Infected with Crypt0l0cker? Need to decrypt your files?

What is Crypt0l0cker

Crypt0l0cker (TorrentLocker) is file-encrypting virus and ransomware that targets following countries: Australia, Austria, Canada, Czech Republic, Italy, Ireland, France, Germany, Netherlands, Korea, Thailand, New Zealand, Spain, Turkey, and the United Kingdom. For some reason it is not affecting US-based PCs. The ransom amount is 2.2 Bitcoins, which is currently about $330 GBP. Crypt0l0cker encrypts all files except ones with following extensions: avi, wav, mp3, gif, ico, png, bmp, txt, html, inf, manifest, chm, ini, tmp, log, url, lnk, cmd, bat, scr, msi, sys, dll, exe. Because those files are needed for OS operation. Ransomware adds extension .encrypted to every encrypted file and creates files “DECRYPT_INSTRUCTIONS.html” and “DECRYPT_INSTRUCTIONS.txt“, that contains instructions to restore encrypted files. Malefactors ask to use TOR Browser and Bitcoin currency, which makes them nearly untraceable for the police. There is free decryptor for older version of Crypt0l0cker called TorrentUnlocker, that you can download below. Use following instructions to remove Crypt0l0cker virus and decrypt .encrypted files.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

crypt0l0cker ransomware virus

How Crypt0l0cker infected your PC

Crypt0l0cker distributes using standard methods (malicious email attachments, torrent (P2P) networks, fake invoices). To seem more legitimate it spams UK users with e-mails from Royal Mail, Australian users with e-mails from Australia Post. Crypt0l0cker uses TOR network for receiving ransom, which makes it very difficult to track. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.

First of all don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Crypt0l0cker virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to Crypt0l0cker – files, folders, registry keys.

 

Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of Crypt0l0cker:

Remove following registry entries:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{randomname} "C:\Windows\{randomname}.exe"

Remove following files and folders:

C:\ProgramData\iwymyzucasakodon\
C:\ProgramData\iwymyzucasakodon\00000000
C:\ProgramData\iwymyzucasakodon\01000000
C:\ProgramData\iwymyzucasakodon\02000000
C:\ProgramData\iwymyzucasakodon\03000000
C:\ProgramData\iwymyzucasakodon\04000000
C:\ProgramData\iwymyzucasakodon\05000000
C:\ProgramData\iwymyzucasakodon\06000000
%StartMenu%\Programs\Startup\system.pif
%WinDir%\{randomname}.exe

How to decrypt files infected by Crypt0l0cker (.encrypted files)?

Use automated decryption tools

free decryptor for crypt0l0cker

There is ransomware decryptor from Nathan (DecrypterFixer) that can decrypt .encrypted files. It is free and may help you restore .encrypted files by Crypt0l0cker virus. You will need at least one original and one decrypted file to make it work. Download it here:

Download Crypt0l0cker Decryptor

You can also try to use manual methods to restore and decrypt .encrypted files.

Decrypt .encrypted files manually

Restore the system using System Restore

system restore

Although, latest versions of Crypt0l0cker remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – Crypt0l0cker by Crypt0l0cker). This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Restore .encrypted files using shadow copies

shadow explorer gui

  1. Download and run Shadow Explorer.
  2. Select the drive and folder where your files are located and date that you want to restore them from.
  3. Right-click on folder you want to restore and select Export.
  4. Once the scanning process is done, click Recover to restore your files.

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Information provided by: Alexey Abalmasov

Leave a Reply

Your email address will not be published. Required fields are marked *