Virus Remove and Restore .crypt Files - How to, Technology and PC Security Forum |

[email protected] Virus Remove and Restore .crypt Files

ransomware-on-focus-sensorstechforumA ransomware virus belonging to the ransomware variants has been reported to encrypt user files using a strong encryption algorithm. After encryption, the Masterlock virus leaves a .crypt file extension along with a unique identification number. All users infected by this ransomware should not pay the 3 BTC ransom price asked by the cyber criminals and read this article to learn how to remove the Masterlock virus and restore your encrypted files.

Threat Summary

Name[email protected]
Short DescriptionThe ransomware encrypts files with the AES algorithm and asks a ransom of 3 BTC for decryption.
SymptomsFiles are encrypted with a .crypt file extension added to them and become inaccessible. A ransom note with instructions for paying the ransom shows as a wallpaper file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by [email protected]


Malware Removal Tool

User ExperienceJoin our forum to Discuss Masterlock Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[email protected] Virus – How Does It Spread

To be replicated and infect the maximum amount of users this ransomware may use the same method used by it to communicate with it’s victims – e-mail. The virus may replicate via numerous fake e-mail messages aiming primarily to resemble legitimate services such as PayPal or others. To those e-mails may be attached the malicious payload carrying a file of Masterlock ransomware that may be other malware, an exploit kit or a javascript. In addition to that, Masterlock may also spread via several other methods such as malicious URLs posted online on social media or other websites, or even opened automatically on your browser as a result of having an ad-supported (PUP) application on your computer.

[email protected] Virus – More Information

When it is installed on your computer, the Masterlock ransomware may create one or more files in the typical important Windows directories:

  • %SystemDrive%
  • %AppData%
  • %Temp%
  • %Startup%
  • %Roaming%
  • %Local%

After creating it’s malicious payload, the virus may set the file(s) to run automatically on system startup by modifying the Run registry keys for Windows machines:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ RunServices

In those keys, a string value may be used that leads to the location of the files, for example:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run “{filename}= {location of the file/filename.exe(bat, dll, tmp, etc)}

After the malicious file which encrypts modules is ran, the Masterlock virus may begin to encipher files of the following file types:


Not only this, but the Masterlock ransomware may also change the wallpaper prompting users to contact it’s distinctive e-mail [email protected] When a user contacted the cyber-criminals, the response from them was the following:

→ “Hello, dear friend!
We are writing to inform you that our team of network security specialists has analyzed your system and has identified vulnerabilities in the protection.
We kindly draw your attention that defensive operation on your computer is not running properly, and now the whole database is at risk.
All your files are encrypted and can not be accepted back without our professional help.
Obviously, vulnerability analysis, troubleshooting, decoding the information and then ensuring safety are not a simple matter.
And so our high-grade and quick service is not free.
Please note that today the price of your files recovery is 3 Bitcoins, but next day it will cost 5 Bitcoins.
You should buy bitcoins here
Read the paragraphs:
1. How to buy Bitcoins?
2. How do I send Bitcoins and how can I pay with Bitcoins after buying them?
The Bitcoin wallet for payment is 12yDGpp82ejLqT6GbE4qAPtCYAKRpksbWd
After the transfer of bitcoins, please send an email with a screenshot of the payment page.
We do not advise you to lose time because the price will increase with each passing day.
As proof of our desire and readiness to help you, we can decipher a few of your files for the test.
To check this you can upload any one encrypted file on web site, size no more than 10 MB (only one text file or a photo) and send us a download link.
Certainly, after payment we guarantee prompt solution of the problem, decrypt the database to return to its former condition and consultation how to secure the rules of the system safety.
Kind regards, Master Lock.”

After the files of the user have been locked, the virus also appends it’s own file name to them, that includes the .crypt file extension, for example:


Remove [email protected] Ransomware and Restore .crypt Files

To fully erase the Masterlock virus from your computer, it is strongly advisable to guide yourself by following the removal instructions after this article. In case you are not sure that you can remove the virus manually, malware researchers and reverse engineers always advise using an advanced anti-malware software that will perform this activity swiftly and automatically.

To restore files that have been encrypted by Masterlock ransomware, users have reported that Rannoh Decryptor by Kaspersky was able to restore some of their files. We advise downloading it from step “3.Restore files encrypted by [email protected]” below and attempting to decrypt your files only after removing the virus. In case this Kaspersky decrypter does not work for you, it is strongly advisable to attempt using the other file restoration alternatives in the step.

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share