Not the most pleasant event when you see on the monitor the inscription "attention all important files on all disks were encrypted with crypted000007". All victims are interested in what to do if all files are encrypted by CryptXXX trojan and file extension became crypted000007? Antivirus labs identify the file as Trojan.Encoder.20, others as Trojan.Encoder.858. This Trojan is also known as Shade and XTBL. When trying to analyze the files, it was found out that this is GPG encryption.

The file is distributed under the guise of contracts, invoices, inspections, accounting audits - in general, it is aimed at companies that, unlike individuals have money.

What files are encrypted

The Trojan encrypts absolutely all files (of any extensions / formats), turning them into crypted000007, crypted0000078 or .no_more_ransom leaving on the desktop and system drive a bunch of README files, where in English and Russian they are asked to contact them by email addresses:

  • And others

Their email is constantly changing. Next, you will be asked to pay a ransom and receive a program to decrypt files. Do not encourage cybercriminals and do not pay ransoms, by the way, criminals extort quite a lot of royalties in Bitcoins, depending on your country of residence!

Do not pay decryption companies, they are only intermediaries, they buy the key from hackers and sell it to you, but at a higher price. Immediately remembered

“You don't know Panikovsky. Panikovsky will sell you all, buy you and sell you again, but at a higher price.”

How to decrypt files?

Do not waste time recovering files, as practice has shown, using Qphotorec, Data Recovery Pro does not positive results, as well as trying restore files through shadow copies Perhaps a virus removes them.

Make backup copies of the encrypted files and use the following decryptors taken from the nomoreransom website:

Try to back up your data in the future. If you are unable to decrypt files with these decryptors, send them to anti-virus laboratories according to our instructions.

The deplorable result is this: a licensed antivirus will not save you from "serious boys", make backups, work under limited rights. You need a very good data recovery specialist or computer security specialist who knows encryption algorithms well. I'm afraid in both cases, such services can be very expensive, at least $ 300.

A CRYPT file (full Whatsapp Encrypted Database File) can only be generated on the Android platform and is an encoded database (DB). Such a file is created by the universal mobile application WhatsApp Messenger.

Essentially, a CRYPT file contains text messages encrypted using 256-bit AES. Files with the CRYPT extension are stored in internal memory or at external SD card mobile android devices(depending on user settings).

AT latest versions Android, instead of the CRYPT extension, CRYPT12 is used, which is a prefix to the familiar database extension (). The file will end up with the name name.db.crypt12 (may be represented in combination with a date).

To relay database formats (CRYPT12->CRYPT) on your mobile device you can use software module omnicrypt.

To view the chronology of user message histories, you need to find and activate the encryption key in the com.whatsapp/files/key directory for CRYPT file 12.

Programs to open CRYPT files

To decrypt and open a CRYPT file, most users successfully use the following software plugins:

These applications will decode the CRYPT file and allow you to open the history of user messages for viewing and editing.

Converting CRYPT to other formats

The most common way to convert an encrypted CRYPT database file is to translate the data into the CRYPT12 format. The Omni-crypt mobile app can be used for this. Reverse relaying of data (CRYPT12->CRYPT) is also widely used with the help of the same program.

Why exactly CRYPT and what are its advantages?

The scope of the file with the CRYPT extension is not so wide. However, without this format imagine the seamless and rapid exchange of user messages based on mobile application whatsapp messenger, almost impossible.

If a text message appears on your computer that says that your files are encrypted, then do not rush to panic. What are the symptoms of file encryption? The usual extension changes to *.vault, *.xtbl, * [email protected] _XO101 etc. Files cannot be opened - a key is required, which can be purchased by sending a letter to the address indicated in the message.

Where did you get the encrypted files from?

The computer picked up a virus that blocked access to information. Often antiviruses skip them, because this program is usually based on some harmless free utility encryption. You will remove the virus itself quickly enough, but serious problems may arise with the decryption of information.

Technical support of Kaspersky Lab, Dr.Web and other well-known companies involved in the development of anti-virus software, in response to user requests to decrypt data, tells what to do for acceptable time impossible. There are several programs that can pick up the code, but they can only work with previously studied viruses. If you are faced with a new modification, then the chances of restoring access to information are extremely small.

How does a ransomware virus get on a computer?

In 90% of cases, users themselves activate the virus on the computer by opening unknown emails. After that, an e-mail message arrives with a provocative subject - “Summon to Court”, “Loan Debt”, “Notice from the Tax Inspectorate”, etc. There is an attachment inside the fake email, after downloading which the ransomware enters the computer and begins to gradually block access to files.

