The Definitive Collection of Ransomware Decryption Tools on the Web

The Definitive Collection of Ransomware Decryption Tools on the Web [2020/11/27] [source]
- Identify your ransomware variant by visiting ID Ransomware
- Utilize the free ransomware decrypter tools listed below
- Try to restore from a backup
Decryptor Download | Read Me | Encrypted File Extension | Creator/Contributor |
Cute | Instructions | aaaddress1 | |
my-Little-Ransomware | Instructions | aaaddress1 | |
AES_NI | Instructions | *.aes_ni, *.aes256, *.aes_ni_0day | Avast |
Alcatraz Locker | Instructions | *.Alcatraz | Avast |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | Avast |
ApocalypseVM | Instructions | *.encrypted, *.FuckYourData, *.Encryptedfile, *.SecureCrypted | Avast |
BadBlock | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note (32-Bit) | Avast |
BadBlock | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note (64-Bit) | Avast |
Bart | Instructions | *.bart.zip | Avast |
BigBobRoss | Instructions | *.obfuscated | Avast |
BTCWare | Instructions | *.btcware, *.cryptobyte, *.cryptowin, *.theva, *.onyon | Avast |
Crypt888 | Instructions | This ransomware adds Lock. to the beginning of file names | Avast |
CryptFile2 | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl | Avast |
CryptoMix (Offline) | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl, *.MOLE | Avast |
CryptoShield | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl, *.MOLE | Avast |
Zeta | Instructions | *.CRYPTOSHIELD, *.rdmk, *.lesli, *.scl, *.code, *.rmd*.rscl | Avast |
Crysis | Instructions | *.johnycryptor@hackermail.com.xtbl, *.ecovector2@aol.com.xtbl, *.systemdown@india.com.xtbl, *.Vegclass@aol.com.xtbl, *.{milarepa.lotos@aol.com}.CrySiS, *.{Greg_blood@india.com}.xtbl, *.{savepanda@india.com}.xtbl, *.{arzamass7@163.com}.xtbl, *.{3angle@india.com}.dharma, *.{tombit@india.com}.dharma, *.wallet | Avast |
EncrypTile | Instructions | The ransomware adds the word “encryptTile” into a file name | Avast |
EncrypTile | Instructions | *.EncrypTile | Avast |
FindZip | Instructions | *.crypt | Avast |
GandCrab | Instructions | *.GDCB, *.CRAB, *.KRAB, *.%RandomLetters% | Avast |
Globe | Instructions | *.ACRYPT, *.GSupport[0-9], *.blackblock, *.dll555, *.duhust, *exploit, *.frozen, *.globe, *.gsupport, *.kyra, *.purged, *.raid[0-9], *.siri-down@india.com, *.xtlb, *.zendrz, *.zendr[0-9], *.hnyear | Avast |
HiddenTear | Instructions | *.locked, *.34xxx, *.bloccato, *.BUGSECCCC, *.Hollycrypt, *.lock, *.saeid, *.unlockit, *.razy, *.mecpt, *.monstro, *.lok, *.암호화됨, *.8lock8, *.fucked, *.flyper, *.kratos, *.drypted, *.CAZZO, *.doomed | Avast |
Jigsaw | Instructions | *.kkk, *.btc, *.gws, *.J, *.encrypted, *.porno, *.payransom, *.pornoransom, *.epic, *.xyz, *.versiegelt, *.encrypted, *.payb, *.payb, *.pays, *.payms, *.paymds, *,paymts, *.payrms, *.payrmts, *.paymrts, *.paybtcs, *.fun, *.hush, *.uk-dealer@sigaint.org, *.gefickt | Avast |
LambdaLocker | Instructions | *.MyChemicalRomance4EVER | Avast |
Legion | Instructions | *._23-06-2016-20-27-23_$f_tactics@aol.com$.legion, *.$centurion_legion@aol.com$.cbf | Avast |
NoobCrypt | Instructions | NoobCrypt doesn’t change the file name. Leaves “ransomed.html” message | Avast |
Stampado | Instructions | *.locked | Avast |
SZFLocker | Instructions | *.szf | Avast |
TeslaCrypt | Instructions | The latest version of TeslaCrypt doesn’t rename files. | Avast |
