- Home
 - Detectable Ransomware
 - Troldesh
 
Ransomware Research
Troldesh Ransomware
Troldesh is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on September 1, 2015, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Shade.
Quick Facts
- Ransomware Family
 - Troldesh
 - First Seen
 - September 1, 2015
 - Known Aliases
 - Shade
 
How Troldesh Ransomware Works
File Encryption Patterns
Troldesh modifies encrypted files using specific patterns to mark them as encrypted:
File extensions added after encryption:
..xbtl..xtbl..cbtl..no_more_ransom..better_call_saul..windows10..dexter..crypted000007..da_vinci_code..breaking_bad..heisenberg..magic_software_syndicate..crypted000078Ransom Note and Payment Demands
After encrypting files, Troldesh displays ransom notes demanding payment for file recovery:
/^README\d{1,2}\.txt$/Ransom message:
notes/README10.txt
Note locations:
DesktopRootDiscsHow to decrypt your files.txtRansom message:
notes/How to decrypt your files.txt
Note locations:
DesktopStartUpRansom message:
notes/How to decrypt your files.jpg
Note locations:
DesktopRansom message:
notes/How to decrypt your files1.jpg
Note locations:
DesktopRansom message:
notes/How to decrypt your files2.jpg
Note locations:
DesktopRansom message:
notes/How to decrypt your files3.jpg
Note locations:
DesktopRansom message:
notes/How to decrypt your files4.jpg
Note locations:
DesktopRansom message:
notes/FBD1B9FDFBD1B9FD.bmp
Note locations:
DesktopRansom message:
notes/wp.jpg
Note locations:
DesktopRansom message:
notes/HOW TO DECRYPT DATA.jpg
Note locations:
DesktopRansom message:
notes/DECRYPT.jpg
Note locations:
DesktopDECPYPT FILES.txtRansom message:
notes/DECPYPT FILES.txt
Note locations:
DesktopHOW TO DECRYPT DATA.txtRansom message:
notes/HOW TO DECRYPT DATA.txt
Note locations:
DesktopStartUpDecryption instructions.txtRansom message:
notes/Decryption instructions.txt
Note locations:
DesktopStartUpTechnical Indicators
Associated Executable Files
The following executable files are associated with Troldesh ransomware:
csrss.exeCSRSS.ExeCSRSS0.dllClamWinPortable-OYrhgtQ2.exeTPVCGatewayTPVCGateway.exefan.EXEcuteftp.exesserv.jpgWUDFHost.exemyfile.exeMSBuild.exe1c.jpgcsrss(188).gxe1c_1_.jpg6DYO88DN.exefan.EXEcenturion_legion@aol.com.exeschet.23.05.doc.exeQki2.dotU1Midlpu.xltbaba all.exebabaalll.exeexecutable.exePayload1.exePayload.exesetap2.exeninja_gaiver@aol.com.exe
Elastio Can Help You
Don't let Troldesh ransomware take over your data
Elastio provides advanced ransomware protection and recovery solutions to keep your organization safe.
About This Analysis
This Troldesh ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery solutions, helping organizations defend against and recover from ransomware attacks like Troldesh.
Last updated: October 30, 2025
Recent Ransomware
Explore other threats in our database