The newest variant of Crypt0L0cker
appends a random 6
lower alphabetic character extension (i.e. ,pzekaq, .ixopyw, .izozyn) and leave files (ransom notes) named COMO_RESTAURAR_ARCHIVOS.txt, COMO_RESTAURAR_ARCHIVOS.html, HOW_TO_RESTORE_FILES.HTML as noted here
and The Week in Ransomware
Unfortunately, there is no free solution for decrypting your files. Many victims have reported that Dr.Web
was able to assist them with decrypting files...see here
Policy from Dr.Web (11/25/15): Free file decryption assistance only for PCs protected by Dr.Web at the moment of infection
If you're not a licensed user for a Dr.Web product you will have to pay for their services (Rescue Pack). Fees may vary depending on the infection and amount of data to be decrypted.
A previous victim (BetaX) posted instructions for using Dr Web's Rescue Pack in Post #261
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
The BC Staff