id-ransomware.malwarehunterteam.com Open in urlscan Pro
2606:4700:3036::ac43:dbb1  Public Scan

Submitted URL: http://id-ransomware.malwarehunterteam.com/
Effective URL: https://id-ransomware.malwarehunterteam.com/
Submission: On March 24 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST /identify.php

<form id="fileupload" method="POST" action="/identify.php" enctype="multipart/form-data">
  <div class="row">
    <div id="ransomnote" class="col-md-6">
      <h3>
        <label for="ransomnote_upload">
          <span class="glyphicon glyphicon-file"></span> Lösegeldforderung </label>
        <a tabindex="0" role="button" id="ransomnote_help" data-toggle="popover" data-trigger="focus" data-content="# DECRYPT MY FILES #\.(txt|vbs|html|url), DECRYPT_INSTRUCTIONS\.(HTML|txt), GetYouFiles\.txt, README_DECRYPT_HYDRA_ID_(.*)\.txt, _Locky_recover_instructions\.(txt|bmp|html), DECRYPT_Readme\.TXT\.ReadMe, ATTENTION\.RTF, IMPORTANT READ ME\.txt, YOUR_FILES\.url, HOW_TO_DECRYPT\.HTML" title="" data-original-title="Lösegeldforderungs-Beispiele">
										<span class="glyphicon glyphicon-question-sign"></span>
									</a>
      </h3>
      <p class="lead">Die Datei, welche die Lösegeld- und Zahlungsinformationen anzeigt.</p>
      <input id="ransomnote_upload" type="file" name="ransomnote_upload">
    </div>
    <div id="sample" class="col-md-6">
      <h3>
        <label for="sample_upload">
          <span class="glyphicon glyphicon-lock"></span> verschlüsselte Datei </label>
        <a tabindex="0" role="button" id="sample_help" data-toggle="popover" data-trigger="focus" data-content=".EnCiPhErEd, .R5A, .cerber, .crjoker, .hydracrypt_ID_#, .locky, .magic, .ENC, .rdm, .rrk" title="" data-original-title="verschlüsselte Datei-Beispiele">
										<span class="glyphicon glyphicon-question-sign"></span>
									</a>
      </h3>
      <p class="lead">Eine Datei, die verschlüsselt wurde und nicht geöffnet werden kann.</p>
      <input id="sample_upload" type="file" name="sample_upload">
    </div>
  </div>
  <br><br>
  <div class="row">
    <div id="address" class="col-md-6 pull-right">
      <h3>
        <label for="address_text">
          <span class="glyphicon glyphicon-envelope"></span> Addresses </label>
      </h3>
      <p class="lead">Optionally, you may enter any email addresses or hyperlinks the ransomware gives you for contact (if there is no ransom note).</p>
      <textarea class="form-control" rows="3" id="address_text" name="address_text"></textarea>
    </div>
    <div class="col-md-6 pull-left">
      <button type="submit" class="btn btn-primary has-spinner" id="upload_button">
        <span class="spinner glyphicon glyphicon-refresh glyphicon-refresh-animate"></span> Hochladen </button>
    </div>
  </div>
</form>

Text Content

Toggle navigation ID Ransomware
 * Identifizieren
 * FAQ
 * Notify Me
 * Donate

Deutsch
 * English
 * Español
 * Italiano
 * Deutsch
 * русский язык
 * Français
 * Português
 * Polski
 * Nederlands
 * Türkçe
 * 日本語 (にほんご)
 * Bahasa Indonesia
 * Slovenski Jezik
 * Svenska
 * српски језик
 * čEština
 * Català
 * العربية
 * فارسی
 * Hrvatski Jezik
 * नेपाली
 * Norsk
 * Limba Română
 * ไทย


ID RANSOMWARE

Lade eine Lösegeldforderung und/oder eine verschlüsselte Beispieldatei hoch, um
die Ransomware zu identifizieren, die deine Daten verschlüsselt hat.

> Wissen ist halb gewonnen!
> GI Joe


DATEIEN HOCHLADEN


LÖSEGELDFORDERUNG

Die Datei, welche die Lösegeld- und Zahlungsinformationen anzeigt.


