If the ransomware virus is in your server, the extension is tampered with.
The SQL Server database has a ransomware virus, and the MDF file extension has been tampered with.
Decryption Contact: QQ 80554803 tel:18620906802 ()
If your file is encrypted with the following ransomware virus:
? Trojan-ransom.win32.rakhni
? Trojan-ransom.win32.agent.iih
? Trojan-ransom.win32.autoit
? Trojan-ransom.win32.aura
? Trojan-ransom.androidos.pletor
? Trojan-ransom.win32.rotor
? Trojan-ransom.win32.lamer
? Trojan-ransom.win32.cryptokluchen
? Trojan-ransom.win32.democry
? Trojan-ransom.win32.bitman versions 3 and 4
? Trojan-ransom.win32.libra
? Trojan-ransom.msil.lobzik
? Trojan-ransom.msil.lortok
? Trojan-ransom.win32.chimera
? Trojan-ransom.win32.cryfile
? Trojan-ransom.win32.nemchig
? Trojan-ransom.win32.mircop
? Trojan-ransom.win32.mor
? Trojan-ransom.win32.crusis
? Trojan-ransom.win32.aechu
? Trojan-ransom.win32.jaff
? Trojan-ransom.win32.cryakl CL 1.0.0.0
? Trojan-ransom.win32.cryakl CL 1.0.0.0.u
? Trojan-ransom.win32.cryakl CL 1.2.0.0
? Trojan-ransom.win32.cryakl CL 1.3.0.0
? Trojan-ransom.win32.cryakl CL 1.3.1.0
If your file is encrypted by malicious software, its extension is changed. Like what:
? File.doc Change to File.doc.locked
? 1.doc to 1.dochb15
? 1.doc changed to 1.doc.17-05-2016-20-27-37[email protected]$.777
Trojan-ransom.win32.rakhni:
? < file name >.< original extension >.<locked>
? < file name >.< original extension >.<kraken>
? < file name >.< original extension >.<darkness>
? < file name >.< original extension >.<oshit>
? < file name >.< original extension >.<nochance>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<crypto>
? < file name >.< original extension >.<[email protected]>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com>
? < file name >.< original extension >.<[email protected]_com_id373>
? < file name >.< original extension >.<[email protected]_com_id371>
? < file name >.< original extension >.<[email protected]_com_id372>
? < file name >.< original extension >.<[email protected]_com_id374>
? < file name >.< original extension >.<[email protected]_com_id375>
? < file name >.< original extension >.<[email protected]_com_id376>
? < file name >.< original extension >.<[email protected]_com_id392>
? < file name >.< original extension >.<[email protected]_com_id357>
? < file name >.< original extension >.<[email protected]_com_id356>
? < file name >.< original extension >.<[email protected]_com_id358>
? < file name >.< original extension >.<[email protected]_com_id359>
? < file name >.< original extension >.<[email protected]_com_id360>
? < file name >.< original extension >.<[email protected]_com_id20>
Trojan-ransom.win32.mor:
? < file name >.< original extension >_crypt
Trojan-ransom.win32.autoit:
? < file name >.< original extension >.<[email protected]. Alphabet >
Trojan-ransom.msil.lortok:
? < file name >.< original extension >.<cry>
? < file name >.< original extension >.<AES256>
Trojan-ransom.androidos.pletor:
? < file name >.< original extension >.<enc>
TROJAN-RANSOM.WIN32.AGENT.IIH:
? < file name >.< original extension >+Trojan-ransom.win32.cryfile:
? < file name >.< original extension >.<encrypted>
Trojan-ransom.win32.democry:
? < file name >.< original extension >.+<.Date Time$ mailbox @ domain name $.777>
? < file name >.< original extension >.+<.Date Time$ mailbox @ domain name $.legion>
Trojan-ransom.win32.bitman Version 3:
? < file name >.<xxx>
? < file name >.<ttt>
? < file name >.<micro>
? < file name >.<mp3>
Trojan-ransom.win32.bitman version 4:
? < file name >.< original extension > (file name and extension not modified)
Trojan-ransom.win32.libra:
? < file name >.<encrypted>
? < file name >.<locked>
? < file name >.<SecureCrypted>
Trojan-ransom.msil.lobzik:
? < file name >.<fun>
? < file name >.<gws>
? < file name >.<btc>
? < file name >.<AFD>
? < file name >.<porno>
? < file name >.<pornoransom>
? < file name >.<epic>
? < file name >.<encrypted>
? < file name >.<J>
? < file name >.<payransom>
? < file name >.<paybtcs>
? < file name >.<paymds>
? < file name >.<paymrss>
? < file name >.<paymrts>
? < file name >.<paymst>
? < file name >.<paymrss>
? < file name >.<gefickt>
? < file name >.<[email protected]>
TROJAN-RANSOM.WIN32.MIRCOP:
? <Lock>.< file name >.< original extension;.
