Severity scale:  

NMCRYPT ransomware. How to remove? (Uninstall guide)

removal by Olivia Morelli - - | Type: Ransomware

NMCRYPT is a crypto-ransomware that demands to pay almost $7000 ransom in Bitcoins

NMCRYPT ransomware image

NMCRYPT is a dangerous crypto-ransomware virus[1] that is currently being distributed via unprotected Remote Desktop Services, malicious email attachments, and rogue software updates. Its developers exploit AES-256 and RSA-2048 encryption algorithms to take victim's files hostage. NMCRYPT ransomware is known for targeting video, audio, photos, text, database, spreadsheets, and presentations in particular. Encrypted files get .NMCRYPT suffix, which is why the virus is also dubbed as .NMCRYPT file extension virus. Upon successful unraveling, the victim is presented with a Recover your files.html ransom note, which demands to pay $6,705.02 ransom in Bitcoins asap.

Classification Ransomware
Danger level High. Locks personal files and corrupts system's settings. Free decryptor is not available.
Symptoms Personal files inaccessible. File extensions changed to .NMCRYPT. Each folder contains Recover your files.html file
Size of redemption $6705.02 in Bitcoins
Encryption applied AES-256 and RSA-2048
Automatic NMCRYPT removal available. Download Reimage and run a full system scan

NMCRYPT is the second ransomware virus after Vurten demanding a huge ransom in exchange for a decryptor. Typically, the size of the redemption ranges from $200 to $500, does not exceed $2000.[2] Thus, it seems that we're currently dealing with a real gold-digger.

NMCRYPT ransomware has been spotted on the wild in the middle of April 2018. Recognized as a Generic.Ransom.XRatLocker.5E892A47, Ransom.Haknata.S1240226, Ransom_AIRACROP.SM, Trojan.Win32.Deshacop.enxprt, and similar detections by reputable anti-virus engines, it seems to be targeting English-speaking in particular.

Ransomware researchers have currently analyzed the infection and disagree upon its origin. While some of them claim it to be derived from NMoreira ransomware, the others assert that it's yet another crypt-malware based on HiddenTear open source ransomware. Anyway, it's a fact that NMCRYPT virus encrypts files that can not currently be decrypted without paying the ransom.

Once installed, it opens Command Prompt under administrative privileges and runs a script to delete Volume Shadow Copies, which are created by Windows by default. Besides, it disables all previous Windows versions that have been created using Windows Recovery option. This way, hackers minimize the possibility to unlock files encrypted by NMCRYPT ransomware and maximize revenue.

Personal files are locked using AES-256 and RSA-2048 ciphers, which allow hackers to ensure strong-coded encryption. The combination of double-layered encryption makes it practically impossible to crack the code manually. Therefore, hackers ask for $6705.02 redemption to be transferred in Bitcoins using Tor browser and a Bitcoin wallet to get the unique identification numbers necessary for the decryption.

To prove credibility, cybercriminals ask the victim to select a couple of DOCS, XLS, XML or JPG files that do not exceed 2MB in size and send them to them via channel.

The victim can find the initial information on the Recover your files.html file, which appears by default on each folder and desktop. It contains the instructions on how to download Tor browser and several links redirecting to a Bitcoin purchase website. The text of the note says:

Encrypted files!
All your files are encrypted.Using AES256-bit encryption and RSA-2048-bit encryption.
Making it impossible to recover files without the correct private key.
If you are interested in getting is the key and recover your files
You should proceed with the following steps.
The only way to decrypt your files safely is to buy the Descrypt and Private Key software.
Any attempts to restore your files with the third-party software will be fatal for your files!
Important use Firefox or Chrome browser
To proceed with the purchase you must access one of the link below
If neither of the links is online for a long period of time, there is another way to open it, you should install the Tor Browser
If your personal page is not available for a long period there is another way to open your personal page – installation and use of Tor Browser, etc.

If your PC has been attacked by this virus, do not fall for paying the ransom not because it's excessive, but also there's no guarantee that hackers won't leave you without a key. The best way to deal with ransomware is to eliminate them and then try to recover data using third-party recovery tools. Therefore, we would strongly encourage you to remove NMCRYPT ransomware using Reimage, Malwarebytes or Plumbytes Anti-MalwareNorton Internet Security.

Don't worry if NMCRYPT removal is blocked by some ransomware components. To bypass the interrupter, you should restart the system to the safe environment and then launch the anti-virus. You can find a guide down below this post.

Hackers use multiple distribution channels to spread ransomware

Ransomware virus is a number one cyber threat of 2018. It does not reside this position for almost a decade and does not seem to shrink in the near future. The increasing number of attacks can be explained by a variety of intricate distribution strategies that hackers exploit. These are the main ransomware distribution channels distinguished by[3] currently in use:

  • Spam email attachments. DOC, DOCX, PDF, PNG, JPG formats. They usually mimic well-known companies or authorities like IRS, Amazon, eBay, etc. and talk over about relevant subjects, such as obligations, debts or parcels.
  • Exploit kits. Hackers use specific software pack to attack system's vulnerabilities. Exploited vulnerability then serves as a gateway to inject ransomware. Exploits might travel along software updates like Adobe or Flash.
  • Unprotected Remote Desktop services. Crooks often manage to reveal RDP passwords open to the Internet and, therefore, can easily enter the system using sysadmin privileges.
  • Fake software updates. Crooks might create a phony browser, Windows, Java, Flash Player or even browser's font updates, and display them on hacked websites. If unsuspecting netizen clicks on the Download button, he or she executes a ransomware payload.

Although there are many other ways that ransomware developers might exploit, the four mentioned above are most frequently used. Thus, be careful when browsing the Internet and make sure to keep a reputable anti-virus enabled.

A guide on how to remove NMCRYPT ransomware virus

Do not try to remove NMCRYPT manually because it's not possible. The malware runs multiple commands and scripts to alter core system's settings and root deeply to evade elimination. Besides, it installs a package of related files and keeps running malicious processes.

The only way to execute NMCRYPT removal is to download a professional anti-malware or update the one that is already running on the system. Then launch it let the scanner to do its job. In case the virus uses helper objects to block a security tool, follow the guide given below:

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software you agree to our privacy policy and agreement of use.
do it now!
Reimage (remover) Happiness
Reimage (remover) Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.

If you decided to select another anti-spyware, uninstall Reimage from your computer.
Press mentions on Reimage
Alternate Software
Alternate Software

To remove NMCRYPT virus, follow these steps:

Remove NMCRYPT using Safe Mode with Networking

To boot the system into Safe Mode with Networking, follow these instructions. After that, try to launch your anti-malware. Don't forget to update it in priority.

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove NMCRYPT

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete NMCRYPT removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove NMCRYPT using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of NMCRYPT. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that NMCRYPT removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove NMCRYPT from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

NMCRYPT virus is a hazardous cyber infection, which has been developed by skilled hackers. Nevertheless, there's a way for you to retrieve encrypted files using third-party software. Unfortunately, you will not be able to take advantage of Volume Shadow Copies or Previous Windows feature since the virus deletes them. 

If your files are encrypted by NMCRYPT, you can use several methods to restore them:

Download Data Recovery Pro

Data Recovery Pro is our top pic solution for data recovery after ransomware attack. This particular tool contains a powerful scan engine, which is capable of decrypting hard-coded files. 

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by NMCRYPT ransomware;
  • Restore them.

There's no NMCRYPT decryptor available

About the author

Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions


Removal guides in other languages