What is Crypt0L0cker
Crypt0L0cker is newer version of TorrentLocker ransomware, that appeared earlier. It encrypts all files except .html, .inf, .manifest, .chm, .ini, .tmp, .log, .url, .lnk, .cmd, .bat, .scr, .msi, .sys, .dll, .exe, .avi, .wav, .mp3, .gif, .ico, .png, .bmp and .txt that are necessary for proper Windows operation. All files get .encrypted extension and become inaccessible. The ransom amount is 2.2 Bitcoin. Crypt0l0cker creates DECRYPT_INSTRUCTIONS.html and DECRYPT_INSTRUCTIONS.txt files with instructions to pay the ransom and receive decryptor. This ransomware is international and aims following countries: Australia, Austria, Canada, Czech Republic, Ireland, Italy, France, Germany, Korea, Netherlands, New Zealand, Spain, Thailand, Turkey, and United Kingdom. Here is complete guide to remove Crypt0L0cker and tips to decrypt .encrypted files.
How Crypt0L0cker infected your PC
Crypt0L0cker infiltrates computers using fake phishing e-mails from post service. To make it look more “real” hackers send e-mails from Royal Mail in United Kingdom or Australia Post in Australia. Those e-mails contain malicious attachments with archived documents. This documents have built-in macros, that will download core executable file of the virus. Hackers use TOR network and Bitcoin payments to prevent possibility of tracking and anonymity. In order to prevent infection with this type of threats we recommend you to use SpyHunter 5 and HitmanPro with Cryptoguard.
Download Crypt0L0cker Removal Tool
To remove Crypt0L0cker completely we recommend you to use SpyHunter 5 from EnigmaSoft Limited. It detects and removes all files, folders and registry keys of Crypt0L0cker.
As a good free alternative to remove Crypt0L0cker use Malwarebytes Anti-Malware. It will detect core files and processes of Crypt0L0cker ransomware and eliminate them to allow you start decryption of your files.
How to remove Crypt0L0cker manually
It is not recommended to remove Crypt0L0cker manually, for safer solution use Removal Tools instead.
Crypt0L0cker registry keys:
How to decrypt and restore .encrypted files
Use automated decryptors
Ransomware decryptor from Kaspersky may be useful in this case. It is free and easy to use. Download Kaspersky Ransomware Decryptor here:
There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
If you are infected with Crypt0L0cker ransomware and removed it from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there are no other dates in the list, choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses like Crypt0L0cker in future
Use Malwarebytes Anti-Ransomware Beta
Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.
Use HitmanPro.Alert with CryptoGuard
Dutch vendor of legendary cloud-based scanner HitmanPro – Surfright released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.