Thanks, earlier this year someone was trying to help me, and they suggested I keep in touch with you. Just thought I'd ask.
Thanks again for your response.
Posted 16 July 2016 - 05:40 PM
Thanks, earlier this year someone was trying to help me, and they suggested I keep in touch with you. Just thought I'd ask.
Thanks again for your response.
Posted 16 July 2016 - 06:12 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 19 July 2016 - 07:38 PM
I just submitted some files (key in DECRYPT txt is Nz5zSGopV58J6RwztmDBgVLQ5RxnSSKSv) for analysis to see if its' possible to figure out which ransomware it is. It's a ".crypted" extension, though I've tried both "decrypt_xorist.exe" and "decrypt_nemucod.exe" but only get the error "No key found - The decrypter could not determine a valid key for your system. Please drag and drop both an encrypted file as well as its unencrypted counterpart onto the decrypter to determine the correct key. Files need to be at least 510 bytes long." Yes, I am dragging both the encrypted and unencrypted version onto both files with the same error. I have submitted a request to Dr Web as well. Appreciate any help!
Posted 19 July 2016 - 08:16 PM
Any files that are encrypted with Nemucod Ransomware will have the .crypted extension appended to the end of the encrypted data filename and leave files (ransom notes) named DECRYPT.TXT.I just submitted some files (key in DECRYPT txt is Nz5zSGopV58J6RwztmDBgVLQ5RxnSSKSv) for analysis to see if its' possible to figure out which ransomware it is. It's a ".crypted" extension...
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 July 2016 - 04:09 PM
Mine had been renamed *.doc.encrypted (no idea which particular ransomware it is.
Posted 20 July 2016 - 04:13 PM
You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance.Mine had been renamed *.doc.encrypted (no idea which particular ransomware it is.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 20 July 2016 - 04:56 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 08 October 2016 - 02:51 PM
Crypt0l0cker encrypted unmapped network shares?
This week we received an alert that the crypt0locker ransomware (according the ransome note) encrypted files (.enc extension) on a computer. The proces responsible for the encryption was a file with the extension tmp. Soon after we received alerts from other computers but this time the proces was system:remote. After analyzing the alert from the first computer we noticed that the proces encrypted files on network shares which were not mapped to a netwerk drive. Besides encrypted files in folders on the c:, d: and M: (mapped nework drive) there were files encrypted on the path \\computer\share\folder.
According to the page http://www.bleepingcomputer.com/virus-removal/torrentlocker-crypt0l0cker-ransomware-information#shares the torrentlocker-crypt0l0cker ransomware only encrypts files on mapped network shares. Is there a new variant active?
P.S. We reinstalled the infected computer and removed all the ransomware files and restored most files from a backup.
Posted 10 October 2016 - 12:59 AM
All,
Is there already a decrypt software for this ransom software? I was able to delete the ransom/trojan but my files are still encrypted and need to decrypt.
Posted 10 October 2016 - 01:39 AM
All,
Is there already a decrypt software for this ransom software? I was able to delete the ransom/trojan but my files are still encrypted and need to decrypt.
I bought the decrypt tool from Dr. Web to decrypt all files. This was the only solution I found. As far as I know a free decryption tool isn't out yet.
Posted 10 October 2016 - 06:24 AM
Many victims have reported that Dr.Web was able to assist them with decrypting files...see here....Is there already a decrypt software for this ransom software?...
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 14 October 2016 - 02:09 PM
Crypt0l0cker encrypted unmapped network shares?
This week we received an alert that the crypt0locker ransomware (according the ransome note) encrypted files (.enc extension) on a computer. The proces responsible for the encryption was a file with the extension tmp. Soon after we received alerts from other computers but this time the proces was system:remote. After analyzing the alert from the first computer we noticed that the proces encrypted files on network shares which were not mapped to a netwerk drive. Besides encrypted files in folders on the c:, d: and M: (mapped nework drive) there were files encrypted on the path \\computer\share\folder.
According to the page http://www.bleepingcomputer.com/virus-removal/torrentlocker-crypt0l0cker-ransomware-information#shares the torrentlocker-crypt0l0cker ransomware only encrypts files on mapped network shares. Is there a new variant active?
P.S. We reinstalled the infected computer and removed all the ransomware files and restored most files from a backup.
Again we had one computer with the crypt0l0cker ransomware which encrypted files on other computers with a shared folder. Before reinstalling this computer we saved the ransomware, the note files and two encrypted files. The ransomware was uploaded to virus total (https://www.virustotal.com/en/file/18398ed5c38dbacd97ce2d4fc9a4fc28c22ae68d37a263e5c3cdd77d7bbf597f/analysis/) but the file was already known. According to the comments the file was also analyzed by Deepviz analysis and hybrid analysis. On these websites you can download a sample for your own analysis.
Posted 20 March 2017 - 03:46 PM
Hello... what kind of ransomware is this kind of filename? Attendance.pdf.id-3438022203_[x3m-pro@protonmail.com]_[x3m@usa.com].x3m
Thanks......
Posted 20 March 2017 - 06:16 PM
You have already been answered in the CryptON Ransomware Support & Help TopicHello... what kind of ransomware is this kind of filename? Attendance.pdf.id-3438022203_[x3m-pro@protonmail.com]_[x3m@usa.com].x3m
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
0 members, 1 guests, 0 anonymous users