Ransomware attacks can be crippling if they happen to you. If you’re hit by ransomware, don’t pay the ransom. Use these ransomware decryptors, backups, and other tools to start recovery. Here is a list of steps you need to take:
- Download our ransomware response kit
- Identify your ransomware variant by visiting ID Ransomware
- Utilize the free ransomware decrypter tools listed below
- Try to restore from a backup
- Protect yourself from future attacks with Canauri™
The Definitive Collection of Ransomware Decryption Tools on the Web
We have scoured the web and created the largest collection of ransomware decryptors and decryption tools available. These tools may help you to decrypt your files without having to pay the ransom. This list is updated regularly so if the decrypter or tool you need isn’t available check back in the future and it may be available.
Feel free to contact us if you have questions about these tools or have been subject to an attack and need help figuring out what to do next.
Decryptor Download | Read Me | Encrypted File Extension | Creator/Contributor |
---|---|---|---|
Cute | Instructions | aaaddress1 | |
my-Little-Ransomware | Instructions | aaaddress1 | |
AES_NI | Instructions | *.aes_ni, *.aes256, *.aes_ni_0day | Avast |
Alcatraz Locker | Instructions | *.Alcatraz | Avast |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | Avast |
ApocalypseVM | Instructions | *.encrypted, *.FuckYourData, *.Encryptedfile, *.SecureCrypted | Avast |
BadBlock | Instructions | Doesn't change file extension. Look for BadBlock in ransom note (32-Bit) | Avast |
BadBlock | Instructions | Doesn't change file extension. Look for BadBlock in ransom note (64-Bit) | Avast |
Bart | Instructions | *.bart.zip | Avast |
BigBobRoss | Instructions | *.obfuscated | Avast |
BTCWare | Instructions | *.btcware, *.cryptobyte, *.cryptowin, *.theva, *.onyon | Avast |
Crypt888 | Instructions | This ransomware adds Lock. to the beginning of file names | Avast |
CryptFile2 | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl | Avast |
CryptoMix (Offline) | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl, *.MOLE | Avast |
CryptoShield | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl, *.MOLE | Avast |
Zeta | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl | Avast |
Crysis | Instructions | *[email protected], *[email protected], *[email protected], *[email protected], *.{[email protected]}.CrySiS, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.dharma, *.{[email protected]}.dharma, *.wallet | Avast |
EncrypTile | Instructions | The ransomware adds the word "encryptTile" into a file name | Avast |
EncrypTile | Instructions | *.EncrypTile | Avast |
FindZip | Instructions | *.crypt | Avast |
GandCrab | Instructions | *.GDCB, *.CRAB, *.KRAB, *.%RandomLetters% | Avast |
Globe | Instructions | *.ACRYPT, *.GSupport[0-9], *.blackblock, *.dll555, *.duhust, *exploit, *.frozen, *.globe, *.gsupport, *.kyra, *.purged, *.raid[0-9], *[email protected], *.xtlb, *.zendrz, *.zendr[0-9], *.hnyear | Avast |
HiddenTear | Instructions | *.locked, *.34xxx, *.bloccato, *.BUGSECCCC, *.Hollycrypt, *.lock, *.saeid, *.unlockit, *.razy, *.mecpt, *.monstro, *.lok, *.암호화됨, *.8lock8, *.fucked, *.flyper, *.kratos, *.drypted, *.CAZZO, *.doomed | Avast |
Jigsaw | Instructions | *.kkk, *.btc, *.gws, *.J, *.encrypted, *.porno, *.payransom, *.pornoransom, *.epic, *.xyz, *.versiegelt, *.encrypted, *.payb, *.payb, *.pays, *.payms, *.paymds, *,paymts, *.payrms, *.payrmts, *.paymrts, *.paybtcs, *.fun, *.hush, *[email protected], *.gefickt | Avast |
