Lost all your files to some nasty ransomware?

We're here to fix that.

Download one of our free decrypter tools to recover your files without paying the ransom

I need removal help
icon
[Jan, 12, 2017] - Version: 1.0.0.34

Emsisoft Decrypter for MRCR

MRCR or Merry X-Mas is a ransomware family that first appeared in December last year. It is written in Delphi and uses a custom encryption algorithm. Encrypted files will have either ".PEGS1", ".MRCR1", ".RARE1", ".MERRY", or ".RMCM1" as an extension. The ransom note is named "YOUR_FILES_ARE_DEAD.HTA" and asks victims to contact either "comodosec@yandex.ru" or "comodosecurity" via the secure mobile messenger Telegram.

To start the decryption process you will need a file pair consisting of an encrypted file and the non-encrypted version of the same file. The files need to be between 64 KB and 100 MB in size. Select both and drag and drop them onto the decrypter executable to start the process.

Download
1531 downloads
icon
[Jan, 12, 2017] - Version: 1.0.0.116

Emsisoft Decrypter for Marlboro

The Marlboro ransomware was first seen on January 11th, 2017. It is written in C++ and uses a simple XOR based encryption algorithm. Encrypted files are renamed to ".oops". The ransom note is stored inside a file named "_HELP_Recover_Files_.html" and includes no further point of contact. Due to a bug in the malware's code, the malware will truncate up to the last 7 bytes from files it encrypts. It is, unfortunately, impossible for the decrypter to reconstruct these bytes.
Download
776 downloads
icon
[Jan, 4, 2017] - Version: 1.0.0.12

Emsisoft Decrypter for Globe3

Globe3 is a ransomware kit that we first discovered at the beginning of 2017. Globe3 encrypts files and optionally filenames using AES-256. Since the extension of encrypted files is configurable, several different file extensions are possible. The most commonly used extensions are .decrypt2017 and .hnumkhotep. To use the decrypter, you will require a file pair containing both an encrypted file and its non-encrypted original version. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory. If file names are encrypted, please use the file size to determine the correct file. The encrypted and the original file will have the same size for files greater than 64 kb.
Download
4510 downloads
icon
[Dec, 30, 2016] - Version: 1.0.0.34

Emsisoft Decrypter for OpenToYou

OpenToDecrypt is a ransomware written in the Delphi programming language that encrypts your files using the RC4 encryption algorithm. Encrypted files get renamed to *.-opentoyou@india.com and a ransom note named "!!!.txt" can be found on your Desktop.
Download
1949 downloads
icon
[Dec, 23, 2016] - Version: 1.0.0.35

Emsisoft Decrypter for GlobeImposter

GlobeImposter is a Globe copycat that imitates the ransom notes and file extension found in the Globe ransomware kit. Encrypted files have the extension *.crypt and the base name of the file is unchanged. The ransom note is named "HOW_OPEN_FILES.hta" and can be found in all folders that contain encrypted files.
Download
2184 downloads
icon
[Nov, 29, 2016] - Version: 1.0.0.15

Emsisoft Decrypter for NMoreira

Use this decrypter if your files have been renamed to either *.maktub or *.__AiraCropEncrypted! and you find a ransom note named either "Recupere seus arquivos. Leia-me!.txt" or "How to decrypt your files.txt" on your system.
Download
37462 downloads
icon
[Nov, 23, 2016] - Version: 1.0.0.30

Emsisoft Decrypter for OzozaLocker

Use this decrypter if your files have been renamed to *.locked and you find a ransom note named "HOW TO DECRYPT YOU FILES.txt" on your desktop. Double clicking an encrypted file will also display a message box instructing you to contact "santa_helper@protonmail.com". To use the decrypter you will require an encrypted file of at least 510 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.
Download
4500 downloads
icon
[Oct, 8, 2016] - Version: 1.0.0.18

