How to remove HC7 virus and restore Planetary files

HC7 adds new extension for files: Planetary. HC7 ransomware already penetrated many laptops around the world through most effective method: scam messages with dangerous attachments. Also, scammers use exploits to take control over the system, but they are speedily fixed. After penetration, HC7 inspects the hard disc to find the files to be cyphered and their general cost. Nowadays, each modern virus can encrypt text, image, video and audio files in all known extensions. Special attention is attracted to businesslike information, since representatives of business are the key target for fraudsters. HC7 targets only information, and doesn't spoil the software, so that the man can pay the ransom via his computer. Encryption is carried out through famous RSA and AES algorithms, and it is so sophisticated that that it cannot be bruteforced. This is the foundation for unbelievable effectuality of this type of viruses in last years: usual user, even if he has a pretty good experience in suchlike things, won't ever restore the files, and will have to pay the price. The single way to recover the information is to hack the scammer's website and get the master key. Some experienced hackers can get the keys through faults in viruse's program code. Virus asks from victims different amount from 500 to 5000 $ as a ransom.

Planetary ransomware virus


The knowledge of computers is extremely substantial in our world, as it assists user to guard the system from computer viruses. It's sad to say, but 90% of users realize the significance of PC knowledge just after ransomware infection. To guard yourself, you should keep in mind a few basic rules:

    • Don't ignore the red flags that your hardware or software displays. It requires a big part of CPU power to encrypt the files. If you observe a significant drop in PC power or notice a strange process in the Process Manager, you need to shut down the machine, boot it in safe mode, and run the anti-malware. These measures, if the machine is really infected, will save some of your information.
    • Don't admit any alterations to the PC, coming from suspicious software. The most efficient manner of data recovery is the restoration through Shadow Copies, so Web-criminals have included the deletion of SC into the basic features of malware. However deleting of copies requires admin rights and acceptance from the user. If you'll stop for a moment before accepting the pop-up, it may save your information and your time.
    • Attentively inspect your mailbox, specifically the messages that have files attached to them. The very popular model of fraud messages is the notification about prize gaining or package obtaining. The second very effective type of these letters is a forgery for business correspondence. It is OK to take an interest and read the message even if it might be not for you, but remember that a single click on the viral file might cost you a lot of time, money and headache.

Virus elimination is not the happy end - it's just a first move on the long road before the full data restoration. To recover the files you will have to familiarize with the tips in the special chapter of our entry. In case of encrypting virus we don't provide the hand uninstall tips, because its complication and the possibility of errors is very high for average user. High class viruses can't be removed even through AV-program, and have other efficient mechanisms of protection. Modern viruses can easily erase encrypted data, or some of it, if user tries to uninstall the virus. This is very bad, and the following guide will assist you to avoid it.

Removal instruction

Step 1. Boot into Safe mode

Safe mode

Start -> Msconfig.exe

Safe mode. Step 1

On the tab Boot select Safe boot

Safe mode. Step 2

Step 2. Check Startup folder

Start -> Msconfig.exe ->Disable unknown programs in the Startup tab


Step 3. Check hosts file

Modify hosts file, that located in C:\Windows\System32\drivers\etc\ .

Hosts file.Step 1

Open the file with Notepad and delete suspicious strings.

Hosts file.Step 2

It has to look like this:

Hosts file.Step 3

Step 4. Scan the system with antiviral scanner


Special Offer

Antivirus scanner

Why we recommend SpyHunter antimalware

Detects most kind of threats: malicious files and even registry keys of malware will be found

Protects your system in the future

24/7 free support team

SpyHunter's scanner is only for malware detection. If program detects infected elements on the computer, you will need to purchase malware removal tool for $39,99 to delete threats. SpyHunter has Free Trial for one remediation and removal, subject to a 48-hour waiting period. Uninstall steps and additional information EULA , Privacy Policy and Threat Assessment Criteria.

bwd  Instructions 1/2  fwd

Step 5. Disable Safe mode

Start -> Msconfig.exe ->Disable Safe boot in the Boot tab

Deactivate Safe mode

After erasing HC7 from the machine, it only remains to decrypt the polluted data. Actually, this is not literally decipherment, as the encrypting manners owned by fraudsters are very complicated. More often than not, to get back the data, you should seek help on anti-malware communities or from renowned malware researchers and antiviral program vendors. If you picked the independent data restore - read our article, which shows all the easiest manners: article about files decryption.

This website uses cookies to improve your experience. If you continue using the site, we will assume that you accept our cookies policy.