Encryption does not happen instantly, so users have time to remove the virus before all information is encrypted. Destroy malicious script you can use Dr.Web CureIt cleaning utilities, Kaspersky Internet Security and Malwarebytes Antimalware.

Ways to recover files

If system protection was enabled on the computer, then even after the action of the ransomware virus, there are chances to restore files to a normal state using shadow copies of files. Ransomware usually tries to remove them, but sometimes they fail to do so due to lack of administrator privileges.

Restoring a previous version:

To keep previous versions, system protection must be enabled.

Important: system protection must be enabled before the ransomware appears, after that it will no longer help.

  1. Open the "Computer" properties.
  2. Select "System Protection" from the menu on the left.
  3. Highlight drive C and click "Configure".
  4. Select restore settings and previous versions files. Apply the changes by clicking OK.

If you took these measures before the appearance of a virus that encrypts files, then after cleaning your computer from malicious code you will have a good chance of recovering the information.

Using special utilities

Kaspersky Lab has prepared several utilities to help you open encrypted files after the virus has been removed. The first decryptor worth trying is Kaspersky RectorDecryptor.

  1. Download the application from the official website of Kaspersky Lab.
  2. Then run the utility and click "Start Scan". Specify the path to any encrypted file.

If a malware did not change the extension of the files, then for decryption you need to collect them in a separate folder. If the utility is RectorDecryptor, download two more programs from the official Kaspersky website - XoristDecryptor and RakhniDecryptor.

The latest utility from Kaspersky Lab is called Ransomware Decryptor. It helps to decrypt files after the CoinVault virus, which is not yet very common in RuNet, but may soon replace other Trojans.

About a week or two ago, another piece of work by modern virus makers appeared on the network, which encrypts all user files. Once again, I will consider the question of how to cure a computer after a crypted000007 ransomware virus and restore encrypted files. In this case, nothing new and unique has appeared, just a modification of the previous version

Description of the ransomware virus CRYPTED000007

The CRYPTED000007 encryptor does not fundamentally differ from its predecessors. It works almost one to one like no_more_ransom. But still there are a few nuances that distinguish it. I'll tell you about everything in order.

He comes, like his counterparts, by mail. Techniques are used social engineering so that the user is sure to be interested in the letter and open it. In my case, the letter was about some kind of court and about important information on the case in the attachment. After launching the attachment, the user opens a Word document with an extract from the Moscow Arbitration Court.

In parallel with the opening of the document, file encryption starts. Starts to constantly pop up an informational message from the Windows User Account Control system.

If you agree with the proposal, then backup copies of files in the shadow copies of Windows will be deleted and the recovery of information will be very difficult. Obviously, it is impossible to agree with the proposal in any case. In this ransomware, these requests pop up constantly, one by one, and do not stop, forcing the user to agree and delete the backups. This is the main difference from previous ransomware modifications. I have never seen shadow copy deletion requests going non-stop.

Usually, after 5-10 sentences, they stopped.
I'll give you a recommendation for the future. Very often, people turn off warnings from the user account control system. You don't need to do this. This mechanism can really help in resisting viruses. The second obvious advice - do not work constantly under account computer administrator, if this is not objectively necessary. In this case, the virus will not have the opportunity to do much harm. You will be more likely to resist him.

But even if you answered negatively to ransomware requests all the time, all your data is already encrypted. After the encryption process is completed, you will see a picture on your desktop.

At the same time, there will be many text files on the desktop with the same content.

Your files have been encrypted. To decrypt ux, you need to correct the code: 329D54752553ED978F94|0 to the email address [email protected]. Then you will get all the necessary instructions. Attempts to decipher it yourself will not lead to anything, except for the irretrievable number of information. If you still want to try, then make backup copies of the files beforehand, otherwise, in cases of ux changes, decryption will not be possible under any circumstances. If you have not received a response to the above address within 48 hours (and only in this case!), please use the feedback form. This can be done in two ways: 1) Download and install Tor Browser at the link: https://www.torproject.org/download/download-easy.html.en Enter the address: http://cryptsen7fo43rr6.onion/ in the address box of Tor Browser and press Enter. The page with the contact form is loaded. 2) In any browser, go to one of the addresses: http://cryptsen7fo43rr6.onion.to/ http://cryptsen7fo43rr6.onion.cab/ All the important files on your computer were encrypted. To decrypt the files you should send the following code: 329D54752553ED978F94|0 to e-mail address [email protected]. Then you will receive all necessary instructions. All the attempts of decryption by yourself will result only in irrevocable loss of your data. If you still want to try to decrypt them by yourself please make a backup at first because the decryption will become impossible in case of any changes inside the files. If you did not receive the answer from the aforecited email for more than 48 hours (and only in this case!), use the feedback form. You can do it by two ways: 1) Download Tor Browser from here: https://www.torproject.org/download/download-easy.html.en Install it and type the following address into the address bar: http://cryptsen7fo43rr6 .onion/ Press Enter and then the page with feedback form will be loaded. 2) Go to the one of the following addresses in any browser: http://cryptsen7fo43rr6.onion.to/ http://cryptsen7fo43rr6.onion.cab/

