Decrypt Files Encrypted by CryptConsole Virus - How to, Technology and PC Security Forum |

Decrypt [email protected] Files Encrypted by CryptConsole Virus

This article will help you decrypt files that have been encrypted by the CryptConsole ransomware with either the [email protected] or [email protected] added to their names.

“How decrypt files.hta” is the ransom note being used by the CryptConsole ransomware which has been discovered and researched by malware analysts at Bleeping Computer. This particular ransomware virus is from the file encryption kind, being it locks the files on the compromised computers until the victim actually pays the sum of 0.25 BTC to get the encrypted files back. Fortunately there is a decryption available for this ransomware virus for free. If you want to learn more about it or if you have been infected by the CryptConsole ransomware, we advise you to read the following material. It will help you decrypt your files and remove CryptConsole from your computer.

CryptConsole Ransomware – More Information

The CryptConsole ransomware may be spread via one or more methods with the primary method being e-mail spam. But this is not all, the malware may also be replicated via malicious URLs or even via Potentially Unwanted Applications (PUAs).

Once the user becomes infected either by a file or a web link, the virus begins modifying the computer to execute the encryption process uninterruptedly. The encrypted files after encryption may look like similar to the following:

After encryption, CryptConsole drops the following ransom note on the infected computer:

→ “Your files are encrypted!
Your personal ID
{personal ID}
Discovered a serious vulnerability in your network security.
No data was stolen and no one will be able to do it while they are encrypted.
For you we have automatic decryptor and instructions for remediation.
How to get the automatic decryptor:
1) Pay 0,25 BTC
Buy BTC on one of these sites:
bitcoin adress for pay:
Send 0,25 BTC
2) Send screenshot of payment to [email protected] In the letter include your personal ID (look at the beginning of this document).
3) You will receive automatic decryptor and all files will be restored
* To be sure in getting the decryption, you can send one file (less than 10MB) to [email protected] In the letter include your personal ID (look at the beginning of this document). But this action will increase the cost of the automatic decryptor on 0,25 btc…
No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user’s unique encryption key.”

Fortunately it is not necessary to pay the ransom, because malware researcher Demonslay335 at Bleeping Computer has developed a decrypter for this ransomware and we have the instructions on how to decode your files using it below.

But before decrypting your files, we advise removing this ransomware and backing up all your files.

Removal Instructions for CryptConsole Ransomware

Manually delete CryptConsole from your computer

Note! Substantial notification about the CryptConsole threat: Manual removal of CryptConsole requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove CryptConsole files and objects
2.Find malicious files created by CryptConsole on your PC

Automatically remove CryptConsole by downloading an advanced anti-malware program

1. Remove CryptConsole with SpyHunter Anti-Malware Tool and back up your data

Decryption Instructions for CryptConsole Ransomware

In order to decrypt your files, first you should download the decrypter for CryptConsole:


After saving, the decrypter, disable your antivirus, so It won’t block it. Then copy the decrypter somewhere where it can be easily found. The password in the archive is – false-positive.

After extracting the decrypter, start it and click on the “Select Directory” button after which navigate to a directory you wish to decrypt. Then simply decode the files in the directory by clicking on the “Decrypt” button:

Source:Bleeping Computer

Proceed this activity with the other directories as well for their decryption.

The Bottom Line

As a conclusion, anyone infected by this virus should consider themselves In a lucky situation. Most ransomware viruses out there are not decryptable, especially the big ones. This is why we advise you to read the following material and learn how to stop ransomware before it even infects your computer:

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.