VERSCHLÜSSELTE DATEI

Eine Datei, die verschlüsselt wurde und nicht geöffnet werden kann.




ADDRESSES

Optionally, you may enter any email addresses or hyperlinks the ransomware gives
you for contact (if there is no ransom note).

Hochladen


FAQ

 * WELCHE RANSOMWARES WERDEN ERKANNT?
   
   Dieser Dienst erkennt zurzeit 1135 verschiedene Ransomwares. Hier ist eine
   komplette, dynamische Liste was aktuell alles erkannt wird:
   
   $$$ Ransomware, 010001, 0kilobypt, 0mega, 0XXX, 16x, 24H Ransomware, 32aa,
   3AM, 4rw5w, 54bb47h, 5ss5c, 777, 7ev3n, 7even Security, 7h9r, 7zipper, 8Base,
   8lock8, AAC, ABCLocker, Abyss Locker, ACCDFISA v2.0, AdamLocker, Adhubllka,
   Admin Locker, AES_KEY_GEN_ASSIST, AES-Matrix, AES-NI, AES256-06, AESMew,
   Afrodita, AgeLocker, Agenda, Akira, Ako / MedusaReborn, Al-Namrood,
   Al-Namrood 2.0, ALC, Alcatraz, Alfa, Allcry, Alma Locker, Alpha, AMBA,
   Amnesia, Amnesia2, Anatova, AnDROid, AngryDuck, Annabelle 2.1, AnteFrigus,
   Anubi, Anubis, AnubisCrypt, Apocalypse, Apocalypse (New Variant),
   ApocalypseVM, ApolloLocker, ARCrypter (Chile Locker), AresCrypt, Argus, Aris
   Locker, Armage, ArmaLocky, Arsium, ASN1 Encoder, AstraLocker, Ataware,
   Atchbo, Aurora, AutoLocky, AutoWannaCryV2, Avaddon, AVCrypt, Avest,
   AvosLocker, AWT, AxCrypter, aZaZeL, Azov Wiper, B2DR, Babaxed, Babuk,
   BabyDuck, BadBlock, BadEncript, BadRabbit, Bagli Wiper, Bam!, BananaCrypt,
   BandarChor, Banks1, BarakaTeam, Bart, Bart v2.0, Basilisque Locker,
   BasnEncrypter, BB Ransomware, BeijingCrypt, BetaSup, BianLian, BigBobRoss,
   BigLock, Bisamware, Bisquilla, BitCrypt, BitCrypt 2.0, BitCryptor,
   BitKangoroo, Bitpaymer / DoppelPaymer, BitPyLock, Bitshifter, BitStak,
   BKRansomware, Black Basta, Black Buy, Black Claw, Black Feather, Black
   Shades, BlackByte, BlackCat (ALPHV), BlackHeart, BlackHunt, BlackKingdom,
   BlackMatter, Blackout, BlackRuby, BlackSuit, Blind, Blind 2, Blocatto,
   BlockFile12, Blooper, Blue Blackmail, BlueSky, Bonsoir, BoooamCrypt, Booyah,
   BrainCrypt, Brazilian Ransomware, Brick, BrickR, BrightNight, BTCamant,
   BTCWare, BTCWare Aleta, BTCWare Gryphon, BTCWare Master, BTCWare PayDay,
   Bubble, Bucbi, Bud, Bug, BugWare, BuyUnlockCode, c0hen Locker, C3rb3r,
   Cactus, Cancer, Cassetto, CatB, Cerber, Cerber 2.0, Cerber 3.0, Cerber 4.0 /
   5.0, CerberImposter, CerberTear, Chaos, CheckMail7, Checkmate, Cheers,
   Chekyshka, ChernoLocker, ChiChi, Chimera, ChinaJm, ChinaYunLong,
   ChineseRarypt, CHIP, CiphBit, ClicoCrypter, Clop, Clouded, CmdRansomware,
   CNHelp, CobraLocker, CockBlocker, Coin Locker, CoinVault, Combo13 Wiper,
   Comet, Comrade Circle, Conficker, Consciousness, Conti, CoronaVirus,