LambdaLocker | Instructions | *.MyChemicalRomance4EVER | Avast |
Legion | Instructions | *[email protected]$.legion, *[email protected]$.cbf | Avast |
NoobCrypt | Instructions | NoobCrypt doesn't change the file name. Leaves "ransomed.html" message | Avast |
Stampado | Instructions | *.locked | Avast |
SZFLocker | Instructions | *.szf | Avast |
TeslaCrypt | Instructions | The latest version of TeslaCrypt doesn't rename files. | Avast |
XData | Instructions | *.~xdata~ | Avast |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | AVG |
ApocalypseVM | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | AVG |
BadBlock 32-Bit | Instructions | Doesn't change file extension. Look for BadBlock in ransom note | AVG |
BadBlock 64-Bit | Instructions | Doesn't change file extension. Look for BadBlock in ransom note | AVG |
Bart | Instructions | *.bart.zip | AVG |
Crypt888 | Instructions | This ransomware adds Lock. to the beginning of file names | AVG |
MirCop | Instructions | Lock.{Original file name} | AVG |
Legion | Instructions | *[email protected]$.legion, *[email protected]$.cbf or *[email protected]$.cbf to end of filename | AVG |
SZFLocker | Instructions | *.szf | AVG |
TeslaCrypt | Instructions | Decryptor for variant that doesn't rename files | AVG |
Annabelle | Instructions | *.ANNABELLE | BitDefender |
Bart | *.Bart | BitDefender | |
GandCrab (V1, V4 and V5 up to V5.2 versions) | Instructions | *.GDCB, *.CRAB, *.KRAB, *.%RandomLetters% | BitDefender |
Juicy Lemon | Instructions | *.id-{number}[email protected] | Bleeping Computer |
PizzaCrypts | Instructions | *.id-{number}_, .id-{number}[email protected], .id-{number}_*@juicylemon.biz*protonmail.com*, .id-{number}_*@juicylemon.biz_BitMessage_* | Bleeping Computer |
ODCODC | Instructions | *.odcodc | Bleeping Computer |
Cryptorbit | Instructions | locks files and creates HowDecrypt.txt and HowDecrypt.gif | Bleeping Computer |
Operation Global III | Instructions | *.exe | Bleeping Computer |
BitStak | Instructions | *.bitstak | Bleeping Computer |
GhostCrypt | Instructions | *.Z81928819 | Bleeping Computer |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Bleeping Computer |
Princess Locker | Instructions | Ransomware appends random characters to the file extension | Bleeping Computer |
Aurora | Instructions | *.Nano | Bleeping Computer |
FilesLocker v1 and v2 | Instructions | *.[[email protected]] | Bleeping Computer |
Everbe | Instructions | *.insane, *.DUESCRYPT, *.deuscrypt, *.Tornado, *.twist, *.everbe, *.embrace, *.pain, *.volcano | Bleeping Computer |
InsaneCrypt | Instructions | *.[[email protected]].everbe, *.embrace, *.pain | Bleeping Computer |
Annabelle | Instructions | *.ANNABELLE | Bleeping Computer |
CryptoDevil | Instructions | *.devil | Bleeping Computer |
Zyka | Instructions | *.lock | Bleeping Computer |
Unlock92 | Instructions | *.CRRRT | Bleeping Computer |
CryptoHost | CryptoHost | Detected as Ransom:MSIL/Manamecrypt.A and Ransom_CRYPTOHOST.A. | Bleeping Computer |
TorrentLocker | Instructions | *.encrypted, *.enc | Bleeping Computer |
Alpha | Instructions | *.encrypt | BleepingComputer |
BitKangaroo | Instructions | *.bitkangaroo | BleepingComputer |
Crypt38 | Instructions | *.crypt38 | BleepingComputer |
DCry | Instructions | *.dcry | BleepingComputer |
MicroCop | Instructions | Adds Locked to the beginning of your encrypted files | BleepingComputer |
Mole02 | Instructions | N/A | BleepingComputer |
