Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Nemucod / NemucodAES Ransomware (.crypted - Decrypt.txt) Support & Help Topic


  • Please log in to reply
649 replies to this topic

#646 xenocide122

xenocide122

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:47 PM

Posted 18 August 2017 - 01:17 PM

@demonslay335 I am trying to open it, it is 4gb so is taking a long time (notepad refused so tying something else), I will let you know what I can find.

 

I did have it in the %TEMP% folder but it said it was not the db file but it is where it was supposed to be and is named the exact same thing that my note is named.



BC AdBot (Login to Remove)

 


#647 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,144 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:09:47 PM

Posted 18 August 2017 - 01:19 PM

@xenocide122

 

Try Notepad++, it will buffer the file. v1.0.0.79 gives you that error?


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#648 xenocide122

xenocide122

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:47 PM

Posted 18 August 2017 - 01:39 PM

@demonslay335 I did not realize I could look at the file in a text viewer, but I am going to have to do more digging, this file does not look like the right file... has some .net info and a bunch of strange characters.

 

I am using the latest version of the decrypter so i will let you know when I find the right file and how it all goes. Thanks again!



#649 Demonslay335

Demonslay335

    Ransomware Hunter


  • Security Colleague
  • 3,144 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:09:47 PM

Posted 18 August 2017 - 02:02 PM

@xenocide122

 

Just finished downloading your file, and it is not a valid database file. I'm not sure what it is yet, actually.

 

Also, protip - it's best to compress large files before sharing. 7zip would have compressed it to probably 10-25% that size on ultra compression settings. Even regular zip compression would have cut it way down.

 

Also my bad, Notepad++ actually does have a limit that I forgot (I rarely open text files that large).


Edited by Demonslay335, 18 August 2017 - 02:03 PM.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#650 xenocide122

xenocide122

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:09:47 PM

Posted 18 August 2017 - 02:04 PM

@demonslay335

 

Thanks for the info and tips!






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users