Денис,
добавьте несколько зашифрованных файлов,
+
добавьте образ автозапуска системы
http://forum.esetnod32.ru/forum9/topic2687/
+
если сохранился источник заражения (а скорее всего это письмо с вложенным документом),
перешлите в почту
[email protected] с паролем infected
судя по материалам BC расшифровки нет в настоящее время:
[QUOTE]A new ransomware has been discovered called Locky that encrypts your data using AES encryption and then demands .5 bitcoins to decrypt your files. Though the ransomware sounds like one named by my sons, there is nothing childish about it. It targets a large amount of file extensions and even more importantly, encrypts data on unmapped network shares. Encrypting data on unmapped network shares is trivial to code and the fact that we saw the recent DMA Locker with this feature and now in Locky, it is safe to say that it is going to become the norm. Like CryptoWall, Locky also completely changes the filenames for encrypted files to make it more difficult to restore the right data.
At this time, there is no known way to decrypt files encrypted by Locky.[/QUOTE]
детекты по нему такие:
https://www.virustotal.com/ru/file/ee6abe4a9530b78e997d9c28394356216778eaf2d46aa350
3999e7d6bfbefe90/analysis/