   CorruptCrypt, Cossy, Coverton, Cr1ptT0r Ransomware, CradleCore, CreamPie,
   Creeper, Crimson, Cripton, Cripton7zp, Cry128, Cry36, Cry9, Cryakl,
   CryCryptor, CryFile, CryLocker, CrypMic, Crypren, Crypt0, Crypt0L0cker,
   Crypt0r, Crypt12, Crypt32, Crypt38, Crypt3r / Ghost / Cring, CryptConsole,
   CryptConsole3, CryptFuck, CryptGh0st, CryptInfinite, CryptoApp,
   CryptoDarkRubix, CryptoDefense, CryptoDevil, CryptoFinancial, CryptoFortress,
   CryptoGod, CryptoHasYou, CryptoHitman, CryptoJacky, CryptoJoker,
   CryptoLocker3, CryptoLockerEU, CryptoLocky, CryptoLuck, CryptoMix, CryptoMix
   Revenge, CryptoMix Wallet, Crypton, CryptON, CryptoPatronum, CryptoPokemon,
   CryptorBit, CryptoRoger, CryptoShield, CryptoShocker, CryptoTorLocker,
   CryptoViki, CryptoWall 2.0, CryptoWall 3.0, CryptoWall 4.0, CryptoWire,
   CryptXXX, CryptXXX 2.0, CryptXXX 3.0, CryptXXX 4.0, CryPy, CrySiS, Crystal,
   CSP Ransomware, CTB-Faker, CTB-Locker, Cuba, CXK-NMSL, Cyborg, Cyrat, D00mEd,
   Dablio, Damage, DarkBit, DarkoderCryptor, DarkPower, DarkRadiation, DarkSide,
   DataFrequency, DataKeeper, DavesSmith / Balaclava, Dcrtr, DCry, DCry 2.0,
   Deadbolt, Deadly, DearCry, DeathHiddenTear, DeathHiddenTear v2, DeathNote,
   DeathOfShadow, DeathRansom, DEcovid19, Decr1pt, DecryptIomega, DecYourData,
   DEDCryptor, Defender, Defray, Defray777 / RansomEXX, Delta, DeriaLock,
   DeroHE, Desync, Dharma (.cezar Family), Dharma (.dharma Family), Dharma
   (.onion Family), Dharma (.wallet Family), Diavol, Digisom, DilmaLocker,
   DirtyDecrypt, Dishwasher, District, DMA Locker, DMA Locker 3.0, DMA Locker
   4.0, DMALocker Imposter, DoggeWiper, Domino, Done, DoNotChange, Donut,
   DoubleLocker, DragonForce, DriedSister, DryCry, DST Ransomware, DualShot,
   Dviide, DVPN, DXXD, DynA-Crypt, eBayWall, eCh0raix / QNAPCrypt, ECLR
   Ransomware, EdgeLocker, EduCrypt, EggLocker, Egregor, El Polocker, Elysium,
   Enc1, Encrp, EnCrypt, EncryptedBatch, EncrypTile, EncryptoJJS, Encryptor
   RaaS, Enigma, Enjey Crypter, EnkripsiPC, Enmity, Entropy, EOEO, Epsilon,
   EpsilonRed, Erebus, Erica Ransomware, Eris, Estemani, ESXiArgs, Eternal,
   Everbe, Everbe 2.0, Everbe 3.0, Evil, Executioner, ExecutionerPlus, Exerwa
   CTF, Exocrypt XTC, Exorcist Ransomware, Exotic, Extortion Scam, Extractor,
   EyeCry, Fabiansomware, Fadesoft, Fake DarkSide, Fake WordPress Crypter,
   Fantom, FartPlz, FCPRansomware, FCrypt, FCT, FenixLocker, FenixLocker 2.0,
   Fenrir, FilesLocker, FindNoteFile, FindZip, FireCrypt, Flamingo, Flatcher3,
   FLKR, FlowEncrypt, Flyper, FonixCrypter, FREEer, FreeMe, FrozrLock,
   FRSRansomware, FS0ciety, FTCode, FuckSociety, FunFact, FuxSocy Encryptor,
   FXS, G.R.I.D., Galacti-Crypter, GandCrab, GandCrab v4.0 / v5.0, GandCrab2,