Offline CryptoMix | Instructions | *.CRYPTOSHIELD, *.scl, *.rscl, *.lesli, *.rdmk, *.code, *.rmd | BleepingComputer |
PowerLocky | Instructions | *.locky | BleepingComputer |
StrikedDecrypter | Instructions | *[email protected],*[email protected], *[email protected], *[email protected], *[email protected], *[email protected], *[email protected] | BleepingComputer |
AnDROid | Instructions | *.android | BleepingComputer |
Anti-DDos | Instructions | *.f*cked | BleepingComputer |
Crypt0 | Instructions | *_crypt0 | BleepingComputer |
Crypto-Blocker | Instructions | *.corrupted | BleepingComputer |
CryptoLocker by NTK | Instructions | *.powned | BleepingComputer |
CryptoSomware | Instructions | *.FailedAccess | BleepingComputer |
DeriaLock | Instructions | *.deria | BleepingComputer |
DoNotOpen | Instructions | *.killedXXX | BleepingComputer |
EnkripsiPC | Instructions | *.bleeped | BleepingComputer |
F*ckTheSystem | Instructions | *.anon | BleepingComputer |
Harzhuangzi | Instructions | *.Harzhuangzi | BleepingComputer |
Haters | Instructions | *.haters | BleepingComputer |
Hitler | Instructions | *.Nazi | BleepingComputer |
JeepersCrypt | Instructions | *.jeepers | BleepingComputer |
Manifestus | Instructions | *.f*cked | BleepingComputer |
Mikoyan | Instructions | *.MIKOYAN | BleepingComputer |
NullByte | Instructions | *._nullbyte | BleepingComputer |
SnakeEye | Instructions | *.SnakeEye | BleepingComputer |
Xncrypt | Instructions | *.xncrypt | BleepingComputer |
Mole | Instructions | *.mole | CERT-PL |
BarRax | Instructions | *.barrax | Check Point |
Merry X-Mas | Instructions | *.PEGS1, *.MRCR1, *.RARE1, *.MERRY, *.RMCM1 | Check Point |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Check Point |
Pylocky | Instructions | RANSOM_PYLOCKY.A | Cisco |
TeslaCrypt | Instructions | {original file name}.ECC | Cisco |
Thanatos | Instructions | *.THANATOS | Cisco |
Nanolocker | Instructions | Cyberclues | |
Popcorn | Instructions | *.filock | Elevenpaths |
Decrypt Protect | Instructions | *.html | Emsisoft |
777 | Instructions | *.777 | Emsisoft |
Al-Namrood | Instructions | *.unavailable, *.disappeared | Emsisoft |
Amnesia2 | Instructions | *.amnesia | Emsisoft |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.Encryptedfile, *.SecureCrypted | Emsisoft |
ApocalypseVM | Instructions | *.encrypted, *.locked | Emsisoft |
Aurora | Instructions | *.Aurora, *.aurora, *.animus, *.cryptoid, *.peekaboo, *.isolated, *.infected, *.locked | Emsisoft |
AutoLocky | Instructions | *.locky | Emsisoft |
BadBlock | Instructions | Doesn't change file extension. Look for BadBlock in ransom note | Emsisoft |
Cry128 | Instructions | *.fgb45ft3pqamyji7.onion.to._ or *.id_ | Emsisoft |
Cry9 | Instructions | *.fgb45ft3pqamyji7.onion.to._, 8.id__gebdp3k7bolalnd4.onion._, *.id__2irbar3mjvbap6gt.onion.to._, *.id-_[qg6m5wo7h3id55ym.onion.to].63vc4 | Emsisoft |
CrypBoss | Instructions | *.crypt, *.R16M01D0 | Emsisoft |
CryptInfinite | Instructions | *.CRINF | Emsisoft |
CryptoDefense | Instructions | Identifes as CryptoDefense leaves note HOW_DECRYPT.txt | Emsisoft |
Crypton | Instructions | *.id-_locked, *.id-_locked_by_krec, *.id-_locked_by_perfect, *.id-_x3m, *.id-_r9oj, *[email protected], *[email protected]_, *[email protected]_, *[email protected]_, *[email protected]_,*[email protected]_ | Emsisoft |
Damage | Instructions | *.damage | Emsisoft |
DMALocker | Instructions | DMALocker with ID “DMALOCK 41:55:16:13:51:76:67:99 | Emsisoft |
DMALocker2 | Instructions | DMALocker2 with ID “DMALOCK 43:41:90:35:25:13:61:92 | Emsisoft |
