OzozaLocker Ransomware Decrypter

OzozaLocker Ransomware Decrypter

If your computer has been infected by the OzozaLocker Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

OzozaLocker Decrypter (Emsisoft)
Use this decrypter if your files have been renamed to *.locked and you find a ransom note named “HOW TO DECRYPT YOU FILES.txt” on your desktop. Double clicking an encrypted file will also display a message box instructing you to contact “[email protected]”. To use the decrypter you will require an encrypted file of at least 510 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.

Contact us Now 319-227-7000

2017-03-16T16:43:37-05:00|Ransomware|0 Comments

Globe2 Ransomware Decrypter

Globe2 Ransomware Decrypter

If your computer has been infected by the Globe2 Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Globe2 Decrypter (Emsisoft)
Globe2 is a ransomware kit that was first discovered at the beginning of October. Globe2 encrypts files and optionally file names using RC4. Since the extension of encrypted files is configurable, several different file extensions are possible. The most commonly used extensions are .raid10, .blt, .globe, .encrypted and .[[email protected]]. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory. If file names are encrypted, please use the file size to determine the correct file. Encrypted and original file will have exactly the same size.

Contact us Now 319-227-7000

2017-02-02T12:27:57-06:00|Ransomware|0 Comments

Globe Ransomware Decrypter

Globe Ransomware Decrypter

If your computer has been infected by the Globe Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Globe Decrypter (Emsisoft)
Globe is a ransomware kit that was first discovered at the end of August. Files are encrypted using Blowfish. Since the extension of encrypted files is configurable, several different file extensions are possible. The most commonly used extensions are .purge, .globe and [email protected]!dsvgdfvdDVGR3SsdvfEF75sddf#xbkNY45fg6}P{cg.xtbl. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. It is important to use a file pair that is as large as possible, as it determines the maximum file size up to which the decrypter will be able to decrypt your files. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory.

Contact us Now 319-227-7000

2017-02-02T12:26:14-06:00|Ransomware|0 Comments

Al-Namrood Ransomware Decrypter

Al-Namrood Ransomware Decrypter

If your computer has been infected by the Al-Namrood  Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Al-Namrood Decrypter (Emsisoft)
The Al-Namrood ransomware is a fork of the Apocalypse ransomware. The group behind it primarily attacks servers that have remote desktop services enabled. Encrypted files are renamed to *.unavailable or *.disappeared and for each file a ransom note is created with the name *.Read_Me.Txt. The ransomware asks the victim to contact “[email protected]” or “[email protected]”. To decrypt your files the decrypter requires your ID. The ID can be set within the “Options” tab. By default the decrypter will set the ID to the ID that corresponds to the system the decrypter runs on. However, if that is not the same system the malware infection and encryption took place on, make sure to put in the ID as specified in the ransom note.

Contact us Now 319-227-7000

2017-03-16T16:43:37-05:00|Ransomware|0 Comments

FenixLocker Ransomware Decrypter

FenixLocker Ransomware Decrypter

If your computer has been infected by the FenixLocker Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

FenixLocker Decrypter (Emsisoft)
Use this decrypter if your files have been encrypted by the FenixLocker ransomware. FenixLocker encrypts files and renames them by appending the “[email protected]!!” extension. It leaves behind a ransom note named “CryptoLocker.txt” or “Help to decrypt.txt” on your Desktop, instructing you to contact “[email protected]”. To start the decrypter simply drag and drop one of your encrypted files onto the decrypter executable.

Contact us Now 319-227-7000

2017-03-16T16:43:37-05:00|Ransomware|0 Comments

Fabiansomware Ransomware Decrypter

Fabiansomware Ransomware Decrypter

If your computer has been infected by the Fabiansomware Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Fabiansomware Decrypter (Emsisoft)
Use this decrypter if your files have been encrypted and renamed to *.encrypted with ransom notes named *.How_To_Decrypt_Your_Files.txt. The ransom note asks you to contact “[email protected]”, “[email protected]” or “[email protected]”. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. It is important to use a file pair that is as large as possible, as it determines the maximum file size up to which the decrypter will be able to decrypt your files. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory.

