Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Locker ransomware hides until midnight on May 25th and then encrypts your data

  • Please log in to reply
78 replies to this topic

#76 Grinler


    Lawrence Abrams

  • Topic Starter

  • Admin
  • 43,434 posts
  • Gender:Male
  • Location:USA
  • Local time:08:18 AM

Posted 29 May 2015 - 10:39 AM

CryptoLocker was only able to be decrypted because they seized the command and control servers. If this happens with Locker, then yes it may be possible.

That is why i suggest everyone save their C:\ProgramData\rkcl folder as it contains data files that has info that may be needed to decrypt your files.

BC AdBot (Login to Remove)



#77 afnuke


  • Members
  • 10 posts
  • Local time:08:18 AM

Posted 29 May 2015 - 03:37 PM

Need some help.  checking firewall exemptions and theres 1 I don't understand.   


dhowsdrosstrois    port number 58589 TCP      open     


Any help or instructions appreciated

#78 Silvix


  • Members
  • 9 posts
  • Gender:Male
  • Local time:06:18 AM

Posted 02 June 2015 - 04:56 PM

Yeah so mine literally just decrypted all the files and uninstalled its self. I never put in the code so yeah. :D It told me to have a nice day.

#79 Giovanni2400


  • Members
  • 1 posts
  • Local time:02:18 PM

Posted 04 June 2015 - 12:29 PM

How to delete rkcl.exe ? Will my old photos and word documents work after i delete rkcl folder ? :(((( 

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users