Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Help! Hijacked Files Encrypted - all files renamed with .askyneh (ransomware sca

  • This topic is locked This topic is locked
1 reply to this topic

#1 dice1976


  • Members
  • 11 posts
  • Gender:Male
  • Local time:05:50 PM

Posted 30 June 2015 - 01:35 PM


I am a technology consultant helping my client with a very infected pc- I have full remote access to the box and he is available if I have to run something on the box with no network.

His pc became infected with some ransomware scam - the main txt file reads:

Your documents, photos, databases and other important files have been encrypted
with strongest encryption and unique key, generated for this computer.

Private decryption key is stored on a secret Internet server and nobody can
decrypt your files until you pay and obtain the private key.

If you see the main locker window, follow the instructions on the locker.
Overwise, it's seems that you or your antivirus deleted the locker program.
Now you have the last chance to decrypt your files.

Open http://43qzvceo6ondd6wt.onion.cab or http://43qzvceo6ondd6wt.tor2web.org 
in your browser. They are public gates to the secret server. 

If you have problems with gates, use direct connection:

1. Download Tor Browser from http://torproject.org

2. In the Tor Browser open the http://43qzvceo6ondd6wt.onion/
Note that this server is available via Tor Browser only. 
Retry in 1 hour if site is not reachable.

Copy and paste the following public key in the input form on server. Avoid missprints.

Follow the instructions on the server.​

Please let me know if there is a way to reverse this encryption or ransomware scam

Edit: Moved topic from Encryption Methods and Programs to the more appropriate forum.~ Animal

BC AdBot (Login to Remove)


#2 Sintharius


    Bleepin' Sniper

  • Members
  • 5,639 posts
  • Gender:Female
  • Location:The Netherlands
  • Local time:10:50 PM

Posted 30 June 2015 - 01:41 PM

Hi there,

It appears that you have been infected with CTB-Locker - and unforunately it is a very real ransomware.

Please read below for more information.

The newest variants of CTB-Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. Compounding matters, the newer CTB-Locker infection has been seen in combination with KEYHolderTorrentLocker (fake Cryptolocker) or CryptoWall ransomware. Unfortunately, there is still no known method of decrypting your files without paying the ransom and with dual infections, that means paying both ransoms.

A repository of all current knowledge regarding this infection is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion.

If you have any questions, it is best that you post in the discussion topic mentioned above.

To avoid confusion I have asked a Moderator to close this topic. Good luck.


Edited by hamluis, 30 June 2015 - 03:28 PM.
Topic closed per request - Hamluis.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users