Emsisoft Decrypter for Globe2

Globe2 is a ransomware kit that was first discovered at the beginning of October. Globe2 encrypts files and optionally file names using RC4. Since the extension of encrypted files is configurable, several different file extensions are possible. The most commonly used extensions are .raid10, .blt, .globe, .encrypted and .[mia.kokers@aol.com]. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory. If file names are encrypted, please use the file size to determine the correct file. Encrypted and original file will have exactly the same size.
Download
20420 downloads
icon
[Oct, 1, 2016] - Version: 1.0.0.11

Emsisoft Decrypter for Globe

Globe is a ransomware kit that was first discovered at the end of August. Files are encrypted using Blowfish. Since the extension of encrypted files is configurable, several different file extensions are possible. The most commonly used extensions are .purge, .globe and .okean-1955@india.com.!dsvgdfvdDVGR3SsdvfEF75sddf#xbkNY45fg6}P{cg.xtbl. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. It is important to use a file pair that is as large as possible, as it determines the maximum file size up to which the decrypter will be able to decrypt your files. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory.
Download
15767 downloads
icon
[Sep, 28, 2016] - Version: 1.0.0.51

Emsisoft Decrypter for Al-Namrood

The Al-Namrood ransomware is a fork of the Apocalypse ransomware. The group behind it primarily attacks servers that have remote desktop services enabled. Encrypted files are renamed to *.unavailable or *.disappeared and for each file a ransom note is created with the name *.Read_Me.Txt. The ransomware asks the victim to contact "decryptioncompany@inbox.ru" or "fabianwosar@inbox.ru". To decrypt your files the decrypter requires your ID. The ID can be set within the "Options" tab. By default the decrypter will set the ID to the ID that corresponds to the system the decrypter runs on. However, if that is not the same system the malware infection and encryption took place on, make sure to put in the ID as specified in the ransom note.
Download
7226 downloads
icon
[Sep, 18, 2016] - Version: 1.0.0.13

Emsisoft Decrypter for FenixLocker

Use this decrypter if your files have been encrypted by the FenixLocker ransomware. FenixLocker encrypts files and renames them by appending the ".centrumfr@india.com!!" extension. It leaves behind a ransom note named "CryptoLocker.txt" or "Help to decrypt.txt" on your Desktop, instructing you to contact "centrumfr@india.com". To start the decrypter simply drag and drop one of your encrypted files onto the decrypter executable.
Download
46500 downloads
icon
[Sep, 16, 2016] - Version: 1.0.0.31

Emsisoft Decrypter for Fabiansomware

Use this decrypter if your files have been encrypted and renamed to *.encrypted with ransom notes named *.How_To_Decrypt_Your_Files.txt. The ransom note asks you to contact "decryptioncompany@inbox.ru", "fwosar@mail.ru" or "fabianwosar@mail.ru". To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. It is important to use a file pair that is as large as possible, as it determines the maximum file size up to which the decrypter will be able to decrypt your files. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory.
Download
7095 downloads
icon
[Sep, 10, 2016] - Version: 1.0.0.8

Emsisoft Decrypter for Philadelphia

Philadelphia is a ransomware kit offered within various hacking communities. Written in AutoIt, it encrypts files using AES-256 encryption, file names using RC4 encryption and uses the *.locked file extension. It is based on a similar ransomware kit called "Stampado" that is written by the same author. To use the decrypter you will require a file pair containing both an encrypted file and its non-encrypted original version. Due to the file name encryption this can be a bit tricky. The best way is to simply compare file sizes. Encrypted files will have the size of the original file rounded up to the next 16 byte boundary. So if a the original file was 1020 bytes large, the encrypted file will be 1024. Select both the encrypted and non-encrypted file and drag and drop both of them onto the decrypter file in your download directory.
Download
8100 downloads
icon
[Jul, 22, 2016] - Version: 1.0.0.202

