.id-<random hexadecimal characters>.[email@example.com].block is used by Unlock92 Ransomware
. Also see these topis.
Unfortunately, there is no known method
at this time to decrypt files encrypted by the .CCCRRRPPP
variants of Unlock92 Ransomware without paying the ransom since the criminals switched its encryption algorithm to RSA-2048 as explained in The Week in Ransomware - July 15 2016 news article
. If possible, your best option is to restore from backups
, try file recovery software
or backup/save your encrypted data as is
and wait for a possible solution at a later time.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
When or if a decryption solution is found, that information will be provided in the above support topic and you will receive notification if subscribed to it. In addition, a news article most likely will be posted on the BleepingComputer front page
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
The BC Staff