Hunters ransomware is a malicious file-encrypting virus belonging to the Xorist ransomware family. It encrypts a victim’s files, renames them with a long extension, and demands a ransom of $10,000 in Bitcoin for a decryption tool. The malware leaves a ransom note titled “HOW TO DECRYPT FILES.txt”, instructing victims to contact cybercriminals via qTOX to negotiate payment.
Ransomware like Hunters is a severe cyber threat that can cause permanent data loss if victims do not have backups. Paying the ransom is not recommended, as it does not guarantee file recovery and further encourages cybercriminals. Instead, users should remove the ransomware from their system immediately and take measures to protect their devices against future attacks.
Hunters Ransomware Overview
The table below summarizes key details about Hunters ransomware:
Attribute | Details |
---|---|
Threat Name | Hunters ransomware |
Threat Type | Ransomware, Crypto Virus, File Locker |
Encrypted File Extension | ..Remember_you_got_only_36_hours_to_make_the_payment_if_you_dont_pay_prize_will_triple_hunters_Ransomware |
Ransom Note Filename | HOW TO DECRYPT FILES.txt |
Ransom Demand | $10,000 in Bitcoin |
Cybercriminal Contact | qTOX |
Detection Names | Avast (Win32:Filecoder-M [Trj]), Combo Cleaner (Trojan.Ransom.AIG), ESET-NOD32 (Win32/Filecoder.Q), Kaspersky (Trojan-Ransom.Win32.Xorist.er), Microsoft (DDoS:Win32/Nitol!pz) |
Symptoms | – Files cannot be opened – Encrypted files renamed with a long extension – A ransom note is displayed – High CPU activity due to malicious processes |
Damage | – All files encrypted – Possible password-stealing trojans and secondary malware infections – Permanent data loss if no backups exist |
Distribution Methods | – Malicious email attachments (macros) – Torrent websites and pirated software – Malicious advertisements – Infected USB devices – Exploiting software vulnerabilities |
Danger Level | Severe |

Remove
Hunters Ransomware
With SpyHunter
Ransom Note Details
The Hunters ransomware ransom note, titled HOW TO DECRYPT FILES.txt
, contains the following message:
YOUR SYSTEM IS LOCKED AND ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED.
DON'T WORRY YOUR FILES ARE SAFE.
TO RETURN ALL THE NORMALLY YOU MUST BUY THE CERBER DECRYPTOR PROGRAM.
PAYMENTS ARE ACCEPTED ONLY THROUGH THE BITCOIN NETWORK.
YOU CAN GET THEM VIA ATM MACHINE OR ONLINE
https://coinatmradar.com/ (find a ATM)
hxxps://www.localbitcoins.com/ (buy instantly online any country)
1. Visit qtox.github.io
2. Download and install qTOX on your PC.
3. Open it, click "New Profile" and create a profile.
4. Click "Add friends" button and search our contact -
677DD06ED071E4B557FF3D9236ACD21AFECBA485C6643AB84F766060B967DC6E0CFC34DDD9A0
**Subject:** SYSTEM-LOCKED-ID: 90890423
**Payment:** 10,000$ BTC
How Does Hunters Ransomware Infect Systems?
Cybercriminals use several tactics to distribute Hunters ransomware. The most common methods include:
Malicious Email Attachments
- Hackers send emails with infected attachments (such as Word documents with malicious macros).
- Users who open these files unknowingly execute the ransomware.
Torrent Websites & Pirated Software
- Hunters is often embedded in keygens, cracks, and illegal downloads.
- Users downloading software from unreliable sources risk ransomware infections.
Malicious Ads & Fake Updates
- Clicking on compromised ads or fake software update prompts can lead to ransomware downloads.
USB Drives & External Devices
- Connecting infected USB drives can spread Hunters ransomware across devices.
Exploiting Software Vulnerabilities
- Outdated systems with unpatched security flaws are easy targets for ransomware exploits.
Hunters Ransomware Removal Guide

Remove
Hunters Ransomware
With SpyHunter
Removing Hunters ransomware from your system is critical to prevent further damage. Follow the step-by-step removal guide below:
Step 1: Disconnect from the Internet
- Unplug your network cable or disable Wi-Fi to prevent the ransomware from spreading to other devices.
Step 2: Enter Safe Mode
- Restart your PC and press F8 or Shift + F8 before Windows loads.
- Select Safe Mode with Networking from the options.
Step 3: Remove Suspicious Programs
- Open Control Panel > Programs and Features.
- Look for unfamiliar programs and uninstall them.
Step 4: End Malicious Processes
- Press Ctrl + Shift + Esc to open Task Manager.
- Look for suspicious processes (e.g., unknown EXE files).
- Right-click and select End Task.
Step 5: Delete Ransomware Files
- Open File Explorer and navigate to:
C:\Users\YourUsername\AppData\Roaming
C:\Users\YourUsername\AppData\Local
C:\Windows\Temp
- Delete recently added suspicious files.
Step 6: Scan Your System with SpyHunter
- Download SpyHunter.
- Install and run the scanner.
- Remove Hunters ransomware and any associated malware.
How to Protect Your System from Ransomware
Regular Backups
- Keep offline backups of important files on external drives or cloud storage.
Enable Ransomware Protection
- Use Windows Defender’s ransomware protection or third-party security tools.
Avoid Suspicious Emails & Attachments
- Do not open emails from unknown senders.
- Avoid downloading email attachments unless verified.
Update Software Regularly
- Keep your OS and software updated to patch security vulnerabilities.
Use Strong Security Software
- Install a reputable antivirus program (e.g., SpyHunter) and enable real-time protection.
Disable Macros in Microsoft Office
- Prevent ransomware infections from malicious macro-enabled documents.
Be Cautious with Downloads
- Avoid downloading software from torrent sites or third-party sources.
Conclusion
Hunters ransomware, part of the Xorist family, is a dangerous file-encrypting malware that locks users out of their data. It appends a long extension to files and demands a $10,000 Bitcoin ransom for decryption. Victims should not pay the ransom, as there is no guarantee of file recovery. Instead, they should remove the ransomware immediately using SpyHunter and take preventive measures to avoid future infections.

Remove
Hunters Ransomware
With SpyHunter
If you are still having trouble, consider contacting remote technical support options.