Contact us Now 319-227-7000

2017-02-02T12:20:57-06:00|Ransomware|0 Comments

Philidelphia Ransomware Decrypter

Philidelphia Ransomware Decrypter

If your computer has been infected by the Philidelphia Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Philidelphia Decrypter (Emsisoft)
Philadelphia is a ransomware kit offered within various hacking communities. Written in AutoIt, it encrypts files using AES-256 encryption, file names using RC4 encryption and uses the *.locked file extension. It is based on a similar ransomware kit called “Stampado” that is written by the same author. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. Due to the file name encryption this can be a bit tricky. The best way is to simply compare file sizes. Encrypted files will have the size of the original file rounded up to the next 16 byte boundary. So if a the original file was 1020 bytes large, the encrypted file will be 1024. Select both the encrypted and non-encrypted file and drag and drop both of them onto the decrypter file in your download directory.

Contact us Now 319-227-7000

2017-02-02T12:21:51-06:00|Ransomware|0 Comments

Stampado Ransomware Decrypter

Stampado Decrypter

If your computer has been infected by the Stampado Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Stampado Ransomware Decrypter (Emsisoft)
Stampado is a ransomware kit offered within various hacking communities. Written in AutoIt, it encrypts files using AES-256 encryption and renames them to *.locked. Known variants of this ransomware ask victims to contact [email protected], [email protected], [email protected], [email protected] or [email protected] to facilitate payment. In order for the decrypter to work you will require both the email you are asked to contact as well as your ID. Please keep in mind that both are case sensitive, so proper capitalization does matter. Please put both information into the appropriate fields in the options tab. Since version 1.17.0 each Stampado infection also has a unique “salt” that is specific to the ransomware buyer. The salt can either be specified manually or detected automatically. In order to determine the salt automatically the ransomware has to be running on the system. Fill in the ID and email address and click the “Detect …” button next to the salt input field. If the malware has already been removed, please don’t attempt to reinfect yourself. Instead submit the malware file via email to [email protected] so I can extract the correct salt for you. You can also try the pre-configured salts that have been used by known Stampado campaigns in the wild so far.

Contact us Now 319-227-7000

2017-03-16T16:43:37-05:00|Ransomware|0 Comments

ApocalypseVM Ransomware Decrypter

ApocalypseVM Decrypter

If your computer has been infected by the ApocalypseVM Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

ApocalypseVM Decrypter (Emsisoft)
Use this decrypter if your files have been encrypted and renamed to *.encrypted or *.locked with ransom notes named *.How_To_Decrypt.txt, *.README.txt, *.How_to_Decrypt_Your_Files.txt or *.How_To_Get_Back.txt created for each encrypted file. The ransom note asks you to contact “[email protected]”, “[email protected]” or “[email protected]” and contains a personal ID. To use the decrypter you will require an encrypted file of at least 4096 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.

Contact us Now 319-227-7000

2017-03-16T16:43:37-05:00|Ransomware|0 Comments

Apocalypse Ransomware Decrypter

Apocalypse Ransomware

If your computer has been infected by the Apocalypse Ransomware, below is a decryption tool that you can use to decrypt your data. If you are unsure about how to proceed give us a call at 319-227-7000 so we can schedule a time to take care of this for you.

Apocalypse Decrypter (Emsisoft)
Use this decrypter if your files have been encrypted and renamed to *.encrypted, *.FuckYourData, *.Encryptedfile or *.SecureCrypted with ransom notes named *.How_To_Decrypt.txt, *.Where_my_files.txt, *.How_to_Recover_Data.txt or *.Contact_Here_To_Recover_Your_Files.txt created for each encrypted file. The ransom note asks you to contact “[email protected]”, “[email protected]”, “[email protected]” or “[email protected]”.

Contact us Now 319-227-7000

2017-03-16T16:43:38-05:00|Ransomware|0 Comments