How to remove MOLE66 Ransomware and decrypt .MOLE66 files

What is MOLE66 ransomware

MOLE66 – is a virus, that is called ransomware, because it will encrypt all the files on victim’s computer and demand to pay ransom. Encryption is making all the files on your computer unacceptable and unreadable. This kind of infection is very dangerous for any system, that’s why it is important to have a proper anti-virus on the computer. If your computer is infected with MOLE66 ransomware, do not rush to pay for decryption of your files, because cyber criminals are not going to decrypt your files. Still, you may remove MOLE66 ransomware and decrypt .MOLE66 files without paying anything.

decrypt .MOLE66

The way this ransomware works is quite simple – first of all, MOLE66 breaks through your system, then starts encrypting procedure with AES encryption algorithm. MOLE66 ransomware adds .MOLE66 extension to the name of all the encrypted files. For example, video.mp4 file turns into video.mp4.MOLE66 file. Once all the data is encrypted, the ransomware drops _HELP_INSTRUCTIONS_.TXT on your desktop. You may find demands of cyber criminals in it, here is MOLE66 ransom note:

!!!All your files are encrypted!!!
What to decipher write on mail alpha2018a@aol.com
Do not move or delete files!!!!
—- Your ID: 5338f74a-3c20-****-****-f3a91818cea7 —-
!!! You have 3 days otherwise you will lose all your data.!!!

There are two solutions of this problem. First is to use special Removal Tool. Removal Tools delete all instances of malware by few clicks and help user to save time. Or you can use Manual Removal Guide, but you should know that it might be very difficult to remove MOLE66 ransomware manually without specialist’s help.

MOLE66 Removal Guide

  1. Download MOLE66 Removal Tool.
  2. Remove MOLE66 from Windows (7, 8, 8.1, Vista, XP, 10) or Mac OS (Run system in Safe Mode).
  3. How to Decrypt MOLE66 files.
  4. How to restore system to previous “condition”.
  5. How to protect PC from future infections.

How to remove MOLE66 ransomware automatically:

Download Norton Security This removal tool can help you to get rid of this nasty virus and clean up your system. In case you need a proper and reliable solution, we recommend you to download and try it. This anti-ransomware removal tool is able to detect and remove MOLE66 ransomware from your system.

Manual MOLE66 Removal Guide

Below is step-by-step instructions to remove MOLE66 from Windows and Mac computers. Follow this steps carefully and remove files and folders belonging to MOLE66. First of all, you will need to run system in a Safe Mode. Then find and remove needed files and folders.

Uninstall MOLE66 from Windows or Mac

Windows 7/Vista:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to MOLE66 by using Removal Tool;
  5. Delete found files;

Windows 8/8.1:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to MOLE66 by using Removal Tool;
  5. Delete found files;

Windows 10:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to MOLE66 by using Removal Tool;
  5. Delete found files;

Windows XP:

  1. Restart the computer;
  2. Press Settings button;
  3. Choose Safe Mode;
  4. Find programs or files potentially related to MOLE66 by using Removal Tool;
  5. Delete found files;

Mac OS:

  1. Restart the computer;
  2. Press and Hold Shift button, before system will be loaded;
  3. Release Shift button, when Apple logo appears;
  4. Find programs or files potentially related to MOLE66 by using Removal Tool;
  5. Delete found files;

How to decrypt .MOLE66 files

After MOLE66 is removed, you want to decrypt your documents and files. There are different decrypting tools, that can help you.
After removing MOLE66, you can try to decrypt MOLE66 files. All you need is decrypting tool. There may be a trouble – not all of the files can be decrypted and restored, it depends on ransomware.
One of those programs is Trend Micro Ransomware File Decryptor. This software decrypt a lot of types ransomware file formats, you may try to use in order to decrypt infected files.
Download TrendMicro Decryptor

How to restore encrypted files

If you can’t remove and decrypt files or just don’t want to use those instructions, you can try to restore system from recovery point by using special tools: Previous Versions, System Restore, Shadow Explorer. Be sure, that you have saved recovery point, otherwise you can’t do anything with some tools.

Restore encrypted files using Shadow Explorer

Shadow Explorer – is good software with simple interface, that gives an access to “shadow copies”.

  1. Run the Shadow Explorer;
  2. Choose local disk, that contains needed files (sector 1 on picture);
  3. Choose time period, when files weren’t encrypted (sector 2 on picture);
  4. Find needed files and folders, after this right-click them and Press Export;
  5. Choose the export location and check files;

Restore encrypted files using Recuva

There is another program, that can help user to recover encrypted files. And this program is Recuva, software which friendly interface.

  1. Run the Recuva;
  2. Follow instructions and wait until scan process ends;
  3. Find needed files, mark them and Press Recover button;

How to prevent ransomware infection?

adware bundle offer 1Since MOLE66 classified as ransomware, it needs a method to infiltrate into personal computer. And the most usable method is attaching to e-mail with messages, that provocate to open attached document.

adware bundle offer 2

Be careful while reading e-mail from unknown and suspicious users. Also, you can install various programs, which will stop any actions from suspicious applications, like ransomware. The most popular programs are:
HitmanPro.Alert with CryptoGuard, Malwarebytes Anti-Ransomware and CryptoPrevent. Those programs may detect many known ransomware and some unknown ransomware. It is recommended to use such programs for safety of your personal documents and files in future.

Please follow and like us:

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *