Unlock92 ransomware / virus (Removal Instructions) - Apr 2018 update

Unlock92 virus Removal Guide

What is Unlock92 ransomware virus?

Unlock92 – ransomware virus that encrypts files using RSA-2048 cipher and zips them into

Unlock92 ransom noteUnlock 92 - a virus which infiltrates the system via spam messages.

Unlock92 is a file-encrypting virus that applies RSA-2048[1] algorithm and appends .CRRRT, .blocked, .block, .CCCRRRPPP, .kukuracha or _<8-rand-chars>. extension. After the file encryption, the virus displays a ransom note which is written in the Russian language. The aim of such a message is to announce about corrupted files and demand a ransom to receive a decryption key for important data. Cybercriminals urge to contact them via unlock92@india.com email address and transfer money which usually needs to be in Bitcoin or another cryptocurrency. The original version of the Unlock92 ransomware was detected on June 2016; however, new versions keep emerging up to 2018. The latest virus version is called Unlock92 Zipper. This ransomware corrupts files by gathering them in a folder and zips them with a password. Additionally, it marks this folder by appending the .random.zip extension.

Summary
Name Unlock92
Type Ransomware
Release date June 2016, new versions such as Unlock 92 Zipper are spreading in 2018
Danger level High. Encrypts files and makes system changes
Appended file extensions Unlock92 can be recognized from the .CRRRT, .blocked, .block, .CCCRRRPPP, .kukuracha or _<8-rand-chars> extensions. The new version zips files into one folder and marks them with foldername.random.zip extension
Encryption algorithm RSA-2048
To uninstall Unlock92, install FortectIntego and run a full system scan

Previous, it was thought that Unlock92 virus is one of the versions of Kozy.Jozy ransomware. Just like any other ransomware, it mostly spreads via malicious spam emails as a useful attachment, such as “invoice”, “payment report” or similar. Soon after infiltration, the virus starts scanning the device for data to encrypt. The main files that the virus is trying to encrypt are the so-called working files, i.e., the ones that users frequently use, including .docx, .rar, .jpg or .xls.

As we have mentioned at the beginning, different versions of Unlock92 ransomware append different file extensions. However, the first and original variant adds .CRRRT suffix.

Unlock92 ransomware virus pictureUnlock 92 - ransomware which uses an RSA-2048 algorithm to encrypt files.

It seems that the virus is designed to hijack Russian operating systems or its developers are hailing from this country. The ransom note that the virus drops after encrypting the files is written in Russian[2] (it also shows up as a desktop picture), yet it is interesting that the address the criminals provide links to India.

Если вы хотите их восстановить то отправьте один из пострадавших файлов и файл Кеу.Ып (из любой папки с зашифрованными файлами) на е-mai1: UNLOCK92@INDIA.COM Если вы не получили ответа в течение суток то скачайте с сайта https://www.torproject[.]org/download/download-easy.html.en ТОВ браузер и зайдите с его помощью на сайт http://fnjmegsn7tbrrnkl.onion – там будет указан действующий почтовый ящик.

The victim is encouraged to contact the hackers via UNLOCK92(@)INDIA.COM or unlckr@protonmail.com to retrieve their files. To do that, the victim has to send a single encrypted document together with a key.bin file which can be found in every infected folder of the computer.

However, in July 2016, a free Unlock92 decrypter was released. Hence, there’s no need to pay the ransom and lose the money. Unfortunately, this software might not work with the latest variants of the cyber threat, but you should still not consider paying the ransom.

For further protection, you should consider restoring copies of important documents on an external device such as a USB drive or iCloud. Such remote servers keep your data safe and protected from various cybercriminals as the only one who has access to such files is you. Such action will let you prevent data corrupting in the future.

Unlock92 decrypter screenshotUnlock92 is a ransomware-type virus which demands a particular ransom if wanted to receive a decryption tool for corrupted data.

Before data recovery, you have to remove Unlock92 from the machine. For that, you need to obtain a reputable malware elimination software and run a full system scan with updated software. We suggest using FortectIntego which is capable not only cleaning the computer but fixing the damage done by malware too.

Of course, you can use SpyHunter 5Combo Cleaner, Malwarebytes or any other preferred anti-malware software for Unlock92 removal. We want to remind that security software does not decrypt files. It only deletes malicious components from the device. Detail removal and recovery solutions are presented at the end of the article.

Unlock92 ransomware exampleUnlock92 is ransomware that might be decrypter for free.

Variants of Unlock92 ransomware virus

Unlock92 2.0 ransomware virus. A new version was released in July 2016 and now appends .CCCRRRPPP file extension to the targeted data. Crypto-virus presents data recovery instructions in the ORIG.jpg file which is set as the infected computer's desktop background.

.blocked file extension virus. In August 2016, researchers reported another undecryptable variant of the virus. It uses RSA-2048 cryptography and appends .blocked file extension. Then malware drops a ransom note called “!!!!!!!!Как восстановить файлы!!!!!!!”

Unlock92 ransomware ransom notesUnlock92 file-encrypting virus had its latest version, the Unlock92 Zipper ransomware, released in July 2018.

Cyber criminals still talk with the victims in Russian language and ask to contact them. Victims are supposed to send an email to unlock92@india.com to learn how much they have to pay for data recovery procedure.

Kukuracha ransomware virus. This version of Unlcok92 ransomware emerged at the end of 2016. Just like the name suggests, it appends .kukuracha file extensions to encrypted records.

This new version is coded in C# programming language and uses Dotfuscator to hinder reverse engineering. We assume that malware creators have employed this tool to prevent malware analysts from analyzing its code because recent and less complex versions of Unlock92 ransomware proved to be easily decryptable.

