Infected with Nemesis Ransomware? Need to decrypt your files?

What is Nemesis Ransomware

Nemesis Ransomware is a successor of CryptON Ransomware and is very likely developed and distributed by the same team of hackers. Files are encrypted using mix of RSA, AES-256 and SHA-256 or SHA-512 encryption algorithm. Other version of Nemesis Ransomware are known under the names Cry9, Cry128, Cry36, X3M. Unlike previous versions Nemesis Ransomware appends following extensions:

.nemesis, .aax55 .v8dp, .63vc4, .id-1969330990_[qg6m5wo7h3id55ym.onion.to].63vc4, .id_[victim’s ID]_[webmafia@asia.com].t5019, .id_[victim’s ID]_[pizdoglaz@asia.com].t5019, .id_[victim’s ID]_[Blacklagoon@aolonline.top].nemesis

Newer version add randomly generated extensions. After encryption ransomware creates file ### DECRYPT MY FILES ###.html with instructions to pay the ransom. Ransom amount varies from $500 to $1000. Here are the contents of this file:

ALL YOUR WORK AND PERSONAL FILES HAVE BEEN ENCRYPTED
Nemesis Ransomware
To decrypt your files you need to buy the special software – «Nemesis decryptor»
To recover data, follow the instructions!
You can find out the details/ask questions in the chat:
hxxps://qg6m5wo7h3id55ym.onion.to (not need Tor)
If the resource is not available for a long time, install and use the Tor-browser:
1. Run your Internet-browser
2. Enter or copy the address hxxps://www.torproject.org/download/download-easy.html in the address bar of your browser and press key ENTER
3. On the site will be offered to download the Tor-browser, download and install it. Run.
4. Connect with the button “Connect” (if you use the English version)
5. After connection, the usual Tor-browser window will open
6. Enter or copy the address hxxp://qg6m5wo7h3id55ym.onion in the address bar of Tor-browser and press key ENTER
7. Wait for the site to load
// If you have any problems installing or using, please visit the video tutorial hxxps://www.youtube.com/watch?v=gOgh3ABju6Q

Please, never, pay the ransom, because in most cases malefactors never send decryption keys. Besides, antivirus companies are constantly working on decryption tools, and now most versions of Nemesis/CryptON/X3M Ransomware can be decrypted. In this guide we will show you how to remove Nemesis Ransomware and decrypt .nemesis, .63vc4, .t5019 files in Windows 10, Windows 8, Windows 7.

nemesis ransomware

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

How Nemesis Ransomware infected your PC

Nemesis Ransomware usually infects your PC through infected email attachments (be careful, as cyber criminals usually mask their spam malicious emails with attachments into Ebay email or any other popular trusted website), fake software updaters and trojans – that’s why good anti-viruses is vitally important to avoid ransomware threat. You can also get this ransomware on file sharing networks, including torrent files. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police, as user in this network are often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.

First of all don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Nemesis Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to Nemesis Ransomware – files, folders, registry keys.

 

Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of Nemesis Ransomware:

Remove following registry entries:

Remove following files:

### DECRYPT MY FILES ###.html
### HOW TO DECRYPT FILES ###.html
DECRYPT MY FILE.txt

How to decrypt files infected by Nemesis Ransomware (.nemesis, .63vc4, .t5019 files)?

Use automated decryption tools

1. Tool to decrypt Nemesis/CryptON/X3M files

emsisoft decryptor for nemesis ransomware

There is ransomware decryptor from Emsisoft that can decrypt .nemesis, .63vc4, .t5019 files. It is free and may help you restore .nemesis, .63vc4, .t5019 files encrypted by Nemesis Ransomware virus. To use this tool you will need encrypted file and its original (not encrypted copy). This will help to decrypt the rest of the files. Drag this 2 files to decrypter executable:

Download it here:

Download CryptON Decrypter

2. Tool to decrypt Cry9/Nemesis files

emsisoft decryptor for cry9 ransomware

There is ransomware decryptor from Emsisoft that can decrypt .-juccy[a]protonmail.ch, .id-, .id-_[nemesis_decryptor@aol.com].xj5v2, .id-_r9oj, .id-_x3m, .id-_[x3m-pro@protonmail.com]_[x3m@usa.com].x3m, .-sofia_lobster[a]protonmail.ch and ._[wqfhdgpdelcgww4g.onion.to].r2vy6 files. It is free and may help you restore files encrypted by Cry9/Nemesis Ransomware virus. To use this tool you will need encrypted file and its original (not encrypted copy). This will help to decrypt the rest of the files. Drag this 2 files to decrypter executable:

Download it here:

Download Cry9 Decrypter

3. Tool to decrypt Cry128/Nemesis files

emsisoft decryptor for cry128 ransomware

There is ransomware decryptor from Emsisoft that can decrypt .fgb45ft3pqamyji7.onion.to._”, .id__gebdp3k7bolalnd4.onion._, .id__2irbar3mjvbap6gt.onion.to._ and .id-_[qg6m5wo7h3id55ym.onion.to].63vc4. files. It is free and may help you restore files encrypted by Cry9/Nemesis Ransomware virus. To use this tool you will need encrypted file and its original (not encrypted copy). This will help to decrypt the rest of the files. Drag this 2 files to decrypter executable:

Download it here:

Download Cry128 Decrypter

If you have file extension, that did not match records above, try to use all decrypters one by one.

You can also try to use manual methods to restore and decrypt .nemesis, .63vc4, .t5019 files.

Decrypt .nemesis, .63vc4, .t5019 files manually

Restore the system using System Restore

system restore

Although, latest versions of Nemesis Ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – Nemesis Ransomware by Nemesis Ransomware). This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Restore .nemesis, .63vc4, .t5019 files using shadow copies

stellar-data-recovery

  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.

Protect your files from ransomware

Most modern software can protect your data from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach to protect your files from ransomware and lockers. One of the best is SOS Online Backup. The product will automatically find important files, then simply make a daily backup on the remote server. SOS runs quietly and automatically in the background and supports any size and any file type. All SOS apps (desktop AND mobile) encrypt files using UltraSafe 256-bit AES before transferring them to the cloud. You will not lose your important data. Download One Year Plan.

SOS Online Backup

Information provided by: Alexey Abalmasov

One comment

Leave a Reply

Your email address will not be published. Required fields are marked *