Decrypt Files Encrypted by CryptConsole Virus - How to, Technology and PC Security Forum |

Decrypt Files Encrypted by CryptConsole Virus

This article will help you decrypt files that have been encrypted by the CryptConsole ransomware with either the or added to their names.

“How decrypt files.hta” is the ransom note being used by the CryptConsole ransomware which has been discovered and researched by malware analysts at Bleeping Computer. This particular ransomware virus is from the file encryption kind, being it locks the files on the compromised computers until the victim actually pays the sum of 0.25 BTC to get the encrypted files back. Fortunately there is a decryption available for this ransomware virus for free. If you want to learn more about it or if you have been infected by the CryptConsole ransomware, we advise you to read the following material. It will help you decrypt your files and remove CryptConsole from your computer.

CryptConsole Ransomware – More Information

The CryptConsole ransomware may be spread via one or more methods with the primary method being e-mail spam. But this is not all, the malware may also be replicated via malicious URLs or even via Potentially Unwanted Applications (PUAs).

Once the user becomes infected either by a file or a web link, the virus begins modifying the computer to execute the encryption process uninterruptedly. The encrypted files after encryption may look like similar to the following:

After encryption, CryptConsole drops the following ransom note on the infected computer:

→ “Your files are encrypted!
Your personal ID
{personal ID}
Discovered a serious vulnerability in your network security.
No data was stolen and no one will be able to do it while they are encrypted.
For you we have automatic decryptor and instructions for remediation.
How to get the automatic decryptor:
1) Pay 0,25 BTC
Buy BTC on one of these sites:
bitcoin adress for pay:
Send 0,25 BTC
2) Send screenshot of payment to In the letter include your personal ID (look at the beginning of this document).
3) You will receive automatic decryptor and all files will be restored
* To be sure in getting the decryption, you can send one file (less than 10MB) to In the letter include your personal ID (look at the beginning of this document). But this action will increase the cost of the automatic decryptor on 0,25 btc…
No Payment = No decryption
You really get the decryptor after payment
Do not attempt to remove the program or run the anti-virus tools
Attempts to self-decrypting files will result in the loss of your data
Decoders other users are not compatible with your data, because each user’s unique encryption key.”

Fortunately it is not necessary to pay the ransom, because malware researcher Demonslay335 at Bleeping Computer has developed a decrypter for this ransomware and we have the instructions on how to decode your files using it below.

But before decrypting your files, we advise removing this ransomware and backing up all your files.

CryptConsole Ransomware – Update May 2018

A newer variant of the CryptConsole ransomware has been spotted recently by malware analysts. That newer variant uses the following two new email addresses for contacting the cybercriminals:


Malware researchers have also posted a sample of the payload from the cryptovirus on the VirusTotal web service, displayed below:

The newer variant of CryptConsole might have changes, but it remains decryptable.

Removal Instructions for CryptConsole Ransomware


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share