Nevertheless, Kukaracha Unlock92 is not decryptable; users are not advised to contact cyber criminals and pay the ransom. It’s better to remove the virus and try to recover some of the files using alternative methods or third-party software.

.block file extension virus. In 2017, it was reported that Unlock92 also uses .block file extension to make files on the targeted computer unusable. However, any other significant changes in malware’s code or distribution were discovered.

Update: October 2017. Researchers detected a new variant of ransomware that appends a random string of letters and numbers as an unreadable file extension to the encrypted files. Victims are still asked to contact crooks via unlckr@protonmail.com.

Unlock92 ransomware version 2017Unlock92 is ransomware which displays a ransom note that is written in the Russian language and is expected to be redirected to Russian operating systems.

Gedantar ransomware. The virus emerged at the end of March 2018. It still uses RSA-2048 cryptography to corrupt files on the affected machines. The virus encrypts and renames targeted files by following this pattern: _<8-rand-chars>..

It also drops a ransom note called <20-rand-chars>.jpg (becomes a desktop picture) where cybercriminals in the Russian language asks to send an email to the same email address unlckr@protonmail.com or use TOR network[3] if they don’t get an answer in 24 hours time.

Nevertheless, the virus is not decryptable yet; victims are advised to remove Gedantar Unlock92 immediately in order to avoid damage and make the system safe again.

Unlock92 Zipper ransomware. This virus was discovered by the Malware Hunter Team in July 2018. The ransomware corrupts files by zipping all of them in a folder. Data is renamed like this – foldername.random.zip.

It displays a ransom message which is written in the Russian language and provides a un92@protonmail.com email address. Users are urged to contact the cybercriminals by the given email and pay the demanded ransom which needs to be transferred in order to receive a decryption key for locked files.

The good news is that the Unlock92 Zipper ransomware can be decrypted. If you ever encounter such a damaging program, be quick to eliminate it from your computer system.

Ransomware distribution methods and precaution tips

Typically, ransomware gets into the machine when users open a malicious email attachment. Usually, these letters inform about some important issue and ask to open an attached Word, PDF or similar file. As soon as it’s done, malware payload is downloaded and executed on the device.

Therefore, the most important security tip is to stay away from spam emails and avoid opening attached files. Additionally, you should watch out for links that may lead to phishing or infected sites too.

However, malware might also get into the system by:

  • malware-laden ads;[4]
  • fake software updates;
  • bogus software downloads;
  • illegal downloads;
  • exploit kits.[5]

Therefore, users have to be careful with the content they click or download on the internet. Using legitimate download sources and staying away from too good to be true shopping offers decreases chances to encounter file-encrypting virus a lot.

Additionally, it is recommended to keep software and OS updated, and install security software for maximum protection. However, some sophisticated cyber threats can still bypass protection and trick you into opening infected attachment. In this case, backups are very important. Hence, create copies of the important data and save them to the external drive.

The guidelines on how to delete Unlock92 ransomware

It doesn’t matter which version of malware got into your PC; you still need to use professional security software for its elimination. For Unlock92 removal, we highly recommend using FortectIntego, Malwarebytes or SpyHunter 5Combo Cleaner, but many other tools can help you as well.

In some cases, malware blocks attempt to install, update or run security software, so you need to disable the virus first. The guidelines below will explain how to boot into Safe Mode with Networking which helps to remove Unlock92 using anti-malware tools.

Once the virus is gone, you will be able to restore files from backups, use Unlock92 decryptor or try alternative methods that might help to get back at least some of the data. You can find all needed information below.

Offer
do it now!
Download
Fortect Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Unlock92 virus. Follow these steps

Manual removal using Safe Mode

Follow these steps disable the virus:

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
    Settings
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
    Reboot
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.
    Startup

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Downloads
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):

    %AppData%
    %LocalAppData%
    %ProgramData%
    %WinDir%

After you are finished, reboot the PC in normal mode.

Remove Unlock92 using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Unlock92. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that Unlock92 removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Unlock92 from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

In case a decryptor is not working, try additional recovery methods.

If your files are encrypted by Unlock92, you can use several methods to restore them:

Try Data Recovery Pro

To restore some of the files encrypted by Unlock92 ransomware, you can try Data Recovery Pro:

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Unlock92 ransomware;
  • Restore them.

Windows Previous Versions feature is useful too

If System Restore was enabled before ransomware attack, you can try to recover individual files by following these steps:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try Shadow Explorer

If Unlock92 ransomware did not delete Shadow Volume Copies, this tool is very useful:

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Use Unlock92 Decrypter

There is a free decryption tool available; so instead of making the ransom payment, remove the virus and then download this extremely useful piece of software instead: Unlock92 decrypter. Please do not select .ZIP file as an example to get the decryption key, because this tool will discover a false-positive key!

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Unlock92 and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. The best solution for creating a tighter network could be a dedicated/fixed IP address.

If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for the server or network manager that needs to monitor connections and activities. VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world.

 

Recover files after data-affecting malware attacks

While much of the data can be accidentally deleted due to various reasons, malware is one of the main culprits that can cause loss of pictures, documents, videos, and other important files. More serious malware infections lead to significant data loss when your documents, system files, and images get encrypted. In particular, ransomware is is a type of malware that focuses on such functions, so your files become useless without an ability to access them.

Even though there is little to no possibility to recover after file-locking threats, some applications have features for data recovery in the system. In some cases, Data Recovery Pro can also help to recover at least some portion of your data after data-locking virus infection or general cyber infection. 

 

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

References