Pe32s is a dangerous form of ransomware that encrypts files on an infected system and demands a ransom for their decryption. Victims are left with inaccessible data, a ransom note, and little recourse except for restoring files from backups or attempting decryption (which is rarely possible without the attackers’ assistance).
Threat Overview
To provide a clear understanding of Pe32s ransomware, refer to the table below:
Attribute | Details |
---|---|
Threat Name | Pe32s virus |
Threat Type | Ransomware, Crypto Virus, File Locker |
Encrypted Files Extension | .pe32s (files are also appended with a unique ID) |
Ransom Note File Name | README.txt |
Ransom Amount | Three to six-digit sum in USD, payable in Bitcoin |
Cyber Criminal Contact | @decryptorsupport (Telegram), bettercallarmin1@gmail.com |
Detection Names | Avast (Win64:MalwareX-gen [Trj]), Combo Cleaner (Gen:Variant.Tedy.711790), ESET-NOD32 (A Variant Of Win64/Filecoder.SW), Kaspersky (Trojan-Ransom.Win64.Agent.dxc), Microsoft (Trojan:Win32/Wacatac.B!ml) |
Symptoms of Infection | Files renamed with .pe32s extension, ransom note displayed, files inaccessible, payment demand in Bitcoin |
Damage | Files are encrypted and require a ransom for decryption; additional malware infections are possible. |
Distribution Methods | Phishing emails, infected attachments, torrent websites, malicious ads, drive-by downloads, pirated software |
Danger Level | Severe – Data loss, financial extortion, and potential additional malware infections. |

Remove
Pe32s Ransomware
With SpyHunter
Ransom Note Content
The Pe32s ransomware drops a ransom note titled README.txt, which contains the following message:
“All of your files have been encrypted and sensitive data has been extracted from your system. To regain access to your files and prevent data leaks, you must pay a ransom. The ransom amount depends on the scale of the attack and the number of infected computers.
Test decryption is available for free (limited to a few small files under 2MB that do not contain valuable data). Contact us via Telegram (@decryptorsupport) or email (bettercallarmin1@gmail.com) to receive further instructions. Payment must be made in Bitcoin. Failure to comply within the given timeframe will result in permanent data loss or public exposure of your files.”
How Did Pe32s Ransomware Infect Your Computer?
Pe32s ransomware primarily spreads through:
- Phishing Emails – Malicious attachments or links disguised as legitimate messages.
- Fake Software Downloads – Cracked software, freeware bundles, or unauthorized third-party sites.
- Exploit Kits and Drive-by Downloads – Visiting compromised or malicious websites.
- Fake Software Updates – Fake prompts tricking users into installing malware.
- Network Propagation – Spread through unsecured network shares and removable drives.
How to Remove Pe32s Ransomware?

Remove
Pe32s Ransomware
With SpyHunter
Step 1: Disconnect from the Internet
To prevent further encryption or data exfiltration, immediately disconnect your system from the internet.
Step 2: Boot in Safe Mode with Networking
- Restart your computer and press F8 (Windows 7) or Shift + Restart (Windows 10/11) to enter Advanced Startup Options.
- Select Safe Mode with Networking.
Step 3: Use SpyHunter to Detect and Remove Pe32s Ransomware
SpyHunter is a reputable anti-malware tool that can help remove Pe32s and associated threats:
- Download SpyHunter.
- Install and launch SpyHunter.
- Click on Scan Now and allow it to detect Pe32s and other threats.
- Once the scan is complete, click Fix Threats to remove Pe32s ransomware.
Step 4: Restore Encrypted Files (If No Backup Is Available)
- Use Windows Previous Versions: Right-click on an encrypted file > Select Restore previous versions (if available).
- Shadow Explorer: Try restoring previous copies if Volume Shadow Copies exist.
- Data Recovery Software: Tools like Recuva, EaseUS, or Stellar Data Recovery may recover deleted file copies.
How to Prevent Future Ransomware Infections
Backup Your Data Regularly
- Maintain multiple copies of your files in different locations (external drives, cloud storage).
Use Strong Security Software
- Keep SpyHunter or another reputable anti-malware program active.
Be Cautious with Emails and Links
- Avoid clicking on unknown links and downloading attachments from unknown sources.
Keep Your System and Software Updated
- Enable automatic updates for your OS and software to patch vulnerabilities.
Disable Macros in Microsoft Office
- Do not enable macros unless you trust the document source.
Use Strong Passwords and Enable Multi-Factor Authentication (MFA)
- Prevent unauthorized access to your accounts and network.
Final Thoughts
Pe32s ransomware is a severe cybersecurity threat capable of encrypting crucial files and extorting victims for ransom. While removal is possible with SpyHunter, file decryption remains unlikely without backup. Therefore, prevention measures—such as maintaining backups, using robust security software, and staying vigilant against phishing attacks—are crucial to avoiding ransomware infections.
By following the steps outlined in this guide, users can effectively remove Pe32s ransomware, attempt file recovery, and enforce preventive measures to protect against future threats.

Remove
Pe32s Ransomware
With SpyHunter
If you are still having trouble, consider contacting remote technical support options.