XData | Instructions | *.~xdata~ | Avast |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | AVG |
ApocalypseVM | Instructions | *.encrypted, *.FuckYourData, *.locked, *.Encryptedfile, *.SecureCrypted | AVG |
BadBlock 32-Bit | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note | AVG |
BadBlock 64-Bit | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note | AVG |
Bart | Instructions | *.bart.zip | AVG |
Crypt888 | Instructions | This ransomware adds Lock. to the beginning of file names | AVG |
MirCop | Instructions | Lock.{Original file name} | AVG |
Legion | Instructions | *._23-06-2016-20-27-23_$f_tactics@aol.com$.legion, *..$centurion_legion@aol.com$.cbf or *.$centurion_legion@aol.com$.cbf to end of filename | AVG |
SZFLocker | Instructions | *.szf | AVG |
TeslaCrypt | Instructions | Decryptor for variant that doesn’t rename files | AVG |
Annabelle | Instructions | *.ANNABELLE | BitDefender |
Bart | *.Bart | BitDefender | |
GandCrab (V1, V4 and V5 up to V5.2 versions) | Instructions | *.GDCB, *.CRAB, *.KRAB, *.%RandomLetters% | BitDefender |
Juicy Lemon | Instructions | *.id-{number}_maestro@pizzacrypts.info | Bleeping Computer |
PizzaCrypts | Instructions | *.id-{number}_, .id-{number}_sos@juicylemon.biz, .id-{number}_*@juicylemon.biz*protonmail.com*, .id-{number}_*@juicylemon.biz_BitMessage_* | Bleeping Computer |
ODCODC | Instructions | *.odcodc | Bleeping Computer |
Cryptorbit | Instructions | locks files and creates HowDecrypt.txt and HowDecrypt.gif | Bleeping Computer |
Operation Global III | Instructions | *.exe | Bleeping Computer |
BitStak | Instructions | *.bitstak | Bleeping Computer |
GhostCrypt | Instructions | *.Z81928819 | Bleeping Computer |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Bleeping Computer |
Princess Locker | Instructions | Ransomware appends random characters to the file extension | Bleeping Computer |
Aurora | Instructions | *.Nano | Bleeping Computer |
FilesLocker v1 and v2 | Instructions | *.[fileslocker@pm.me] | Bleeping Computer |
Everbe | Instructions | *.insane, *.DUESCRYPT, *.deuscrypt, *.Tornado, *.twist, *.everbe, *.embrace, *.pain, *.volcano | Bleeping Computer |
InsaneCrypt | Instructions | *.[everbe@airmail.cc].everbe, *.embrace, *.pain | Bleeping Computer |
Annabelle | Instructions | *.ANNABELLE | Bleeping Computer |
CryptoDevil | Instructions | *.devil | Bleeping Computer |
Zyka | Instructions | *.lock | Bleeping Computer |
Unlock92 | Instructions | *.CRRRT | Bleeping Computer |
CryptoHost | CryptoHost | Detected as Ransom:MSIL/Manamecrypt.A and Ransom_CRYPTOHOST.A. | Bleeping Computer |
TorrentLocker | Instructions | *.encrypted, *.enc | Bleeping Computer |
Alpha | Instructions | *.encrypt | BleepingComputer |
BitKangaroo | Instructions | *.bitkangaroo | BleepingComputer |
Crypt38 | Instructions | *.crypt38 | BleepingComputer |
DCry | Instructions | *.dcry | BleepingComputer |
MicroCop | Instructions | Adds Locked to the beginning of your encrypted files | BleepingComputer |
Mole02 | Instructions | N/A | BleepingComputer |
Offline CryptoMix | Instructions | *.CRYPTOSHIELD, *.scl, *.rscl, *.lesli, *.rdmk, *.code, *.rmd | BleepingComputer |
PowerLocky | Instructions | *.locky | BleepingComputer |
StrikedDecrypter | Instructions | *.Andrey.gorlachev@aol.com,*.nukem@mortalkombat.top, *.rap@mortalkombat.top, *.m.pirat@aol.com, *.duk@mortalkombat.top, *.jekabro@mortalkombat.top, *.bitcoin@mortalkombat.top | BleepingComputer |