Fabiansomware | Instructions | *.encrypted | Emsisoft |
FenixLocker | Instructions | *[email protected]!! | Emsisoft |
GetCrypt | Instructions | Appends a random 4-character extension to files | Emsisoft |
Globe | Instructions | *.purge, *.globe, *[email protected].!dsvgdfvdDVGR3SsdvfEF75sddf#xbkNY45fg6}P{cg.xtbl. | Emsisoft |
Globe2 | Instructions | *.raid10, *.blt, *.globe, *.encrypted,*[[email protected]] | Emsisoft |
Globe3 | Instructions | *.decrypt2017, *.hnumkhotep | Emsisoft |
GlobeImposter | Instructions | *.crypt | Emsisoft |
Gomasom | Instructions | *.crypt | Emsisoft |
Harasom | Instructions | *.html and note from Spamhaus or US Department of Justice | Emsisoft |
HKCrypt | Instructions | *.hacked | Emsisoft |
HydraCrypt | Instructions | *.hyrdacrypt, *.umbrecrypt | Emsisoft |
UmbreCrypt | Instructions | *.hydracrypt, *.umbrecrypt | Emsisoft |
ImS00rry | Instructions | Emsisoft | |
JSWorm 4.0 | Instructions | *.[ID-9LF5BNP][[email protected]].JSWRM | Emsisoft |
JSWorm | Instructions | *.[ID.194958][[email protected]].JSWORM | Emsisoft |
KeyBTC | Instructions | Leaves ransom note called Decrypt_Your_Files.txt on your system that asks you to contact [email protected] for decryption. | Emsisoft |
LeChiffre | Instructions | *.LeChiffre and the ransom note asks you to contact [email protected] via email. | Emsisoft |
Instructions | *.lcphr | Emsisoft | |
Marlboro | Instructions | *.oops | Emsisoft |
MegaLocker | Instructions | *.nampohyu | Emsisoft |
MRCR or Merry X-Mas | Instructions | *.PEGS1, *.MRCR1, *.RARE1, *.MERRY, *.RMCM1 | Emsisoft |
Nemucod | Instructions | *.crypted and you find a ransom note named DECRYPT.txt on your desktop. | Emsisoft |
NemucodAES | Instructions | Does not change file extension and a ransom note named "DECRYPT.hta" can be found on your desktop. | Emsisoft |
NMoreira | Instructions | *.maktub, *._AiraCropEncrypted! | Emsisoft |
OpenToYou | Instructions | *[email protected] | Emsisoft |
OzozaLocker | Instructions | *.locked With a ransom note named "HOW TO DECRYPT YOU FILES.txt" on your desktop. Note is from [email protected] | Emsisoft |
PClock | Instructions | Doesn't change extension look for enc_files.txt | Emsisoft |
Pewcrypt | Instructions | *.PewCrypt | Emsisoft |
Philadelphia | Instructions | *.locked | Emsisoft |
Planetary | Instructions | *.mira | Emsisoft |
Radamant | Instructions | *.rdm, *.rrk | Emsisoft |
Stampado | Instructions | *.locked Known variants of this ransomware ask victims to contact [email protected], [email protected], [email protected], [email protected] or [email protected] | Emsisoft |
Syrk | Instructions | *.Syrk | Emsisoft |
Xorist | Instructions | *.EnCiPhErEd, *.0JELvV, *.p5tkjw, *.6FKR8d, *.UslJ6m, *.n1wLp0, *.5vypSa, *.YNhlv1 | Emsisoft |
ZQ | Instructions | *.zq | Emsisoft |
WannaCryFake | Instructions | *.wannacry | Emsisoft |
Avest | Instructions | *.ckey().email().pack14 | Emsisoft |
TeslaCrypt | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | ESET |
Virlock | Instructions | *.exe | ESET |
Crysis | Instructions | *.xtbl, *.crysis, *.crypt, *.lock, *.crypted, *.dharma, *.wallet, *.onion | ESET |
Simplocker | Instructions | ESET | |
Trustezeb | Instructions | ESET | |
Mira | Instructions | *.mira | F-Secure |
TeslaCrypt | Instructions | *.vvv, *.ccc, *.zzz, *.aaa, *.abc | Googulator |
7even-HONE$T | Python Script | {sequential number}.R4A or{sequential number}.R5A | hasherezade |
Bitcryptor | Instructions | .cvlst | Kaspersky |
Agent.iih | Instructions | Kaspersky | |
