.Do_not_change_the_file_name.cryp File Virus (Restore Files) - How to, Technology and PC Security Forum | SensorsTechForum.com

.Do_not_change_the_file_name.cryp File Virus (Restore Files)

Article created to help you remove the Robert Swat ransomware virus and extension and to restore Do_not_change_the_file_name.cryp files encrypted by it.

A very odd virus has appeared in the wild. The malware is from the file encryption kind and uses the e-mail [email protected] for contant. What is odd about it is that the virus threatens to break the encrypted files on the computers it has infected if the user tries to modify them in any way, like changing their names. In addition to this, the ransomware also demands victims to pay a hefty ransom fee of 400$ in it’s “how_to_decode_files!!!.txt” ransom note to get access to the files that are encoded and no longer openable. In case your system has been infected by the .Do_not_change_the_file_name.cryp ransomware, we advise reading the following article to understand what is the situation and how to react.

UPDATE! A decrypter has been released for the Do Not Change ransomware by researcher demonslay335. Download link can be found on the highlighted text below:
Do Not Change Name Decrypter

Threat Summary


.Do_not_change_the_file_name.cryp Virus

Short DescriptionThe malware encrypts users files using a strong encryption algorithm, making direct decryption possible only via a unique decryption key available to the cyber-criminals for the price of $400.
SymptomsThe user may witness ransom notes and “how_to_decode_files!!!.txt” “instructions” linking to an e-mail address where further instructions are sent. Changed file names and the file-extension .Do_not_change_the_file_name.cryp has been used.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .Do_not_change_the_file_name.cryp Virus


Malware Removal Tool

User ExperienceJoin our forum to Discuss .Do_not_change_the_file_name.cryp Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

.Do_not_change_the_file_name.cryp – How Does It Distribute

To spread, the Robert Swat virus may utilize different techniques. One of those techniques is to spam fake messages via e-mail, that may contain different file types embedded within them as attachments. The messages may be deceptive and aim to lure potential victims into opening the attachments, similar to the example image below:

Besides this technique for spreading, the .Do_not_change_the_file_name.cryp file ransomware, may also take advantage of several other methods such as embedding malicious scripts in spammed web links all over the web and also have loaders posing as game patches, cracks and updates.

.Do_not_change_the_file_name.cryp Virus – Activity

For the activity of this infection, it uses multiple distribution sites, to which it’s loader may connect after already infecting your computer. Then, the loader may drop multiple different types of files. These very files may have the same names as processes that are completely legitimate or completely random names. They may be located in the usually targeted Windows folders, for example:

After the malicious files of this virus are dropped on the computer of the user, they may exhibit different activity on the computer of the user. One of the actions that may be performed by the .Do_not_change_the_file_name.cryp threat is to force delete the shadow volume copies of the encrypted computer. This is usually achievable by executing the vssadmin and bcedit commands in Windows Command Prompt in the background, without the user noticing it is happening:

In addition to this activity, the ransomware infection may also modify the Windows Registry Editor by adding malicious value strings in the Run or RunOnce sub-keys which run it’s malicious executables automatically:

.Do_not_change_the_file_name.cryp Files And Their Encryption

Regarding the encryption process of this ransomware infection, one or more encryption modes may be used. Among the suspected encryption algorithms may be among the following:

  • RSA(Rivest-Shamir-Adleman).
  • SHA(Secure Hash Algorithm).
  • AES(Advanced Encryption Standard).
  • ECDH(Elliptic Curve Diffie–Hellman).
  • Other less sophisticated ciphers.

In addition to those ciphers an encryption mode known as RC4 may or may not be employed. For the process, the .Do_not_change_the_file_name.cryp virus targets specific files to encode. Among those files may be the following file types:


The encryption process consists of replacing portons data from the original files with data from the cipher being used. After encryption, the files may appear like the following:

The encrypted files may also be encoded with a mode that is set to break them when they are modified, for example with changed filenames. The other scenario is if the cyber-criminals are just claiming this in the ransom note as a scare tactic, not to try and decrypt the encoded files. The ransom note opened after the encryption process has finished is called how_to_decode_files!!!.txt and has the following content:

ATTENTION!!! Changing the file name makes the restore process impossible!
Your data is encrypted.
To receive a program of decoding, You need to pay ~ $ 400 and
You need to send the personal code:
To the email address [email protected]
Then you will receive all the necessary instructions.
Attempts to decipher independently will not lead to anything, except irretrievable
loss of information.
We respond to all emails, if there is no answer within 10 hours, duplicate your
letter other email services.
Thank you for your attention and have a good day.
ATTENTION!!! Changing the file name makes the restore process impossible!
******************************************************************************* Source:Pastebin

Remove .Do_not_change_the_file_name.cryp Virus and Try To Recover Encrypted Files

Before removing malicious files belonging to this ransomware infection, recommendations are to focus on backing up the encrypted files first, just in case. For the removal process of this ransomware, we advise using the removal instructions in the end of this article. In case you are having difficulties in manually removing files encrypted by this virus, experts advise using an advanced anti-malware program which will take care of the removal process for you automatically and ensure future protection as well.

After having successfully removed this ransomware infection, reccomendations are to focus on restoring files encrypted by it using multiple alternative methods, like the ones we have suggested below in step “2. Restore files encrypted by .Do_not_change_the_file_name.cryp Virus”. These methods are not 100 percent guaranteed to work but they may be of use for restoring at least some of the encoded files.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share