AnDROid | Instructions | *.android | BleepingComputer |
Anti-DDos | Instructions | *.f*cked | BleepingComputer |
Crypt0 | Instructions | *_crypt0 | BleepingComputer |
Crypto-Blocker | Instructions | *.corrupted | BleepingComputer |
CryptoLocker by NTK | Instructions | *.powned | BleepingComputer |
CryptoSomware | Instructions | *.FailedAccess | BleepingComputer |
DeriaLock | Instructions | *.deria | BleepingComputer |
DoNotOpen | Instructions | *.killedXXX | BleepingComputer |
EnkripsiPC | Instructions | *.bleeped | BleepingComputer |
F*ckTheSystem | Instructions | *.anon | BleepingComputer |
Harzhuangzi | Instructions | *.Harzhuangzi | BleepingComputer |
Haters | Instructions | *.haters | BleepingComputer |
Hitler | Instructions | *.Nazi | BleepingComputer |
JeepersCrypt | Instructions | *.jeepers | BleepingComputer |
Manifestus | Instructions | *.f*cked | BleepingComputer |
Mikoyan | Instructions | *.MIKOYAN | BleepingComputer |
NullByte | Instructions | *._nullbyte | BleepingComputer |
SnakeEye | Instructions | *.SnakeEye | BleepingComputer |
Xncrypt | Instructions | *.xncrypt | BleepingComputer |
Mole | Instructions | *.mole | CERT-PL |
BarRax | Instructions | *.barrax | Check Point |
Merry X-Mas | Instructions | *.PEGS1, *.MRCR1, *.RARE1, *.MERRY, *.RMCM1 | Check Point |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Check Point |
Pylocky | Instructions | RANSOM_PYLOCKY.A | Cisco |
TeslaCrypt | Instructions | {original file name}.ECC | Cisco |
Thanatos | Instructions | *.THANATOS | Cisco |
Nanolocker | Instructions | Cyberclues | |
Popcorn | Instructions | *.filock | Elevenpaths |
Decrypt Protect | Instructions | *.html | Emsisoft |
777 | Instructions | *.777 | Emsisoft |
Al-Namrood | Instructions | *.unavailable, *.disappeared | Emsisoft |
Amnesia2 | Instructions | *.amnesia | Emsisoft |
Apocalypse | Instructions | *.encrypted, *.FuckYourData, *.Encryptedfile, *.SecureCrypted | Emsisoft |
ApocalypseVM | Instructions | *.encrypted, *.locked | Emsisoft |
Aurora | Instructions | *.Aurora, *.aurora, *.animus, *.cryptoid, *.peekaboo, *.isolated, *.infected, *.locked | Emsisoft |
AutoLocky | Instructions | *.locky | Emsisoft |
BadBlock | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note | Emsisoft |
Cry128 | Instructions | *.fgb45ft3pqamyji7.onion.to._ or *.id__gebdp3k7bolalnd4.onion._’ or *.id__2irbar3mjvbap6gt.onion.to._ or *.id-_[qg6m5wo7h3id55ym.onion.to].63vc4 | Emsisoft |
Cry9 | Instructions | *.fgb45ft3pqamyji7.onion.to._, 8.id__gebdp3k7bolalnd4.onion._, *.id__2irbar3mjvbap6gt.onion.to._, *.id-_[qg6m5wo7h3id55ym.onion.to].63vc4 | Emsisoft |
CrypBoss | Instructions | *.crypt, *.R16M01D0 | Emsisoft |
CryptInfinite | Instructions | *.CRINF | Emsisoft |
CryptoDefense | Instructions | Identifes as CryptoDefense leaves note HOW_DECRYPT.txt | Emsisoft |
Crypton | Instructions | *.id-_locked, *.id-_locked_by_krec, *.id-_locked_by_perfect, *.id-_x3m, *.id-_r9oj, *.id-_garryweber@protonmail.ch, *.id-_steaveiwalker@india.com_, *.id-_julia.crown@india.com_, *.id-_tom.cruz@india.com_, *.id-_CarlosBoltehero@india.com_,*.id-_maria.lopez1@india.com_ | Emsisoft |
Damage | Instructions | *.damage | Emsisoft |
DMALocker | Instructions | DMALocker with ID “DMALOCK 41:55:16:13:51:76:67:99 | Emsisoft |
DMALocker2 | Instructions | DMALocker2 with ID “DMALOCK 43:41:90:35:25:13:61:92 | Emsisoft |