Postal address may change. I've seen other addresses like this:

Addresses are constantly updated, so they can be completely different.

As soon as you find that the files are encrypted, immediately turn off the computer. This must be done to abort the encryption process as per local computer, and on network drives. A ransomware virus can encrypt all information it can reach, including on network drives. But if there is a large amount of information, then it will take him a considerable amount of time. Sometimes, even in a couple of hours, the encryptor did not have time to encrypt everything on network drive about 100 gigabytes in size.

Next, you need to think carefully about how to act. If you by all means need information on your computer and you do not have backup copies, then it is better to contact specialists at this moment. Not necessarily for money in some firms. You just need a person who is well versed in information systems. It is necessary to assess the scale of the disaster, remove the virus, collect all available information on the situation in order to understand how to proceed.

Incorrect actions at this stage can significantly complicate the process of decrypting or recovering files. At worst, they can make it impossible. So take your time, be careful and consistent.

How the CRYPTED000007 ransomware virus encrypts files

After the virus has been launched and finished its activity, all useful files will be encrypted, renamed from extension.crypted000007. And not only the file extension will be replaced, but also the file name, so you won't know exactly what kind of files you had if you don't remember. There will be something like this picture.


In such a situation, it will be difficult to assess the scale of the tragedy, since you will not be able to fully remember what you had in different folders. This was done on purpose to confuse a person and encourage them to pay for decrypting files.

And if you were encrypted and network folders and no full backups, then it can generally stop the work of the entire organization. You will not immediately understand what is ultimately lost in order to begin recovery.

How to treat your computer and remove the CRYPTED000007 ransomware

The CRYPTED000007 virus is already on your computer. The first and most important question is how to cure a computer and how to remove a virus from it in order to prevent further encryption if it has not yet been completed. I immediately draw your attention to the fact that after you yourself begin to perform some actions with your computer, the chances of decrypting the data decrease. If you need to recover files by all means, do not touch your computer, but immediately contact professionals. Below I will talk about them and give a link to the site and describe the scheme of their work.

In the meantime, we will continue to independently treat the computer and remove the virus. Traditionally, ransomware is easily removed from the computer, since the virus does not have the task of remaining on the computer at all costs. After fully encrypting the files, it is even more profitable for him to delete himself and disappear, so that it would be more difficult to investigate the incident and decrypt the files.

Describing the manual removal of a virus is difficult, although I tried to do it before, but I see that most of the time it is pointless. File names and virus placement paths are constantly changing. What I saw is no longer relevant in a week or two. Usually, viruses are sent by mail in waves, and each time there is a new modification that has not yet been detected by antiviruses. Universal tools that check autorun and detect suspicious activity in system folders help.

To remove the CRYPTED000007 virus, you can use the following programs:

  1. Kaspersky Virus Removal Tool - a utility from Kaspersky http://www.kaspersky.ru/antivirus-removal-tool .
  2. Dr.Web CureIt! - a similar product from other web http://free.drweb.ru/cureit.
  3. If the first two utilities don't help, try MALWAREBYTES 3.0 - https://ru.malwarebytes.com .

Most likely, one of these products will clear the computer of the CRYPTED000007 ransomware. If it suddenly happens that they do not help, try removing the virus manually. I gave the removal technique using the example of the da Vinci and spora virus, you can see it there. In a nutshell, here's what you need to do:

  1. We look at the list of processes, having previously added several additional columns to the task manager.
  2. We find the process of the virus, open the folder in which it sits and delete it.
  3. We clean the mention of the virus process by the file name in the registry.
  4. We reboot and make sure that the CRYPTED000007 virus is not in the list of running processes.

