Our services are provided on an hourly basis with a minimum contingent of 10 hours, which is usually enough to get ransomware victims back to regular business operations. Iams00rry Decryptor is designed to decrypt files encrypted by Iams00rry Ransom. encrypted file is typically the most reliable method of identification.

Bug Bounty -

The STOP Puma ransomware encrypts victim's files and appends the extension ".puma", ".pumas", or ".pumax" to files.

Alcatraz Decryptor is designed to decrypt files encrypted by Alcatraz Ransom. The ransom note "Read Me.txt" asks the victim to contact "[email protected]".

It’s not cheap, and there’s no guarantee of success. Renames files "@_.", *.fun, *.gws, *.btc, *.AFD, *.porno, *.pornoransom, *.epic, *.encrypted, *.J, *.payransom, *.paybtcs, *.paymds, *.paymrss, *.paymrts, *.paymst, *.paymts, *.payrms, {original file name}.XXX or TTT or MP3 or MICRO, Infected with Trojan-Ransom.Win32.Cryakl (also tags end of file name with{CRYPTENDBLACKDC}), Infected with Trojan-Ransom.Win32.Crybola, {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters, Infected with Trojan-Ransom.Win32.Polyglot, Renames files "locked-.", *.xtbl, *.ytbl, *.breaking_bad, *.heisenberg, Adds 5 random characters at the end of each file and a unique 8 character victim ID, {Original file name}.

FenixLocker Decryptor is designed to decrypt files encrypted by FenixLocker Ransom. Rakhni Decryptor is designed to decrypt files encrypted by Chimera Ransom. To start the decrypter select both the encrypted and unencrypted file and drag and drop them onto the decrypter executable. Derialock Decryptor is designed to decrypt files encrypted by Derialock Ransom. Encrypted files have the extension *.crypt and the base name of the file is unchanged.

djvu Decryptor is designed to decrypt files encrypted by djvu Ransom. This ransomware is decryptable! Use this decrypter is your files have been encrypted and renamed to either .crypt or .R16M01D05. MacRansom Decryptor is designed to decrypt files encrypted by MacRansom Ransom. Nemty Decryptor is designed to decrypt files encrypted by Nemty Ransom. Leia-me!.txt" or "How to decrypt your files.txt" on your system. Trend Micro Ransomware Decryptor is designed to decrypt files encrypted by Jigsaw Ransom. Trend Micro Ransomware Decryptor is designed to decrypt files encrypted by CryptXXX V2 Ransom. download [[email protected]].zq" or ". and you find a ransom note named either "Recupere seus arquivos. The Ims00rry ransomware encrypts files using AES-128, and does not add an extension. This ransomware is still under analysis. Select both the encrypted and unencrypted file and drag and drop both of them onto the decrypter file in your download directory. BarRax Decryptor is designed to decrypt files encrypted by BarRax Ransom.