Fabiansomware | Instructions | *.encrypted | Emsisoft |
FenixLocker | Instructions | *.centrumfr@india.com!! | Emsisoft |
GetCrypt | Instructions | Appends a random 4-character extension to files | Emsisoft |
Globe | Instructions | *.purge, *.globe, *.okean-1955@india.com.!dsvgdfvdDVGR3SsdvfEF75sddf#xbkNY45fg6}P{cg.xtbl. | Emsisoft |
Globe2 | Instructions | *.raid10, *.blt, *.globe, *.encrypted,*[mia.kokers@aol.com] | Emsisoft |
Globe3 | Instructions | *.decrypt2017, *.hnumkhotep | Emsisoft |
GlobeImposter | Instructions | *.crypt | Emsisoft |
Gomasom | Instructions | *.crypt | Emsisoft |
Harasom | Instructions | *.html and note from Spamhaus or US Department of Justice | Emsisoft |
HKCrypt | Instructions | *.hacked | Emsisoft |
HydraCrypt | Instructions | *.hyrdacrypt, *.umbrecrypt | Emsisoft |
UmbreCrypt | Instructions | *.hydracrypt, *.umbrecrypt | Emsisoft |
ImS00rry | Instructions | Emsisoft | |
JSWorm 4.0 | Instructions | *.[ID-9LF5BNP][symmetries@tutamail.com].JSWRM | Emsisoft |
JSWorm | Instructions | *.[ID.194958][remarkpaul77@cock.li].JSWORM | Emsisoft |
KeyBTC | Instructions | Leaves ransom note called Decrypt_Your_Files.txt on your system that asks you to contact keybtc@inbox.com for decryption. | Emsisoft |
LeChiffre | Instructions | *.LeChiffre and the ransom note asks you to contact decrypt.my.files@gmail.com via email. | Emsisoft |
Instructions | *.lcphr | Emsisoft | |
Marlboro | Instructions | *.oops | Emsisoft |
MegaLocker | Instructions | *.nampohyu | Emsisoft |
MRCR or Merry X-Mas | Instructions | *.PEGS1, *.MRCR1, *.RARE1, *.MERRY, *.RMCM1 | Emsisoft |
Nemucod | Instructions | *.crypted and you find a ransom note named DECRYPT.txt on your desktop. | Emsisoft |
NemucodAES | Instructions | Does not change file extension and a ransom note named “DECRYPT.hta” can be found on your desktop. | Emsisoft |
NMoreira | Instructions | *.maktub, *._AiraCropEncrypted! | Emsisoft |
OpenToYou | Instructions | *.-opentoyou@india.com | Emsisoft |
OzozaLocker | Instructions | *.locked With a ransom note named “HOW TO DECRYPT YOU FILES.txt” on your desktop. Note is from santa_helper@protonmail.com | Emsisoft |
PClock | Instructions | Doesn’t change extension look for enc_files.txt | Emsisoft |
Pewcrypt | Instructions | *.PewCrypt | Emsisoft |
Philadelphia | Instructions | *.locked | Emsisoft |
Planetary | Instructions | *.mira | Emsisoft |
Radamant | Instructions | *.rdm, *.rrk | Emsisoft |
Stampado | Instructions | *.locked Known variants of this ransomware ask victims to contact paytodecrypt@sigaint.org, getfiles@tutanota.com, successl@qip.ru, clesline212@openmailbox.org or ransom64@sigaint.org | Emsisoft |
Syrk | Instructions | *.Syrk | Emsisoft |
Xorist | Instructions | *.EnCiPhErEd, *.0JELvV, *.p5tkjw, *.6FKR8d, *.UslJ6m, *.n1wLp0, *.5vypSa, *.YNhlv1 | Emsisoft |
ZQ | Instructions | *.zq | Emsisoft |
WannaCryFake | Instructions | *.wannacry | Emsisoft |
Avest | Instructions | *.ckey().email().pack14 | Emsisoft |
TeslaCrypt | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | ESET |
Virlock | Instructions | *.exe | ESET |
Crysis | Instructions | *.xtbl, *.crysis, *.crypt, *.lock, *.crypted, *.dharma, *.wallet, *.onion | ESET |
Simplocker | Instructions | ESET | |
Trustezeb | Instructions | ESET | |
Mira | Instructions | *.mira | F-Secure |
TeslaCrypt | Instructions | *.vvv, *.ccc, *.zzz, *.aaa, *.abc | Googulator |
7even-HONE$T | Python Script | {sequential number}.R4A or{sequential number}.R5A | hasherezade |
