Severity scale:  
  (94/100)

Unlock92 ransomware virus. How to remove? (Uninstall guide)

removal by Ugnius Kiguolis - - | Type: Ransomware

Unlock92 – ransomware virus that encrypts files using RSA-2048 cipher and zips them into 

Unlock92 ransomware virus
Unlock 92 - a virus which infiltrates the system via spam messages.

Questions about Unlock92 ransomware virus

Unlock92 is a file-encrypting virus that applies RSA-2048[1] algorithm and appends .CRRRT, .blocked, .block, .CCCRRRPPP, .kukuracha or _<8-rand-chars>. extension. After the file encryption, the virus displays a ransom note which is written in the Russian language. The aim of such a message is to announce about corrupted files and demand a ransom to receive a decryption key for important data. Cybercriminals urge to contact them via unlock92@india.com email address and transfer money which usually needs to be in Bitcoin or another cryptocurrency. The original version of the Unlock92 ransomware was detected on June 2016; however, new versions keep emerging up to 2018. The latest virus version is called Unlock92 Zipper. This ransomware corrupts files by gathering them in a folder and zips them with a password. Additionally, it marks this folder by appending the .random.zip extension.

Summary
Name Unlock92
Type Ransomware
Release date June 2016, new versions such as Unlock 92 Zipper are spreading in 2018
Danger level High. Encrypts files and makes system changes
Appended file extensions Unlock92 can be recognized from the .CRRRT, .blocked, .block, .CCCRRRPPP, .kukuracha or _<8-rand-chars> extensions. The new version zips files into one folder and marks them with foldername.random.zip extension
Encryption algorithm RSA-2048
To uninstall Unlock92, install Reimage and run a full system scan 

Previous, it was thought that Unlock92 virus is one of the versions of Kozy.Jozy ransomware. Just like any other ransomware, it mostly spreads via malicious spam emails as a useful attachment, such as “invoice”, “payment report” or similar. Soon after infiltration, the virus starts scanning the device for data to encrypt. The main files that the virus is trying to encrypt are the so-called working files, i.e., the ones that users frequently use, including .docx, .rar, .jpg or .xls.

As we have mentioned at the beginning, different versions of Unlock92 ransomware append different file extensions. However, the first and original variant adds .CRRRT suffix.

Unlock92 ransomware virus picture
Unlock 92 - ransomware which uses an RSA-2048 algorithm to encrypt files.

It seems that the virus is designed to hijack Russian operating systems or its developers are hailing from this country. The ransom note that the virus drops after encrypting the files is written in Russian[2] (it also shows up as a desktop picture), yet it is interesting that the address the criminals provide links to India.

Если вы хотите их восстановить то отправьте один из пострадавших файлов и файл Кеу.Ып (из любой папки с зашифрованными файлами) на е-mai1: UNLOCK92@INDIA.COM Если вы не получили ответа в течение суток то скачайте с сайта https://www.torproject[.]org/download/download-easy.html.en ТОВ браузер и зайдите с его помощью на сайт http://fnjmegsn7tbrrnkl.onion – там будет указан действующий почтовый ящик.

The victim is encouraged to contact the hackers via UNLOCK92(@)INDIA.COM or unlckr@protonmail.com to retrieve their files. To do that, the victim has to send a single encrypted document together with a key.bin file which can be found in every infected folder of the computer.

However, in July 2016, a free Unlock92 decrypter was released. Hence, there’s no need to pay the ransom and lose the money. Unfortunately, this software might not work with the latest variants of the cyber threat, but you should still not consider paying the ransom.

For further protection, you should consider restoring copies of important documents on an external device such as a USB drive or iCloud. Such remote servers keep your data safe and protected from various cybercriminals as the only one who has access to such files is you. Such action will let you prevent data corrupting in the future.

Unlock92 decrypter screenshot
Unlock92 is a ransomware-type virus which demands a particular ransom if wanted to receive a decryption tool for corrupted data.

Before data recovery, you have to remove Unlock92 from the machine. For that, you need to obtain a reputable malware elimination software and run a full system scan with updated software. We suggest using Reimage which is capable not only cleaning the computer but fixing the damage done by malware too.

Of course, you can use Malwarebytes, Plumbytes Anti-MalwareNorton Internet Security or any other preferred anti-malware software for Unlock92 removal. We want to remind that security software does not decrypt files. It only deletes malicious components from the device. Detail removal and recovery solutions are presented at the end of the article.

Variants of Unlock92 ransomware virus

Unlock92 2.0 ransomware virus. A new version was released in July 2016 and now appends .CCCRRRPPP file extension to the targeted data. Crypto-virus presents data recovery instructions in the ORIG.jpg file which is set as the infected computer's desktop background.

.blocked file extension virus. In August 2016, researchers reported another undecryptable variant of the virus. It uses RSA-2048 cryptography and appends .blocked file extension. Then malware drops a ransom note called “!!!!!!!!Как восстановить файлы!!!!!!!”

Unlock92 ransomware ransom notes
Unlock92 file-encrypting virus had its latest version, the Unlock92 Zipper ransomware, released in July 2018.

Cyber criminals still talk with the victims in Russian language and ask to contact them. Victims are supposed to send an email to unlock92@india.com to learn how much they have to pay for data recovery procedure.

Kukuracha ransomware virus. This version of Unlcok92 ransomware emerged at the end of 2016. Just like the name suggests, it appends .kukuracha file extensions to encrypted records.