   GarrantyDecrypt, GC47, Geneve, Gerber, GermanWiper, GetCrypt, GhostCrypt,
   GhostHammer, Gibberish, Gibon, Gladius, Globe, Globe (Broken), Globe3,
   GlobeImposter, GlobeImposter 2.0, GoCryptoLocker, Godra, GOG, GoGoogle,
   GoGoogle 2.0, Golden Axe, GoldenEye, Gomasom, Good, Gopher, GoRansom, Gorgon,
   Gotcha, GPAA, GPCode, GPGQwerty, GusCrypter, GX40, H0lyGh0st, Hades,
   HadesLocker, Hakbit, Halloware, Hansom, HappyDayzz, HardBit, hc6, hc7,
   HDDCryptor, HDMR, HE-HELP, Heimdall, Hello (WickrMe), HelloKitty, HelloXD,
   HellsRansomware, Help50, HelpDCFile, Herbst, Hermes, Hermes 2.0, Hermes 2.1,
   Hermes837, HermeticWiper, Heropoint, Hi Buddy!, HiddenTear, HildaCrypt, Hive,
   HKCrypt, HollyCrypt, HolyCrypt, HowAreYou, HPE iLO Ransomware, HR, HsHarada /
   Rapture, Hucky, Hunters International, Hydra, HydraCrypt, IceFire, IEncrypt,
   IFN643, ILElection2020, Ims00ry, ImSorry, INC Ransom, Incanto, InducVirus,
   Industrial Spy, Infection Monkey, InfiniteTear, InfinityLock, InfoDot,
   InsaneCrypt, IQ, iRansom, Iron, Ironcat, Ishtar, Israbye, iTunesDecrypt,
   JabaCrypter, Jack.Pot, Jaff, Jager, JapanLocker, Jasmin, JavaLocker,
   JeepersCrypt, Jemd, Jigsaw, JNEC.a, JobCrypter, JoeGo Ransomware,
   JoJoCrypter, Jormungand, JosepCrypt, JSWorm, JSWorm 2.0, JSWorm 4.0,
   JuicyLemon, JungleSec, Kaenlupuf, Kali, Karakurt, Karma, Karma Cypher,
   Karmen, Karo, Kasiski, Katyusha, KawaiiLocker, KCW, Kee Ransomware, KeRanger,
   Kerkoporta, Kesafat Locker, KesLan, KeyBTC, KEYHolder, Khonsari,
   KillerLocker, KillRabbit, KimcilWare, Kirk, Knight, Knot, KokoKrypt, Kolobo,
   Kostya, Kozy.Jozy, Kraken, Kraken Cryptor, KratosCrypt, Krider, Kriptovor,
   KryptoLocker, Kupidon, L33TAF Locker, Ladon, Lalabitch, Lambda Ransomware,
   LambdaLocker, LeakThemAll, LeChiffre, LegionLocker, LightningCrypt, Lilith,
   Lilocked, Lime, Litra, LittleFinger, LLTP, LMAOxUS, Lock2017, Lock2Bits,
   Lock93, LockBit, LockBit 3.0, LockBox, LockCrypt, LockCrypt 2.0, LockDown,
   Locked-In, LockedByte, LockeR, LockerGoga, LockFile, Lockit, LockLock,
   LockMe, Lockout, LockTaiwan, LockXXX, Locky, Loki, Loki Locker, Lola, LolKek,
   LongTermMemoryLoss, LonleyCrypt, LooCipher, Lortok, Lost_Files, LoveServer,
   LowLevel04, LuciferCrypt, Luckbit, Lucky, MacawLocker, MadBit, MAFIA,
   MafiaWare, MafiaWare666, Magic, Magniber, Major, Makop, Maktub Locker,
   MalasLocker, MalwareTech's CTF, MaMoCrypter, Maoloa, Mapo, Marduk, Marlboro,
   MarraCrypt, Mars, MarsJoke, Matrix, Maui, MauriGo, MaxiCrypt, Maykolin,
   Maysomware, Maze, MCrypt2018, Medusa, MedusaLocker, MedusaStealer,
   MegaCortex, MegaLocker, MeowCorp, Mespinoza, Meteoritan, Mew767, Mikoyan,
