BACROP_ListCWall
By Guest, 01/27/2015
- 70 downloads
- Updated:
File Details
- Website URL http://www.bleepingcomputer.com/download/listcwall/
- User Agent
- Category BACROP\Portable\02 Analyze\Pre Analysis
- User Notes BleepingComputer Review: ListCWall, or ListCryptoWall, is a small utility that can be used to export the list of files encrypted by the CryptoWall ransomware infection. When CryptoWall infects your computer it will encrypt your data and store a list of these encrypted files in your Windows Registry. ListCWall will export a sorted list of infected files into a text file so that you can easily find affected files. Using ListCWall is easy. Simply download the program to a location on your hard drive and double-click on it. Once started, ListCWall will scan the Windows Registry for the registry key associated with CryptoWall. If one is found it will export the list of encrypted files to a log file named ListCWall.txt that will be located on your Windows desktop. You can then use this file to learn what files have been encrypted and then attempt to restore them from backups or using other methods.
(Show)XML Contents
<?xml version="1.0" encoding="utf-8"?> <Jobs> <ApplicationJob xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" Guid="3d6fbde8-9399-4b0a-8c3c-63d577814bab"> <WebsiteUrl>http://www.bleepingcomputer.com/download/listcwall/</WebsiteUrl> <UserAgent/> <UserNotes>BleepingComputer Review: ListCWall, or ListCryptoWall, is a small utility that can be used to export the list of files encrypted by the CryptoWall ransomware infection. When CryptoWall infects your computer it will encrypt your data and store a list of these encrypted files in your Windows Registry. ListCWall will export a sorted list of infected files into a text file so that you can easily find affected files. Using ListCWall is easy. Simply download the program to a location on your hard drive and double-click on it. Once started, ListCWall will scan the Windows Registry for the registry key associated with CryptoWall. If one is found it will export the list of encrypted files to a log file named ListCWall.txt that will be located on your Windows desktop. You can then use this file to learn what files have been encrypted and then attempt to restore them from backups or using other methods.</UserNotes> <LastFileSize>428792</LastFileSize> <LastFileDate>2015-01-06T11:59:42-07:00</LastFileDate> <IgnoreFileInformation>false</IgnoreFileInformation> <DownloadBeta>Default</DownloadBeta> <DownloadDate xsi:nil="true"/> <CheckForUpdatesOnly>false</CheckForUpdatesOnly> <VariableChangeIndicator/> <CanBeShared>true</CanBeShared> <ShareApplication>true</ShareApplication> <ExclusiveDownload>false</ExclusiveDownload> <HttpReferer/> <SetupInstructions/> <Variables> <item> <key> <string>url</string> </key> <value> <UrlVariable> <RegexRightToLeft>false</RegexRightToLeft> <VariableType>StartEnd</VariableType> <Regex/> <Url>http://www.bleepingcomputer.com/download/listcwall/</Url> <StartText>dl_but_choice"> <a href="</StartText> <EndText>"><img src="http</EndText> <Name>url</Name> </UrlVariable> </value> </item> <item> <key> <string>dl</string> </key> <value> <UrlVariable> <RegexRightToLeft>false</RegexRightToLeft> <VariableType>RegularExpression</VariableType> <Regex>[^"'=]+\.exe</Regex> <Url>{url}</Url> <StartText>please <a href='</StartText> <EndText>'>click here</a></EndText> <Name>dl</Name> </UrlVariable> </value> </item> <item> <key> <string>version</string> </key> <value> <UrlVariable> <RegexRightToLeft>false</RegexRightToLeft> <VariableType>StartEnd</VariableType> <Regex/> <Url>http://www.bleepingcomputer.com/download/listcwall/</Url> <StartText>"softwareVersion"></StartText> <EndText></span> </EndText> <Name>version</Name> </UrlVariable> </value> </item> </Variables> <ExecuteCommand/> <ExecutePreCommand/> <ExecuteCommandType>Batch</ExecuteCommandType> <ExecutePreCommandType>Batch</ExecutePreCommandType> <Category>BACROP\Portable\02 Analyze\Pre Analysis</Category> <SourceType>FixedUrl</SourceType> <PreviousLocation/> <DeletePreviousFile>true</DeletePreviousFile> <Enabled>true</Enabled> <FileHippoId/> <LastUpdated>2015-01-29T01:58:10.9367972-07:00</LastUpdated> <TargetPath>{startuppath}{category}\{appname}.exe</TargetPath> <FixedDownloadUrl>{dl}</FixedDownloadUrl> <Name>BACROP_ListCWall</Name> </ApplicationJob> </Jobs>