click on the Restore button.

How to protect computer from viruses like Ykcol Ransomware in future

Use Malwarebytes Anti-Ransomware Beta

Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.

Download Malwarebytes Anti-Ransomware Beta

Use HitmanPro.Alert with CryptoGuard

Dutch vendor of legendary cloud-based scanner HitmanPro – SurfRight released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.

Download HitmanPro.Alert with CryptoGuard
  • Vinay Raj

    sir pls help me , hamri .Ms word file ykcol files hogyi

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close