“How decrypt files.hta” is the ransom note being used by the CryptConsole ransomware which has been discovered and researched by malware analysts at Bleeping Computer. This particular ransomware virus is from the file encryption kind, being it locks the files on the compromised computers until the victim actually pays the sum of 0.25 BTC to get the encrypted files back. Fortunately there is a decryption available for this ransomware virus for free. If you want to learn more about it or if you have been infected by the CryptConsole ransomware, we advise you to read the following material. It will help you decrypt your files and remove CryptConsole from your computer.
CryptConsole Ransomware – More Information
The CryptConsole ransomware may be spread via one or more methods with the primary method being e-mail spam. But this is not all, the malware may also be replicated via malicious URLs or even via Potentially Unwanted Applications (PUAs).
Once the user becomes infected either by a file or a web link, the virus begins modifying the computer to execute the encryption process uninterruptedly. The encrypted files after encryption may look like similar to the following:
After encryption, CryptConsole drops the following ransom note on the infected computer:
→ “Your files are encrypted!
Your personal ID
Discovered a serious vulnerability in your network security.
No data was stolen and no one will be able to do it while they are encrypted.
For you we have automatic decryptor and instructions for remediation.
How to get the automatic decryptor:
1) Pay 0,25 BTC
Buy BTC on one of these sites:
bitcoin adress for pay:
Send 0,25 BTC
2) Send screenshot of payment to [email protected] In the letter include your personal ID (look at the beginning of this document).
3) You will receive automatic decryptor and all files will be restored
* To be sure in getting the decryption, you can send one file (less than 10MB) to [email protected] In the letter include your personal ID (look at the beginning of this document). But this action will increase the cost of the automatic decryptor on 0,25 btc…
No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user’s unique encryption key.”
Fortunately it is not necessary to pay the ransom, because malware researcher Demonslay335 at Bleeping Computer has developed a decrypter for this ransomware and we have the instructions on how to decode your files using it below.
But before decrypting your files, we advise removing this ransomware and backing up all your files.
CryptConsole Ransomware – Update May 2018
A newer variant of the CryptConsole ransomware has been spotted recently by malware analysts. That newer variant uses the following two new email addresses for contacting the cybercriminals:
Malware researchers have also posted a sample of the payload from the cryptovirus on the VirusTotal web service, displayed below:
The newer variant of CryptConsole might have changes, but it remains decryptable.