Aura | Instructions | Kaspersky | |
AutoIT | Instructions | {Original Filename}@<mail server>_.<random_set_of_characters>. | Kaspersky |
AutoLT | Instructions | Renames files "<original_name>@<mail server>_.<random_set_of_characters>" | Kaspersky |
Bitman v.3 | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | Kaspersky |
Bitman v.4 | Instructions | Does not change file extension. | Kaspersky |
Cerber | Instructions | {10 random characters}.cerber | Kaspersky |
Chimera | Instructions | {Original file name}.crypt | Kaspersky |
Cryptokluchen | Instructions | Kaspersky | |
Crysis | Instructions | id}.{email address}.xtbl, crypt | Kaspersky |
Democry | Instructions | *._date-time_$address@domain$.777 OR *._date-time_$address@domain$.legion | Kaspersky |
Dharma | Instructions | *.wallet | Kaspersky |
Jaff | Instructions | *.Jaff | Kaspersky |
Lamer | Instructions | Kaspersky | |
Lobzik | Instructions | *.fun, *.gws, *.btc, *.AFD, *.porno, *.pornoransom, *.epic, *.encrypted, *.J, *.payransom, *.paybtcs, *.paymds, *.paymrss, *.paymrts, *.paymst, *.paymts, *.payrms | Kaspersky |
Lortok | Instructions | *.crime | Kaspersky |
Pletor | Instructions | Kaspersky | |
Rakhni | Instructions | *.locked, *.kraken | Kaspersky |
Rotor | Instructions | *[email protected]____.tar, *[email protected]____.tar | Kaspersky |
TeslaCrypt v3 | Instructions | {original file name}.XXX or TTT or MP3 or MICRO | Kaspersky |
TeslaCrypt v4 | Instructions | File name and extension are unchanged | Kaspersky |
XData | Instructions | *.~xdata~ | Kaspersky |
AutoLT | Instructions | Renames files "<original_name>@<mail server>_.<random_set_of_characters>" | Kaspersky |
Cryakl | Instructions | Infected with Trojan-Ransom.Win32.Cryakl (also tags end of file name with{CRYPTENDBLACKDC}) | Kaspersky |
Crybola | Instructions | Infected with Trojan-Ransom.Win32.Crybola | Kaspersky |
CryptXXX v1 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
CryptXXX v2 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
CryptXXX v3 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
Fury | Instructions | Infected with Trojan-Ransom.Win32.Fury | Kaspersky |
Marsjoke | Instructions | *.a19 or *p19 | Kaspersky |
Polyglot | Instructions | Infected with Trojan-Ransom.Win32.Polyglot | Kaspersky |
Rannoh | Instructions | Renames files "locked-<original_name>.<four_random_letters>" | Kaspersky |
Shade | Instructions | *.xtbl, *.ytbl, *.breaking_bad, *.heisenberg | Kaspersky |
Wildfire | Instructions | *.wflx | Kaspersky |
Xorist | Instructions | *.xorist (or adds a random extension) | Kaspersky |
Rector | Instructions | Trojan-Ransom.Win32.Rector | Kaspersky |
Scraper | Instructions | Trojan-Ransom.Win32.Scraper | Kaspersky |
Crysis | Instructions | *[email protected], *[email protected], *[email protected], *[email protected], *.{[email protected]}.CrySiS, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.dharma, *.{[email protected]}.dharma, *.wallet | Kaspersky |
CoinVault | Instructions | *.cvlst | Kaspersky |
FortuneCrypt | Instructions | Kaspersky | |
Yatron | Instructions | *.yatron | Kaspersky |
Petya | Instructions | leo-stone | |
TeslaCrypt | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | McAfee |
TeslaCrypt V3 | Instructions | *.mp3, *.micro, *.xxx, *.ttt | McAfee |
PoshCoder | PoshCoder | *.locky | pan-unit42 |
Crypren | Instructions | *.encrypted | pekeinfo |
Alma | Instructions | Adds 5 random characters at the end of each file and a unique 8 character victim ID | PHISHLABS |
Lock Screen USB | Instructions | Lockscreen ransomware | Trend Micro |