Trojan-ransom.win32.crusis:
?. id<...>.<mail>@<server>.<domain>.xtbl
?. id<...>.<mail>@<server>.<domain>. CrySiS
?. id-<...>.<mail>@<server>.<domain>.xtbl
?. id-<...>.<mail>@<server>.<domain>.wallet
?. Id-<...>.<mail>@<server>.<domain>.dhrama
?. id-<...>.<mail>@<server>.<domain>.onion
?. <mail>@<server>.<domain>.wallet
?. <mail>@<server>.<domain>.dhrama
?. <mail>@<server>.<domain>.onion
Trojan-ransom.win32nemchig:
? < file name >.< original extension >.<[email protected]>
Trojan-ransom.win32.lamer:
? < file name >.< original extension >.<bloked>
? < file name >.< original extension >.<cripaaaa>
? < file name >.< original extension >.<smit>
? < file name >.< original extension >.<fajlovnet>
? < file name >.< original extension >.<filesfucked>
? < file name >.< original extension >.<criptx>
? < file name >.< original extension >.<gopaymeb>
? < file name >.< original extension >.<cripted>
? < file name >.< original extension >.<bnmntftfmn>
? < file name >.< original extension >.<criptiks>
? < file name >.< original extension >.<cripttt>
? < file name >.< original extension >.? < file name >.< original extension >.<aga>
Trojan-ransom.win32.cryptokluchen:
? < file name >.< original extension >.<AMBA>
? < file name >.< original extension >.<PLAGUE17>
? < file name >.< original extension >.<ktldll>
Trojan-ransom.win32.rotor:
? < file name >.< original extension >.<[email protected]>
? < file name >.< original extension >.<[email protected]>
? < file name >.< original extension >.<[email protected]>
? < file name >.< original extension >.<!__[Email protected]>
? < file name >.< original extension >.<! [email protected].crypt>
? < file name >.< original extension >.<! [email protected]____.crypt>
? < file name >.< original extension >.<! [Email protected] .crypt>
? < file name >.< original extension >.<! [Email protected] .crypt>
? < file name >.< original extension >.<[email protected]==.crypt>
? < file name >.< original extension >.<[email protected]=--. crypt>
Trojan-ransom.win32.chimera:
? < file name >.< original extension >.<crypt>
? < file name >.< original extension >.<4 any symbol >
Trojan-ransom.win32.aechu:
? < file name >.<aes256>
? < file name >.<aes_ni>
? < file name >.<aes_ni_gov>
? < file name >.<aes_ni_0day>
? < file name >.<lock>
? < file name >.<[email protected]_hu>
? < file name >.<[email protected]>
? < file name >.<~xdata>
Trojan-ransom.win32.jaff:
? < file name >.<jaff>
? < file name >.<wlu>
? < file name >.<sVn>
Trojan-ransom.win32.cryakl
? email-<...>.ver-<...>.id-<...>.randomname-<...>.< Random extension >
?
Malicious software version ransomware virus author's email address
CL 1.0.0.0 [Email protected]br/>[email protected]
[Email protected]Br/>[email protected]
[Email protected]Br/>[email protected]
[Email protected]Br/></span></span></span>[email protected]
[Email protected]Br/>[email protected]
[Email protected]_graf1br/>[email protected]_mod
[Email protected]_mod2
CL 1.2.0.0</span></span></span>[email protected]Br/>[email protected]
[Email protected]
CL 1.3.1.0[email protected]Br/>[email protected][email protected]
[Email protected]</span></span>
The
SQL Server database has a ransomware virus and the MDF file extension has been tampered with.