Bitcryptor | Instructions | .cvlst | Kaspersky |
Agent.iih | Instructions | Kaspersky | |
Aura | Instructions | Kaspersky | |
AutoIT | Instructions | {Original Filename}@<mail server>_.<random_set_of_characters>. | Kaspersky |
AutoLT | Instructions | Renames files “<original_name>@<mail server>_.<random_set_of_characters>” | Kaspersky |
Bitman v.3 | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | Kaspersky |
Bitman v.4 | Instructions | Does not change file extension. | Kaspersky |
Cerber | Instructions | {10 random characters}.cerber | Kaspersky |
Chimera | Instructions | {Original file name}.crypt | Kaspersky |
Cryptokluchen | Instructions | Kaspersky | |
Crysis | Instructions | id}.{email address}.xtbl, crypt | Kaspersky |
Democry | Instructions | *._date-time_$address@domain$.777 OR *._date-time_$address@domain$.legion | Kaspersky |
Dharma | Instructions | *.wallet | Kaspersky |
Jaff | Instructions | *.Jaff | Kaspersky |
Lamer | Instructions | Kaspersky | |
Lobzik | Instructions | *.fun, *.gws, *.btc, *.AFD, *.porno, *.pornoransom, *.epic, *.encrypted, *.J, *.payransom, *.paybtcs, *.paymds, *.paymrss, *.paymrts, *.paymst, *.paymts, *.payrms | Kaspersky |
Lortok | Instructions | *.crime | Kaspersky |
Pletor | Instructions | Kaspersky | |
Rakhni | Instructions | *.locked, *.kraken | Kaspersky |
Rotor | Instructions | *.!____GLOK9200@GMAIL.COM____.tar, *.!____cocoslim98@gmail.com____.tar | Kaspersky |
TeslaCrypt v3 | Instructions | {original file name}.XXX or TTT or MP3 or MICRO | Kaspersky |
TeslaCrypt v4 | Instructions | File name and extension are unchanged | Kaspersky |
XData | Instructions | *.~xdata~ | Kaspersky |
AutoLT | Instructions | Renames files “<original_name>@<mail server>_.<random_set_of_characters>” | Kaspersky |
Cryakl | Instructions | Infected with Trojan-Ransom.Win32.Cryakl (also tags end of file name with{CRYPTENDBLACKDC}) | Kaspersky |
Crybola | Instructions | Infected with Trojan-Ransom.Win32.Crybola | Kaspersky |
CryptXXX v1 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
CryptXXX v2 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
CryptXXX v3 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Kaspersky |
Fury | Instructions | Infected with Trojan-Ransom.Win32.Fury | Kaspersky |
Marsjoke | Instructions | *.a19 or *p19 | Kaspersky |
Polyglot | Instructions | Infected with Trojan-Ransom.Win32.Polyglot | Kaspersky |
Rannoh | Instructions | Renames files “locked-<original_name>.<four_random_letters>” | Kaspersky |
Shade | Instructions | *.xtbl, *.ytbl, *.breaking_bad, *.heisenberg | Kaspersky |
Wildfire | Instructions | *.wflx | Kaspersky |
Xorist | Instructions | *.xorist (or adds a random extension) | Kaspersky |
Rector | Instructions | Trojan-Ransom.Win32.Rector | Kaspersky |
Scraper | Instructions | Trojan-Ransom.Win32.Scraper | Kaspersky |
Crysis | Instructions | *.johnycryptor@hackermail.com.xtbl, *.ecovector2@aol.com.xtbl, *.systemdown@india.com.xtbl, *.Vegclass@aol.com.xtbl, *.{milarepa.lotos@aol.com}.CrySiS, *.{Greg_blood@india.com}.xtbl, *.{savepanda@india.com}.xtbl, *.{arzamass7@163.com}.xtbl, *.{3angle@india.com}.dharma, *.{tombit@india.com}.dharma, *.wallet | Kaspersky |
CoinVault | Instructions | *.cvlst | Kaspersky |
FortuneCrypt | Instructions | Kaspersky | |
Yatron | Instructions | *.yatron | Kaspersky |
Petya | Instructions | leo-stone | |