This new version is coded in C# programming language and uses Dotfuscator to hinder reverse engineering. We assume that malware creators have employed this tool to prevent malware analysts from analyzing its code because recent and less complex versions of Unlock92 ransomware proved to be easily decryptable.

Nevertheless, Kukaracha Unlock92 is not decryptable; users are not advised to contact cyber criminals and pay the ransom. It’s better to remove the virus and try to recover some of the files using alternative methods or third-party software.

.block file extension virus. In 2017, it was reported that Unlock92 also uses .block file extension to make files on the targeted computer unusable. However, any other significant changes in malware’s code or distribution were discovered.

Update: October 2017. Researchers detected a new variant of ransomware that appends a random string of letters and numbers as an unreadable file extension to the encrypted files. Victims are still asked to contact crooks via unlckr@protonmail.com.

Unlock92 ransomware version 2017
Unlock92 is ransomware which displays a ransom note that is written in the Russian language and is expected to be redirected to Russian operating systems.

Gedantar ransomware. The virus emerged at the end of March 2018. It still uses RSA-2048 cryptography to corrupt files on the affected machines. The virus encrypts and renames targeted files by following this pattern: _<8-rand-chars>..

It also drops a ransom note called <20-rand-chars>.jpg (becomes a desktop picture) where cybercriminals in the Russian language asks to send an email to the same email address unlckr@protonmail.com or use TOR network[3] if they don’t get an answer in 24 hours time.

Nevertheless, the virus is not decryptable yet; victims are advised to remove Gedantar Unlock92 immediately in order to avoid damage and make the system safe again. 

Unlock92 Zipper ransomware. This virus was discovered by the Malware Hunter Team in July 2018. The ransomware corrupts files by zipping all of them in a folder. Data is renamed like this – foldername.random.zip.

It displays a ransom message which is written in the Russian language and provides a un92@protonmail.com email address. Users are urged to contact the cybercriminals by the given email and pay the demanded ransom which needs to be transferred in order to receive a decryption key for locked files.

The good news is that the Unlock92 Zipper ransomware can be decrypted. If you ever encounter such a damaging program, be quick to eliminate it from your computer system.

Ransomware distribution methods and precaution tips

Typically, ransomware gets into the machine when users open a malicious email attachment. Usually, these letters inform about some important issue and ask to open an attached Word, PDF or similar file. As soon as it’s done, malware payload is downloaded and executed on the device.

Therefore, the most important security tip is to stay away from spam emails and avoid opening attached files. Additionally, you should watch out for links that may lead to phishing or infected sites too.

However, malware might also get into the system by:

  • malware-laden ads;[4]
  • fake software updates;
  • bogus software downloads;
  • illegal downloads;
  • exploit kits.[5]

Therefore, users have to be careful with the content they click or download on the internet. Using legitimate download sources and staying away from too good to be true shopping offers decreases chances to encounter file-encrypting virus a lot.

Additionally, it is recommended to keep software and OS updated, and install security software for maximum protection. However, some sophisticated cyber threats can still bypass protection and trick you into opening infected attachment. In this case, backups are very important. Hence, create copies of the important data and save them to the external drive.

The guidelines on how to delete Unlock92 ransomware

It doesn’t matter which version of malware got into your PC; you still need to use professional security software for its elimination. For Unlock92 removal, we highly recommend using Reimage, Plumbytes Anti-MalwareNorton Internet Security or Malwarebytes, but many other tools can help you as well.

In some cases, malware blocks attempt to install, update or run security software, so you need to disable the virus first. The guidelines below will explain how to boot into Safe Mode with Networking which helps to remove Unlock92 using anti-malware tools.

Once the virus is gone, you will be able to restore files from backups, use Unlock92 decryptor or try alternative methods that might help to get back at least some of the data. You can find all needed information below.

Offer
We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software you agree to our privacy policy and agreement of use.
do it now!
Download
Reimage (remover) Happiness
Guarantee
Download
Reimage (remover) Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage, submit a question to our support team and provide as much details as possible.
Reimage is recommended to remove virus damage. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool.
More information about this program can be found in Reimage review.

If you decided to select another anti-spyware, uninstall Reimage from your computer.
Press mentions on Reimage
Alternate Software
Malwarebytes
Alternate Software
Malwarebytes

To remove Unlock92 virus, follow these steps:

Remove Unlock92 using Safe Mode with Networking

Follow these steps disable the virus:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Unlock92

    Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Unlock92 removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Unlock92 using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Unlock92. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Unlock92 removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Unlock92 from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

In case a decryptor is not working, try additional recovery methods.

If your files are encrypted by Unlock92, you can use several methods to restore them:

Try Data Recovery Pro

To restore some of the files encrypted by Unlock92 ransomware, you can try Data Recovery Pro:

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Unlock92 ransomware;
  • Restore them.

Windows Previous Versions feature is useful too

If System Restore was enabled before ransomware attack, you can try to recover individual files by following these steps:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Try Shadow Explorer

If Unlock92 ransomware did not delete Shadow Volume Copies, this tool is very useful:

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Use Unlock92 Decrypter

There is a free decryption tool available; so instead of making the ransom payment, remove the virus and then download this extremely useful piece of software instead: Unlock92 decrypter. Please do not select .ZIP file as an example to get the decryption key, because this tool will discover a false-positive key!

About the author

Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

References