Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Decrypt files after clean up of Cryptolocker

  • This topic is locked This topic is locked
3 replies to this topic

#1 helpdaveplease


  • Members
  • 5 posts
  • Local time:01:43 PM

Posted 07 June 2016 - 09:49 AM



Got infected with crypt0locker today, used Malwarebytes to remove it, after 3 scans seems I am now clean, however having issue decrypting my files. Unable to use previous versions or shadow explorer unfortunately, system restore was turned on but disc size was 0 so essentially no previous versions available. YES I know..... saddest moment of my year.

I have been searching for what else might be available, I am desperate to decrypt these files, I cannot stress their importance, and yes unbelievably stupid to not have a backup. It's probably the biggest stupid thing EVER!!

Tried Kaspersky RannohDecryptor


with the suggested public pictures but file size doesn't match, the decrypted file is 1kb bigger for all public pictures in the zip file.

Tried a bigger file and that didn't help either (all encrypted files are slightly bigger than the unencrypted original file)


I don't want to pay the creator of this virus anything as I am sure that just contributes to the spread of the problem and I am doubtful they would send the key anyway.


Can anyone help?? I an hoping some IT geniuses on these forums may offer a glimmer of hope.


Thanks for reading my post and I'd be very grateful for your assistance


Kind Regards




BC AdBot (Login to Remove)


#2 Demonslay335


    Ransomware Hunter

  • Security Colleague
  • 3,579 posts
  • Gender:Male
  • Location:USA
  • Local time:08:43 PM

Posted 07 June 2016 - 09:52 AM

Which exact variant are you dealing with? Crypt0L0cker is different than CryptXXX, so the decrypter would not work on another variant. Only CryptXXX 1.0 and 2.0 are decryptable in that respect.


You may use the service in my signature to identify the variant, and to be guided to the proper support topic for more information.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.

#3 helpdaveplease

  • Topic Starter

  • Members
  • 5 posts
  • Local time:01:43 PM

Posted 08 June 2016 - 05:05 AM

Thanks for your response, I went to your service and it didn't tell me the exact variant.


Below is a copy of what it said when I uploaded an encrypted file.

This ransomware has no known way of decrypting data at this time.

It is recommended to backup your encrypted files, and hope for a solution in the future.

Identified by

  • sample_extension: .encrypted
Click here for more information about Crypt0L0cker
This ransomware is decryptable!

Identified by

  • sample_extension: .encrypted
Click here for more information about KeRanger


Everything I am reading tells me there is no way to decrypt the files for free. Is there  way to decrypt them for a price (besides paying the mugs that did this of course) I mean, is there legitimate software?


Not sure what else to do now except kepp checking these forums with everything crossed :-).

#4 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,889 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:43 PM

Posted 08 June 2016 - 05:42 AM

Any files that are encrypted with Crypt0L0cker (TorrentLocker) will have the .encrypted extension appended to the end of the affected filename. Crypt0L0cker will leave files (ransom notes) with names like DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, How_To_Restore_Files.txt and HOW_TO_RESTORE_FILES.HTML.

There is an ongoing discussion in this topic where you can ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion. To avoid unnecessary confusion, this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users