TeslaCrypt | Instructions | *.xxx, *.ttt, *.micro, *.mp3 | McAfee |
TeslaCrypt V3 | Instructions | *.mp3, *.micro, *.xxx, *.ttt | McAfee |
PoshCoder | PoshCoder | *.locky | pan-unit42 |
Crypren | Instructions | *.encrypted | pekeinfo |
Alma | Instructions | Adds 5 random characters at the end of each file and a unique 8 character victim ID | PHISHLABS |
Lock Screen USB | Instructions | Lockscreen ransomware | Trend Micro |
Lock Screen | Instructions | Lockscreen ransomware | Trend Micro |
777 | Instructions | {Original file name}.777 | Trend Micro |
AutoLocky | Instructions | {Original file name}.locky | Trend Micro |
Cerber .v1 | Instructions | {10 random characters}.cerber | Trend Micro |
Chimera | Instructions | {Original file name}.crypt | Trend Micro |
DemoTool | Instructions | *.demoadc | Trend Micro |
DXXD v.1 | Instructions | {Original file name}.{Original extension}dxxd | Trend Micro |
Globe .v1 | Instructions | {Original file name}.purge | Trend Micro |
Globe .v2 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
Globe v.3 | Instructions | Extension not fixed or file name encrypted | Trend Micro |
Jigsaw | Instructions | *.FUN, *.KKK, *.GWS, *.BTC | Trend Micro |
LeChiffre | Instructions | {Original file name}.LeChiffre | Trend Micro |
MirCop | Instructions | Lock.{Original file name} | Trend Micro |
Nemucod | Instructions | {Original file name}.crypted | Trend Micro |
Purge v.1 | Instructions | {Original file name}.purge | Trend Micro |
Purge v.2 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
Purge v.3 | Instructions | {Original file name}.{email address + random characters} | Trend Micro |
SNSLocker | Instructions | {Original file name}.RSNSLocked | Trend Micro |
Stampado | Instructions | *.locked | Trend Micro |
Teamxrat | Instructions | {Original filename}.__xratteamLucked | Trend Micro |
TeleCrypt | Instructions | {Original file name} | Trend Micro |
TeslaCrypt v3 | Instructions | {original file name}.XXX or TTT or MP3 or MICRO | Trend Micro |
TeslaCrypt v4 | Instructions | File name and extension are unchanged | Trend Micro |
XORBAT | Instructions | {Original file name}.crypted | Trend Micro |
Xorist | Instructions | *.xorist (or adds a random extension) | Trend Micro |
Xpan | Instructions | {Original filename}.__xratteamLucked | Trend Micro |
Instructions | {original file name}.ECC | Trend Micro | |
BadBlock | Instructions | Doesn’t change file extension. Look for BadBlock in ransom note | Trend Micro |
MacRansom | Instructions | Trend Micro | |
777 | Instructions | *.777 | Trend Micro |
CryptXXX v1 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v2 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v3 | Instructions | {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters | Trend Micro |
CryptXXX v4 | Instructions | *.5 hexadecimal characters | Trend Micro |
CryptXXX v5 | Instructions | *.5 hexadecimal characters | Trend Micro |
Crysis | Instructions | *.johnycryptor@hackermail.com.xtbl, *.ecovector2@aol.com.xtbl, *.systemdown@india.com.xtbl, *.Vegclass@aol.com.xtbl, *.{milarepa.lotos@aol.com}.CrySiS, *.{Greg_blood@india.com}.xtbl, *.{savepanda@india.com}.xtbl, *.{arzamass7@163.com}.xtbl, *.{3angle@india.com}.dharma, *.{tombit@india.com}.dharma, *.wallet | Trend Micro |
TeslaCrypt V2 | Instructions | {original file name}.VVV, CCC, ZZZ, AAA, ABC, XYZ | Trend Micro |
XRatTeam | Instructions | *.xratteamLucked | Trend Micro |