Lock Screen | Instructions | Lockscreen ransomware | Trend Micro |
777 | Instructions | {Original file name}.777 | Trend Micro |
AutoLocky | Instructions | {Original file name}.locky | Trend Micro |
Cerber .v1 | Instructions | {10 random characters}.cerber | Trend Micro |
Chimera | Instructions | {Original file name}.crypt | Trend Micro |
DemoTool | Instructions | *.demoadc | Trend Micro |
DXXD v.1 | Instructions | {Original file name}.{Original extension}dxxd | Trend Micro |
Globe .v1 | Instructions | {Original file name}.purge | Trend Micro |
Globe .v2 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
Globe v.3 | Instructions | Extension not fixed or file name encrypted | Trend Micro |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Trend Micro |
LeChiffre | Instructions | {Original file name}.LeChiffre | Trend Micro |
MirCop | Instructions | Lock.{Original file name} | Trend Micro |
Nemucod | Instructions | {Original file name}.crypted | Trend Micro |
Purge v.1 | Instructions | {Original file name}.purge | Trend Micro |
Purge v.2 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
Purge v.3 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
SNSLocker | Instructions | {Original file name}.RSNSLocked | Trend Micro |
Stampado | Instructions | *.locked | Trend Micro |
Teamxrat | Instructions | {Original filename}.__xratteamLucked | Trend Micro |
TeleCrypt | Instructions | {Original file name} | Trend Micro |
TeslaCrypt v3 | Instructions | {original file name}.XXX or TTT or MP3 or MICRO | Trend Micro |
TeslaCrypt v4 | Instructions | File name and extension are unchanged | Trend Micro |
XORBAT | Instructions | {Original file name}.crypted | Trend Micro |
Xorist | Instructions | *.xorist (or adds a random extension) | Trend Micro |
Xpan | Instructions | {Original filename}.__xratteamLucked | Trend Micro |
Instructions | {original file name}.ECC | Trend Micro | |
BadBlock | Instructions | Doesn't change file extension. Look for BadBlock in ransom note | Trend Micro |
MacRansom | Instructions | Trend Micro | |
777 | Instructions | *.777 | Trend Micro |
CryptXXX v1 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v2 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v3 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v4 | Instructions | *.5 hexadecimal characters | Trend Micro |
CryptXXX v5 | Instructions | *.5 hexadecimal characters | Trend Micro |
Crysis | Instructions | *[email protected], *[email protected], *[email protected], *[email protected], *.{[email protected]}.CrySiS, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.xtbl, *.{[email protected]}.dharma, *.{[email protected]}.dharma, *.wallet | Trend Micro |
TeslaCrypt V2 | Instructions | {original file name}.VVV, CCC, ZZZ, AAA, ABC, XYZ | Trend Micro |
XRatTeam | Instructions | *.xratteamLucked | Trend Micro |
Ransomware Decryptors List
Find the latest decryption tools, ransomware decryptors, and information on ransomware protection.
What is ransomware? It’s a malware (a Trojan or another type of virus) that locks your device or encrypts your files, and then tells you that you have to pay ransom to get your data back. It’s not cheap, and there’s no guarantee of success. If you become a victim of ransomware, try our free decryption tools and get your digital life back.
These tools can be complicated, so contact us with any questions you have and we’ll be happy to help.
Click on each tool to read more about it and get instructions on how to download and use.