Zcryptor Ransomware (a.k.a. Zcrypt Ransomware) is a threat that might do much harm to you. Its main goal is to steal money from users, so do not be surprised when you notice that your all files are locked and you are asked to pay money. Like other previously-released similar threats, this Trojan sneaks onto computers without permission. There are several ways how it does that. You will find out more about Zcryptor Ransomware, its distribution methods, and, of course, its removal further in this article, so read it carefully and then apply the knowledge you get in order to delete Zcryptor Ransomware in a manual way.
Specialists have not found anything unique about this ransomware infection. In fact, it is quite buggy if we compare it to other ransomware infections, e.g. JohnyCryptor Ransomware, UltraCrypter Ransomware, and Green_ray Ransomware that are prevalent on the web these days. It has been found that one of the main buttons on the ransom note, which should show the user’s Bitcoin Address, is not working because the file btc.addr that should originally be placed in C:\Roaming is put into the %APPDATA% directory (%APPDATA%\Roaming). Despite this bug, Zcryptor Ransomware does not differ from other ransomware infections in the way it acts.
First of all, as you already know, Zcryptor Ransomware will lock your files and assign the new filename extension .zcrypt. According to researchers at 411-spyware.com who have tested this ransomware infection, it is targeted at those files which users consider to be valuable, for example, pictures, documents, and music files. Fortunately, it will not encrypt important files containing such extensions as .exe, .dll, and .lnk. In addition, it will not lock system files, which means that you will be able to use your computer freely, and only your files will be locked. To inform users what has happened to them, the ransomware will prepare the .html file and will place it on Desktop. It contains the following text (an excerpt):
ALL YOUR PERSONAL FILES ARE ENCRYPTED
All your data (photos, documents, database, …) have been encrypted with a private and unique key generated for this computer.
Users are also informed that they have to make a payment to get the key to decrypt files. The ransom this threat demands at the time of writing is 1.2 Bitcoin; however, it is said that it might increase up to 5 Bitcoins. Users have to pay the ransom within 7 days, so if you are planning on doing that, you should transfer money as soon as possible. Of course, our experts say that it is a bad idea to do that because it is unclear whether the key for unlocking files will really be provided. If you do not want to risk losing your money and getting nothing in return, you need to delete Zcryptor Ransomware from your computer. Then, you could try to recover your files using alternative methods.
Zcryptor Ransomware does not differ from other threats the way it is distributed either. It has been observed that this infection is usually spread as an email attachment. In most cases, it pretends to be an invoice or another document, so users download it and allow it to sneak onto computers. Theoretically, you can get this threat from corrupted websites as well, so you need to be careful. Of course, the first symptom that the ransomware is present is a bunch of encrypted files; however, more experienced users can also notice new files, e.g. zcrypt.exe, btc.addr, and public.key created in the %APPDATA%\Roaming directory. Also, a new Value called zcrypt will be visible in the RUN registry key (HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run).
This ransomware does not block .exe files, which means that you can use an automatic malware remover to make it disappear. This is the quicker way if compared to others; however, it will not be difficult to erase Zcryptor Ransomware manually if you use our manual instructions too. Keep in mind that other undesirable programs will not disappear as well, and you will have to take care of them separately. It is not so easy to do that, so we suggest that you scan the system with an automatic malware remover, e.g. SpyHunter.