Where to download the decryptor CRYPTED000007

The question of a simple and reliable decryptor arises first of all when it comes to a ransomware virus. The first thing I advise is to use the https://www.nomoreransom.org service. What if you are lucky, they will have a decryptor for your version of the CRYPTED000007 encryptor. I will say right away that you do not have many chances, but the attempt is not torture. On the home page click Yes:

Then upload a couple of encrypted files and click Go! find out:

At the time of writing, the decoder was not on the site.

Perhaps you will have more luck. You can also see the list of decryptors for download on a separate page - https://www.nomoreransom.org/decryption-tools.html . Maybe there is something useful there. When the virus is very fresh, there is little chance of this, but over time, something may appear. There are examples when decryptors for some modifications of ransomware appeared on the network. And these examples are on the specified page.

Where else can I find a decoder, I do not know. It is unlikely that it will actually exist, taking into account the peculiarities of the work of modern cryptographers. Only the authors of the virus can have a full-fledged decoder.

How to decrypt and recover files after CRYPTED000007 virus

What to do when the CRYPTED000007 virus has encrypted your files? The technical implementation of encryption does not allow decrypting files without a key or decryptor, which only the author of the encryptor has. Maybe there is some other way to get it, but I do not have such information. We can only try to recover files using improvised methods. These include:

  • Tool shadow copies windows.
  • Programs for recovering deleted data

First, let's check if we have shadow copies enabled. This tool works by default in windows 7 and higher unless you disable it manually. To check, open the properties of the computer and go to the system protection section.

If you did not confirm at the time of infection UAC request to delete files in shadow copies, then some data should remain there. I talked about this request in more detail at the beginning of the story, when I talked about the work of the virus.

To easily restore files from shadow copies, I suggest using free program for this - ShadowExplorer . Download the archive, unpack the program and run.

The last copy of the files and the root of the C drive will open. In the left upper corner you can choose a backup if you have more than one. Check different copies for desired files. Compare by dates where more fresh version. In my example below, I found 2 files on my desktop that were three months old when they were last edited.

I was able to recover these files. To do this, I chose them, clicked right click mouse, selected Export and indicated the folder where to restore them.

You can restore folders immediately in the same way. If shadow copies worked for you and you did not delete them, you have quite a lot of chances to recover all or almost all files encrypted by the virus. Perhaps some of them will be more old version than I would like, but nevertheless, it is better than nothing.

If for some reason you do not have shadow copies of files, the only chance to get at least something from encrypted files is to restore them using recovery tools deleted files. To do this, I suggest using the free Photorec program.

Run the program and select the disk on which you will recover files. Launching the graphical version of the program executes the file qphotorec_win.exe. You must select the folder where the found files will be placed. It is better if this folder is not located on the same drive where we are searching. Connect a flash drive or external HDD for this.

The search process will take a long time. At the end you will see statistics. Now you can go to the previously specified folder and see what is found there. There will most likely be a lot of files and most of them will either be damaged, or they will be some kind of system and useless files. But nevertheless, in this list it will be possible to find a part useful files. There are no guarantees here, what you find is what you will find. Best of all, usually, images are restored.

If the result does not satisfy you, then there are still programs for recovering deleted files. Below is a list of programs that I usually use when I need to restore maximum amount files:

  • R.saver
  • Starus File Recovery
  • JPEG Recovery Pro
  • Active File Recovery Professional

These programs are not free, so I will not provide links. With a strong desire, you can find them yourself on the Internet.

The entire file recovery process is shown in detail in the video at the very end of the article.

Kaspersky, eset nod32 and others in the fight against Filecoder.ED ransomware

Popular antiviruses define the CRYPTED000007 ransomware as Filecoder.ED and then there may be some other designation. I went through the forums of the main antiviruses and did not see anything useful there. Unfortunately, as usual, antiviruses were not ready for the invasion of a new wave of ransomware. Here is a message from the Kaspersky forum.

Here is the result of a detailed discussion of the CRYPTED000007 ransomware on the Eset nod32 antivirus forum. There are already a lot of requests, but the antivirus can do nothing.

Antiviruses traditionally skip new modifications of ransomware trojans. However, I recommend using them. If you are lucky and you receive a ransomware in your mail not in the first wave of infections, but a little later, there is a chance that the antivirus will help you. They all work one step behind the attackers. coming out a new version ransomware, antiviruses do not respond to it. As soon as a certain mass of material for research on a new virus accumulates, antiviruses release an update and begin to respond to it.

