Adame Ransomware Removal Guide

Do you know what Adame Ransomware is?

Adame Ransomware is not an infection that you can recognize right away. It is not meant to be noticeable and distinguishable because if victims detect and delete it immediately, it cannot be used to make money. Needless to say, the attackers behind this threat are using illicit methods, scare tactics, and terror to get it. It is easy for us to say that you must not give in, but you have to make decisions for yourself, and we are sure that you will be able to make them more confidently once you are done reading this report. Besides learning more about the infection, you will also learn how to get rid of it. Note that a manual Adame Ransomware removal guide below is already available, but that is not the only option you should consider.

Are you familiar with PHOBOS Ransomware? Most likely, you are not, but Adame Ransomware appears to be a modified version of this threat. It is also reported that it is a copycat of a Dharma infection known as Kiratos Ransomware. That being said, this new infection is written in a different .NET language, and the code itself is obfuscated this time. The distribution of this malware is clandestine, and it is likely that the .exe file responsible for executing Adame Ransomware could be introduced to you as a harmless spam email attachment or freeware carried by a malicious downloader. If the infection slithers in successfully, all files (except for .com files) in %APPDATA%, %HOMEDRIVE%, %PROGRAMFILES%, and %USERPROFILE% directories are encrypted. Once it’s done, you should find the “.id[code].[supportcrypt2019@cock.li].Adame” extension appended to all original names. Unfortunately, the files cannot be restored by removing this extension.

After encryption, Adame Ransomware immediately drops a file named “info.txt” onto the Desktop. As the name suggests, this file is meant to provide you with more information, and while you do not need to delete it as a malicious component, it certainly is important to take the provided information carefully. The message suggests that files can be detected if the victim emails supportcrypt2019@cock.li or – if no response is received in 24 hours – supportcrypt2019@protonmail.com. If you send a message, the attackers behind Adame Ransomware should ask you to pay a ransom, and, of course, we do not recommend doing that. The attackers cannot be trusted, all they want is your money, and no one can force them to decrypt your files. In fact, we do not recommend sending the message in the first place, unless you want to face the risk of having your email inbox flooded with misleading messages or general spam.

The launcher of Adame Ransomware could be dropped anywhere, which is why it is difficult to say where this file could be located. The manual removal guide below lists a few possible locations, but the file could exist someplace else entirely. If you are not able to find this file yourself, do not panic. A reliable anti-malware program will be able to locate and delete this file automatically. Besides offering removal services, the program will also safeguard your entire operating system, and that will make it much harder for new infections to invade it. So, how will you remove Adame Ransomware? Hopefully, you can succeed regardless of the path you choose, but if you encounter obstacles, remember that you can always contact us.

Remove Adame Ransomware

  1. Delete recently downloaded files. You can check these locations first:
    • %USERPROFILE%\Desktop
    • %USERPROFILE%\Downloads
    • %TEMP%
  2. Move to the Desktop and then Delete the file named info.txt.
  3. Empty Recycle Bin and then install a reliable malware scanner.
  4. Perform a full system scan to see if there are threats that require removal.

In non-techie terms:

Adame Ransomware can slither into your operating system if you are not careful and do not secure your operating system. Once in, it encrypts files and demands a ransom in return for decryption. A free decryptor did not exist at the time of research, and it is unlikely that the attackers would lift a finger to aid victims. That, unfortunately, means that once files are encrypted, they are most likely to be unrecoverable. Do you have backups stored outside the computer? If you do, you can quickly replace the infected files, but do so only after you delete Adame Ransomware. If you are not able to do so manually, employ a legitimate anti-malware program that will not only eliminate active infections but will also secure your operating system.

  • MU

    Or you can just format your HDD (windows) and leave your other drive (for example D), as it is, and wait for the future decryptor in few years lol