Emsisoft Decrypter for Stampado

Stampado is a ransomware kit offered within various hacking communities. Written in AutoIt, it encrypts files using AES-256 encryption and renames them to *.locked. Known variants of this ransomware ask victims to contact paytodecrypt@sigaint.org, getfiles@tutanota.com, successl@qip.ru, clesline212@openmailbox.org or ransom64@sigaint.org to facilitate payment. In order for the decrypter to work you will require both the email you are asked to contact as well as your ID. Please keep in mind that both are case sensitive, so proper capitalization does matter. Please put both information into the appropriate fields in the options tab. Since version 1.17.0 each Stampado infection also has a unique "salt" that is specific to the ransomware buyer. The salt can either be specified manually or detected automatically. In order to determine the salt automatically the ransomware has to be running on the system. Fill in the ID and email address and click the "Detect ..." button next to the salt input field. If the malware has already been removed, please don't attempt to reinfect yourself. Instead submit the malware file via email to fw@emsisoft.com so I can extract the correct salt for you. You can also try the pre-configured salts that have been used by known Stampado campaigns in the wild so far.
Download
14283 downloads
icon
[Jun, 18, 2016] - Version: 1.0.0.34

Emsisoft Decrypter for ApocalypseVM

Use this decrypter if your files have been encrypted and renamed to *.encrypted or *.locked with ransom notes named *.How_To_Decrypt.txt, *.README.txt, *.How_to_Decrypt_Your_Files.txt or *.How_To_Get_Back.txt created for each encrypted file. The ransom note asks you to contact "fabiansomware@mail.ru", "decryptionservice@inbox.ru" or "decryptdata@inbox.ru" and contains a personal ID. To use the decrypter you will require an encrypted file of at least 4096 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.
Download
14809 downloads
icon
[Jun, 12, 2016] - Version: 1.0.0.24

Emsisoft Decrypter for Apocalypse

Use this decrypter if your files have been encrypted and renamed to *.encrypted, *.FuckYourData, *.Encryptedfile or *.SecureCrypted with ransom notes named *.How_To_Decrypt.txt, *.Where_my_files.txt, *.How_to_Recover_Data.txt or *.Contact_Here_To_Recover_Your_Files.txt created for each encrypted file. The ransom note asks you to contact "decryptionservice@mail.ru", "ransomware.attack@list.ru", "getdataback@bk.ru" or "recoveryhelp@bk.ru".
Download
15731 downloads
icon
[May, 28, 2016] - Version: 1.0.0.174

Emsisoft Decrypter for BadBlock

Use this decrypter if your files have been encrypted but not renamed. The malware identifies itself as BadBlock both in the red ransomware screen as well as in the ransomnote "Help Decrypt.html" that can be found on the Desktop.
Download
10813 downloads
icon
[May, 17, 2016] - Version: 1.0.0.26

Emsisoft Decrypter for Xorist

Use this decrypter if your files have been encrypted by the Xorist ransomware. Typical extensions used by Xorist include *.EnCiPhErEd, *.0JELvV, *.p5tkjw, *.6FKR8d, *.UslJ6m, *.n1wLp0, *.5vypSa and *.YNhlv1. The ransomnote can usually be found on the Desktop with the name "HOW TO DECRYPT FILES.txt". To use the decrypter you will require an encrypted file of at least 144 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.
Download
16937 downloads
icon
[May, 17, 2016] - Version: 1.0.0.29

Emsisoft Decrypter for 777

Use this decrypter if your files have been encrypted and renamed to *.777. It may be necessary to select the correct version of the malware in the options tab for the decrypter to work properly.
Download
10905 downloads
icon
[Apr, 16, 2016] - Version: 1.0.0.11

Emsisoft Decrypter for AutoLocky

Use this decrypter if your files have been encrypted and renamed to *.locky, but the file base name is still unchanged, and you find a ransom note named info.txt or info.html on your Desktop.
Download
105801 downloads
icon
[Mar, 22, 2016] - Version: 1.0.0.26

Emsisoft Decrypter for Nemucod

Use this decrypter if your files have been renamed to *.crypted and you find a ransomnote named DECRYPT.txt on your desktop. To use the decrypter you will require an encrypted file of at least 4096 bytes in size as well as its unencrypted version. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable.
Download
40914 downloads
icon
[Feb, 18, 2016] - Version: 1.0.0.187

Emsisoft Decrypter for DMALocker2

Use this decrypter if your files have been encrypted but not renamed. The malware identifies itself as DMA Locker and the ID is "DMALOCK 43:41:90:35:25:13:61:92".
Download
8561 downloads