What is Zenis ransomware
Zenis encrypts files on the infected computer, renaming them to Zenis-[2 random characters].[12 random characters], and leaves ransom notes (Zenis-Instructions.html) in folders with encrypted files. Zenis ransomware has been analyzed by security researchers, and Michael Gillespie (@demonslay335 on Twitter) has found a weakness in the ransomware that allows decryption of files. That weakness is not released publicly lest the ransomware developers find out and fix it. Users who wish to decrypt their files for free can contact Michael Gillespie (however that won’t be quick: there are a lot of victims, and the decryption itself is time-consuming). It is quite possible that Zenis developers will find the weakness and release a new, more secure version of ransomware in the future; in that case you can use this guide to try recovering your files by other methods.
How to Remove Zenis Ransomware
If you have working backups of your encrypted files or you are not going to try and recover lost files, then scan your computer with one or several antivirus and anti-malware programs or reinstall the operatig system altogether.
SpyHunter is a powerful anti-malware solution that protects you against malware, spyware, ransomware and other types of Internet threats. SpyHunter is available for Windows and macOS devices.
However, if you want to try all possible ways of recovering encrypted files, including data recovery tools, then I suggest you use these tools first and scan with anti-malware later. Skip to the explanation
How to Recover Files Encrypted by Zenis Ransomware
Once your files are encrypted by ransomware, you have several ways to possibly recover them:
Going further, we need to 1) stop ransomware from encrypting files that we recover, if malware is still active; 2) try not to overwrite files deleted by ransomware. The best way to do it is disconnect your hard drive and connect it to another computer. You will be able to browse all your folders, scan them with antivirus programs, use file recovery software or restore data from Shadow Volume Copies. Although it is better to download all tools you’ll need beforehand and disconnect the computer from the Internet before connecting the infected hard drive, just to be safe.
Disadvantages of this method:
- This might void your warranty.
- It’s harder to do with laptops, and you’ll need a special case (disk enclosure) to put a hard drive in before connecting it to another machine.
- It is possible to infect the other computer if you open a file from the infected drive before scanning the drive with AVs and removing all found malware; or if all AVs fail to find and delete the malware.
Another, easier, way is to load into Safe Mode and do all file recovery measures from there. However, that will mean using the hard drive and potentially overwriting some data. In this case it’s preferable to use only portable versions of recovery software (the ones that don’t require installation), download them onto an external device, and save any recovered files onto an external device too (external hard drive, thumb drive, CD, DVD, etc.).
Boot Into Safe Mode:
Windows XP, Windows Vista, Windows 7:
- Restart the computer.
- Once you see a boot screen tap F8 key continuously until a list of options appears.
- Using arrow keys, select Safe Mode with Networking.
- Press Enter.
Windows 8, Windows 8.1, Windows 10:
- Hold down Windows key and hit X key.
- Select Shut down or sign out.
- Press Shift key and click on Restart.
- When asked to choose an option, click on Advanced options => Startup Settings.
- Click Restart in the bottom right corner.
- After Windows reboots and offers you a list of options, press F5 to select Enable Safe Mode with Networking.
Back up Your Encrypted Files
It is alwayse advisable to create a copy of the encrypted files and put it away. That might help you if free ransomware decryptor becomes available in the future, or if you decide to pay and get the decryptor but something goes wrong and files get irreparably damaged in the process of decryption.
Use File Recovery Tools to Recover Files
Recuva (free)
PhotoRec (free)
Step-by-step guide on how to use PhotoRec
Puran File Recovery (free for non-commercial use)
Video guide on how to use Puran File Recovery
R-Undelete (free version allows recovery of files under 256KB in size for Windows)
Detailed guide on how to recover deleted files with R-Undelete
Recover Encrypted Files From Shadow Copies.
The easiest way to access Shadow Volume Copies is by using a free tool called Shadow Explorer. Just download the latest version and install it (or download the portable version).
- Launch Shadow Explorer.
- On the top left part of the window you can select a disk (C:\, D:\, etc.) and a date when a snapshot of files was taken.
- To recover a file or a folder right-click on it and select Export….
- Choose where do you want to put the files.
Remove Zenis Ransomware
Now that you have your recovered or still encrypted files on an external device, it is time to scan your computer with AV and anti-malware software or, better yet, reinstall the operating system, to fully get rid of possible ransomware traces. Remember to also scan your external device before putting files back on your computer!