   MindSystem, Minotaur, Mionoho, MirCop, MireWare, Mischa, MMM, MNS
   CryptoLocker, Mobef, MoneyBird, MoneyMessage, MongoLock, Monster, Montserrat,
   MoonCrypter, MorrisBatchCrypt, Moses Staff, MOTD, MountLocker, MoWare, MRAC,
   MRCR1, MrDec, Muhstik, Mystic, n1n1n1, N3TW0RM, N3ww4v3/Mimic, NanoLocker,
   NAS Data Compromiser, NCrypt, Nefilim, NegozI, Nemty, Nemty 2.x, Nemty
   Special Edition, Nemucod, Nemucod-7z, Nemucod-AES, NETCrypton, Netix,
   Netwalker (Mailto), Nevada, NewHT, NextCry, Nhtnwcuf, NightSky, Nitro, NM4,
   NMoreira, NMoreira 2.0, NO-NAME Hacking Group, Noblis, NoEscape, NoHope,
   NOKOYAWA, Nomikon, NonRansomware, NotAHero, NoWay, Nozelesn, NSB Ransomware,
   Nuke, NullByte, NxRansomware, Nyton, ODCODC, OhNo!, OmniSphere, ONYX,
   OnyxLocker, OoPS, OopsLocker, OpenToYou, OpJerusalem, Ordinypt, Osno,
   Ouroboros v6, OutCrypt, OzozaLocker, PadCrypt, Pandora, Panther, Paradise,
   Paradise .NET, Paradise B29, Parasite, Pay2Key, Paymen45, PayOrGrief,
   PayPalGenerator2019, PaySafeGen, PClock, PClock (Updated), PEC 2017, Pendor,
   Petna, PewCrypt, PewPew, PGPSnippet, PhantomChina, Philadelphia, Phobos,
   PhoneNumber, Pickles, PL Ransomware, Plague17, Planetary Ransomware, Play,
   PoisonFang, Pojie, Polaris, PonyFinal, PopCornTime, Potato, Povlsomware,
   PowerLocky, PowerShell Locker, PowerWare, PPDDDP, Pr0tector, Predator,
   PrincessLocker, PrincessLocker 2.0, PrincessLocker Evolution, Project23,
   Project34, Project57, ProLock, Prometheus, Protected Ransomware, PshCrypt,
   PSRansom, PUBG Ransomware, PureLocker, PwndLocker, PyCL, PyCL, PyL33T,
   PyLocky, qkG, Qlocker, QP Ransomware, QuakeWay, Quimera Crypter, QwertyCrypt,
   Qweuirtksd, R980, RAA-SEP, RabbitFox, RabbitWare, RackCrypt, Radamant,
   Radamant v2.1, Radiation, RagnarLocker, RagnarLocker 2.0+, Ragnarok, Random6,
   RandomLocker, RandomRansom, RanHassan, Ranion, RanRan, RanRans, Rans0mLocked,
   RansomCuck, RansomHub, Ransomnix, RansomNow, RansomPlus, Ransomwared,
   RansomWarrior, Rapid, Rapid 2.0 / 3.0, RapidRunDll, RaRansomware, RarVault,
   Razy, RCRU64, RedAlert, RedBoot, Redeemer, RedEye, RedRock, RedRum / Tycoon
   1.0, RegretLocker, REKTLocker, Rektware, Relock, RemindMe, RenLocker,
   RensenWare, RetMyData, REvil / Sodinokibi, Reyptson, Rhino, Rhysida, RNS,
   RobbinHood, Roga, Rokku, Rontok, Rook, Rorschach / BabLock, RoshaLock,
   RotorCrypt, Royal, Roza, RSA-NI, RSA2048Pro, RSAUtil, Ruby, RunExeMemory,
   RunSomeAware, Russenger, Russian EDA2, Ryuk, SAD, SadComputer, Sadogo,
   SADStory, Sage 2.0, Salsa, SamSam, Sanction, Sanctions, SantaCrypt, Satan,
   Satana, SatanCryptor, Saturn, SaveTheQueen, Scarab, ScareCrow, SD 1.1,