What prevents antiviruses from responding immediately to any encryption process in the system is not clear to me. Perhaps there is some technical nuance on this topic that does not allow you to adequately respond and prevent encryption of user files. It seems to me that it would be possible to at least display a warning about the fact that someone is encrypting your files, and offer to stop the process.

Methods of protection against the virus CRYPTED000007

How to protect yourself from the work of a ransomware and do without material and moral damage? There are some simple and effective tips:

  1. Backup! Backup copy all important data. And not just a backup, but a backup to which there is no permanent access. Otherwise, the virus can infect both your documents and backups.
  2. Licensed antivirus. Although they do not give a 100% guarantee, they increase the chances of avoiding encryption. They are most often not ready for new versions of the ransomware, but after 3-4 days they begin to react. This increases your chances of avoiding infection if you are not included in the first wave of mailings of a new ransomware modification.
  3. Do not open suspicious attachments in mail. There is nothing to comment on here. All cryptographers known to me got to users through mail. And every time new tricks are invented to deceive the victim.
  4. Do not mindlessly open links sent to you by your friends via social networks or messengers. This is how viruses sometimes spread.
  5. Turn in windows display file extensions. How to do this is easy to find on the Internet. This will allow you to notice the file extension on the virus. Most often it will .exe, .vbs, .src. In everyday work with documents, you are unlikely to come across such file extensions.

I tried to supplement what I already wrote earlier in each article about the ransomware virus. Until then I say goodbye. I will be glad to receive useful comments on the article and the CRYPTED000007 encryption virus in general.

Video with decryption and file recovery

Here is an example of a previous modification of the virus, but the video is fully relevant for CRYPTED000007 as well.

.a1crypt- another encryptor from the family GlobeImposter, just like its predecessor. This virus modifies file extensions to *.a1crypt. Of course, after the full encryption of these files.

Encrypts about 40 file formats, including databases (including 1C, mySQL databases), documents, text files, spreadsheets, photos and videos.

It is actually impossible to decrypt it yourself, there is no decryptor at the moment (07/12/2017). In some cases, A1crypt also removes shadow copies of files.

There are several versions of this ransomware localized for a specific “market”: Russian, Ukrainian, English, Spanish.

A1crypt spreads through e-mail spam, as well as through hacking into an insecure RDP configuration.

Remove A1crypt ransomware with automatic cleaner

An extremely effective method of dealing with malware in general and ransomware in particular. The use of a proven security complex guarantees the thoroughness of the detection of any viral components, their complete removal with one click. Please note that we are talking about two different processes: uninstalling the infection and restoring files on your PC. However, the threat certainly needs to be removed, as there is information about the introduction of other computer Trojans with its help.

  1. . After launching the software, click the button Start Computer Scan(Start scan). .
  2. The installed software will provide a report on threats detected during the scan. To remove all found threats, select the option Fix Threats(Remove threats). The malware in question will be completely removed.

Restore access to encrypted files

As noted, the no_more_ransom ransomware locks files using a strong encryption algorithm so that the encrypted data cannot be restored with a wave of a magic wand - if you do not take into account the payment of an unheard-of ransom. But some methods can really become a lifesaver that will help you recover important data. Below you can familiarize yourself with them.

Program automatic recovery files (decoder)

A very unusual circumstance is known. This infection destroys source files in unencrypted form. The extortionate encryption process thus targets copies of them. This provides an opportunity for such software tools how to restore deleted objects, even if the reliability of their removal is guaranteed. It is strongly recommended to resort to the file recovery procedure, its effectiveness is beyond doubt.

Volume Shadow Copies

The approach is based on the Windows procedure Reserve copy files, which is repeated in every restore point. An important working condition this method: System Restore must be activated prior to infection. However, any changes made to the file after the restore point will not be reflected in the restored version of the file.

Backup

This is the best among all non-buyout methods. If the procedure for backing up data to an external server was used before the ransomware attacked your computer, to restore encrypted files, you simply need to enter the appropriate interface, select the necessary files and start the data recovery mechanism from the backup. Before performing the operation, you need to make sure that the ransomware is completely removed.

Check for possible residual components of the A1crypt ransomware

Cleaning in manual mode is fraught with missing pieces of ransomware that can avoid removal in the form of stealthy objects operating system or registry entries. To eliminate the risk of partial preservation of individual malicious elements, scan your computer using a reliable security software package specializing in malware.