New variant reported with .[random 10].[random 8] extension (#Restore-My-Files.txt)
.p9MQtIBw6X.OXOfUbfa
Posted 10 November 2025 - 08:13 AM
New variant reported with .[random 10].[random 8] extension (#Restore-My-Files.txt)
.p9MQtIBw6X.OXOfUbfa
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 25 November 2025 - 12:34 PM
Hello, help me find a decryptor. There are examples of two encrypted and unencrypted files. And the extortionist's note.
https://drive.google.com/drive/folders/1VmAxvcVfPTRpfCjk4G3nQiug_Hwa8l7B?usp=sharing
Posted 25 November 2025 - 01:24 PM
Hello, help me find a decryptor. There are examples of two encrypted and unencrypted files. And the extortionist's note.
Your encrypted files
.[ID-C282F1FD][Evoteam.sup@gmail.com].14z = .[ID-random 8][<email>].14z
What is the actual name of the ransom note?
This looks to be a new variant of C77L/X77C Ransomware most of which will have an .[ID-random 8 char][<email>.[random 3 char], an .[<email>].[random 8 char], or a .[random 10].[random 8 char] extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) named #Recover-Files.txt, #Restore-My-Files.txt, READ-ME.txt, READ-ME-Nullhexxx.txt. These are some examples.
.[ID-BAE12624][recovery-data09@protonmail.com].mz4 .[ID-80587FD8][Dm_for_decrypt@protonmail.com].3yk .[ID-9A7BE444][Decryptorkrypt@gmail.com].nb0 .[ID-646633FB][carolcarol0014410@gmail.com].1qb .[ID-8430E697][SuppDecFile@gmail.com].958 .[nullhex@2mail.co].8AA60918 .[mrdarkness@onionmail.org].40D5BF0A .p9MQtIBw6X.OXOfUbfa
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 25 November 2025 - 01:43 PM
@Jimmy00315
The encryption is secure and the criminal's master private keys (AES session key) are needed for decryption. Without the criminal's master private key (session key)s, decryption is impossible.
I have merged your topic into the primary support topic for victims of this ransomware. When or if a decryption solution is available it will provided here.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 01 December 2025 - 07:38 AM
New variant reported with .9pf extension (#Restore-My-Files.txt)
[ID-C4D676C5][SuppDecFile@gmail.com].9pf
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 28 December 2025 - 07:01 PM
Please tell me, how much money does a scammer ask for a decoder?
Posted 28 December 2025 - 07:11 PM
The price most likely will vary, however, most security experts will advise against paying the ransom demands, negotiating a payment with the criminals or using a data recovery service. I explain why in this topic (Post #17) which includes victim experiences. Also read my comments here (Post #2) for more victim experiences and information as to what we know about those who claim they can decrypt data (including scammers, data recovery services and the criminals).
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted Today, 02:04 PM
Does anyone have any experience interacting with data recovery issues through this website?
https://lockbitdecryptor.com/decrypt-c77l-ransomware/
Posted Today, 02:31 PM
Does anyone have any experience interacting with data recovery issues through this website?
https://lockbitdecryptor.com/decrypt-c77l-ransomware/
They are scammers and middlemen.
They don't even hesitate to mention the BC forum and my GitHub repository.
But as an expert, I can tell you that without the help of attackers, they won't be able to decrypt your files 
Posted Today, 03:51 PM
Adding to rivitna's expert advice, you may want to read What we know about those who claim they can decrypt data (Post #2), including scammers, the criminals and data recovery services.
Do not let yourself be victimized twice.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
0 members, 9 guests, 0 anonymous users