   Secles, Sekhmet, Seon, Sepsis, SerbRansom, Serpent, SFile, ShellLocker,
   Shifr, Shigo, ShinigamiLocker, ShinoLocker, ShivaGood, ShkolotaCrypt, Shrug,
   Shrug2, Shujin, Shutdown57, SifreCozucu, Sifreli, Sigma, Sigrun, SilentDeath,
   SilentSpring, Silvertor, Simple_Encoder, SintaLocker, Skull Ransomware,
   SkyFile, SkyStars, Smaug, Smrss32, Snake (Ekans), SnakeLocker, SnapDragon,
   Snatch, SNSLocker, SoFucked, SOLEENYA, SolidBit, Solider, Solo Ransomware,
   Solve, Somik1, SophosEncrypt, Spartacus, SpartCrypt, Spectre, Spider,
   SplinterJoke, Spora, Sport, SQ_, Stampado, Stinger, STOP (Djvu), STOP /
   KEYPASS, StorageCrypter, Storm, Striked, Stroman, Stupid Ransomware, Styx,
   Such_Crypt, Sugar / Encoded01, SunCrypt, SuperB, SuperCrypt, Surprise, Surtr,
   SynAck, SyncCrypt, Syrk, SYSDOWN, SystemCrypter, SZFLocker, Szymekk, T1Happy,
   TapPiF, TargetCompany, TaRRaK, Team XRat, Telecrypt, TellYouThePass, Termite,
   TeslaCrypt 0.x, TeslaCrypt 2.x, TeslaCrypt 3.0, TeslaCrypt 4.0, Teslarvng,
   TeslaWare, TFlower, Thanatos, Thanos, The DMR, TheDarkEncryptor, THIEFQuest,
   THT Ransomware, ThunderCrypt / Lorenz, ThunderX / Ranzy, tk, Tongda,
   Torchwood, TotalWipeOut, TowerWeb, ToxCrypt, Trigona, Tripoli,
   Trojan.Encoder.6491, Troldesh / Shade, Tron, TrueCrypter, TrumpLocker,
   TurkStatik, Tycoon 2.0 / 3.0, U-Bomb, UCCU, UIWIX, Ukash, UmbreCrypt,
   UnblockUPC, Ungluk, Unit09, Unknown Crypted, Unknown Lock, Unknown XTBL,
   Unlock26, Unlock92, Unlock92 2.0, Unlock92 Zipper, UnluckyWare, Useless Disk,
   UselessFiles, UserFilesLocker, USR0, Uyari, V8Locker, Vaggen, Vapor v1,
   Vash-Sorena, VaultCrypt, vCrypt, VCrypt, Vega / Jamper / Buran, Velso,
   Vendetta, VenisRansomware, Venus, VenusLocker, VHD Ransomware, ViACrypt,
   VindowsLocker, VisionCrypt, VMola, Vohuk, VoidCrypt, Vortex, Vovalex, Vurten,
   VxLock, Waffle, Waiting, Waldo, WannaCash, WannaCash 2.0, WannaCry,
   WannaCry.NET, WannaCryFake, WannaCryOnClick, WannaDie, WannaPeace, WannaRen,
   WannaScream, WannaSmile, WannaSpam, WastedBit, WastedLocker, Wesker,
   WhatAFuck, WhisperGate, WhiteBlackCrypt, WhiteRabbit, WhiteRose, WHM
   Ransomware, WildFire Locker, WininiCrypt, Winnix Cryptor, WinRarer, WinTenZZ,
   WonderCrypter, WoodRat, Wooly, Wulfric, X Locker 5.0, XCry, XCrypt, XData,
   XerXes, XiaoBa, XiaoBa 2.0, XMRLocker, Xorist, Xort, XRTN, XTP Locker 5.0,
   XYZWare, Yanluowang, Yatron, Yogynicof, YouAreFucked, YourRansom, Yyto, Z3,
   ZariqaCrypt, zCrypt, Zekwacrypt, Zenis, Zeon, Zeoticus, Zeoticus 2.0,
   Zeppelin, ZeroCrypt, ZeroFucks, Zeronine, Zeropadypt, Zeropadypt NextGen /
   Ouroboros, ZeroRansom, Zhen, Ziggy, Zilla, ZimbraCryptor, ZinoCrypt,
   ZipLocker, Zipper, Zoldon, Zorab, ZQ, Zyklon

