If you came across an infection called AutoEncryptor Ransomware, we advise you to pay no attention to the displayed warning and get rid of this malicious program as fast as possible. To assist you with this task we are placing step by step deletion instructions that can help you remove the malware manually. Paying the ransom is always risky, but in this case, it might be impossible since the requested price is not something most of the computer users could pay. On the other hand, AutoEncryptor Ransomware may not damage a lot of important files, so we would not advise risking your money even if the price was extremely small. If you wish to know more details about this malicious application, we urge you to keep reading the article as further in the text we will tell you how it could infect the system and which files it may damage.
It is yet unknown if the malware is being spread, but if it is, AutoEncryptor Ransomware could travel with suspicious Spam emails. After all, it is still one of the most popular ways to distribute such threats. Unsuspecting users may launch malicious attachments out of curiosity as there might be no letter next to them. However, some cyber criminals pretend to be from the bank or other institution to convince the user to open the infected file. Sadly, once you launch it, there could be no going back since the malware might quickly install itself and take your data as a hostage.
The version tested by our specialists was written in .NET framework, so it looks like AutoEncryptor Ransomware might be still unfinished. Also, we noticed that the malicious application does not connect to any server and gives an invalid email address for contact information. Another thing that shows the malware could be still in the development stage is the fact it's displayed warning demands for a ridiculous amount of money. To be more precise, it offers a decryption tool for 10 000 BTC. At the moment of writing, 1 BTC is 1.238 US dollars, so if you convert the whole sum, you should get more than twelve million US dollars. We do not think anyone would pay such a huge amount, but even if there were users who could pay it, making the payment would be impossible as the warning does not say where to transfer the money.
As soon as AutoEncryptor Ransomware settles in it should locate the paths %USERPROFILE\%My Pictures, %USERPROFILE%\Desktop, %USERPROFILE%\Documents, %PUBLIC%\Pictures and begin encrypting all files with .ini, .jpg, .zip, .exe, .lnk, .reg, .txt, .dll, .xml, .dat, .js and other extensions. To lock the mentioned data, the malware might be using a secure cryptosystem called AES-256. Without a decryption key there it might be impossible to decipher encrypted files. Nonetheless, instead of trying to unlock the damaged files, you could simply replace them with copies. Of course, for you to be able to do so you need to have copies that were made before the infection appeared.
Before attempting to recover the enciphered files, we would advise you to secure the system and eliminate AutoEncryptor Ransomware. The malware creates quite a lot of data in lots of different directories, so removing it manually might appear to be slightly complicated. Still, if you think you are up to the task, we offer you the deletion instructions placed below the text. There is also one other way to deal with this malicious application. If you prefer automated tools, you could get a trustworthy security tool and perform a system scan with it. When the antimalware tool finishes detecting threats, you could remove them all at once with a single mouse click.