Any files that are encrypted with Proton Ransomware will have an .[<email>].[random 4-5 char] extension to include .c77l, .ZENEX, .SWIFT appended to the end of the encrypted data filename and typically leave files (ransom notes) named #Restore-files.txt, #Zenex-Help.txt, #SWIFT-Help.txt. These are some examples.
.[decrypt.computer@gmail.com].c77L .[decrypthelp0@gmail.com].ZENEX .[swift_1@tutamail.com].SWIFT
Kigatsu@tutanota.com Kigatsu@mailo.com Telegram: @ransom70 Kigatsu@onionmail.com Kigatsu@mailo.com Telegram: @ransom70 DoraRec@onionmail.org DoraRec@msgsafe.io RecoverProtonData@gmail.com Telegram: @RecoverProton Cyberexploit.59@gmail.com Cybererror.59@gmail.com filesupport@airmail.cc proton@onionmail.org contact.encryptor@gmail.com contact.decryptor@gmail.com helpdec10@decoymail.com helpdecfile1@onionmail.org vpsadminmain12@onionmail.org vpsadminmain13@onionmail.org HarpyRage@onionmail.org HarpyRage@cyberfear.com Telegram: @HarpyRage drhelper4@gmail.com jouniorfile@gmail.com decryption38@gmail.com keyseller@zohomail.eu keyseller@mailfence.com Decrypt.computer@gmail.com Decrypt.network@gmail.com swift_1@tutamail.com swift@onionmail.com Telegram: @swift_support decrypthelp0@gmail.com cryptblack@mailfence.com
Unidentified ransomware on Windows has encrypted data files and renamed them like this:
filename.txt > filename.txt.[Decrypt.computer@gmail.com].c77L
example original filesize: 122 340 bytes, encrypted: 122 516 bytes
A ransomnote named "#Restore-files.txt" is left on each disk with encrypted files.
The ransomnote includes the following:
Personal ID: D97ED7F82CED120F
Primary Email: Decrypt.computer@gmail.com
Secondary Email: Decrypt.network@gmail.com