 * KÖNNT IHR MEINE DATEN ENTSCHLÜSSELN?
   
   Nein. Dieser Dienst ist grundsätzlich zum Identifizieren, welche Ransomware
   deine Daten verschlüsselt haben könnte. Der Dienst versucht dich in die
   richtige Richtung zu führen und lässt dich wissen, ob es einen bekannten Weg
   gibt, deine Dateien zu entschlüsseln. Im Übrigen, es gibt keine
   automatisierten Wiederherstellungs-Versuche, da jeder Fall unterschiedlich
   ist.

 * WERDEN MEINE DATEN VERTRAULICH BEHANDELT?
   
   Alle hochgeladenen Dateien werden sofort mit der Signaturen-Datenbank
   überprüft. Falls Ergebnisse gefunden werden, werden die Dateien sofort
   gelöscht. Falls keine Ergebnisse gefunden werden, können die hochgeladenen
   Dateien mit vertrauenswürdigen Malware-Analysten geteilt, um bei zukünftigen
   Erkennungen zu helfen oder neue Ransomware zu identifizieren.
   
   Daten werden zum Server über SSL hochgeladen, somit kann die Verbindung nicht
   von Dritten abgehört werden.
   
   Somit kann ich nicht zu 100% garantieren, dass Dateien vertraulich behandelt
   werden. Die Daten werden temporär auf einem shared Server gespeichert und ich
   bin nicht dafür verantwortlich, was ansonsten mit diesen Daten gemacht wird.
   
   Any email addresses or BitCoin addresses found in files uploaded to ID
   Ransomware may be stored and shared with trusted third parties or law
   enforcement. No personally identifiable data is stored.

 * WAS WENN ICH MEHRERE ERGEBNISSE HABE?
   
   Viele Ransomwares haben ähnliche "Signaturen" gemeinsam, wie die gemeinsame
   Nutzung der selben Dateierweiterung. Das macht es in manchen Fällen schwierig
   zu 100% sicher zu sein. Ergebnisse werden nach der Anzahl der
   Übereinstimmungen sortiert, um zu belegen, dass es eine bestimmte Ransomware
   sein könnte.

 * KANN ICH EINE PROBE DER MALWARE ODER VERDÄCHTIGE DATEIEN HOCHLADEN?
   
   Nein. Dieser Dienst wird nur die Lösegeldforderung und die verchlüsselten
   Dateien auswerten um die Ransomware zu bestimmen. Für eine statische oder
   verhaltensbezogene Analyse kannst du Dateien an VirusTotal or HybridAnalysis
   senden.

 * CAN I DONATE?
   
   ID Ransomware is, and always will be, a free service to the public. It is
   currently a personal project that I have created to help guide victims to
   reliable information on a ransomware that may have infected their system.
   Other than direct development and signature additions to the website itself,
   it is an overall community effort.
   
   I do not ask for any money for my services. I do, however, highly recommend
   investing in a proper backup to prevent you from becoming a victim in the
   future - ransomware is not the only cause of data loss! There are several
   easy and affordable cloud services available that offer great precautions
   against a ransomware attack, among other disasters.
   
   However, if I or this website have helped you, and you really do wish to give
   back, feel free to toss a dollar or two my way to help with hosting costs.
   
   
   
   
   BTC: 3GqFGkBzgJ74jLLx5xWz2d9fabb9U2P8kL

© Copyright 2024 MalwareHunterTeam. Alle Rechte vorbehalten.

App v1.10.1, Aktualisiert 03/19/2024
Programmiert von Demonslay335