My Decryptor ransomware virus - How to remove

My Decryptor ransomware virus can be indicated as one of the recently detected crypto-malware examples. It functions with a TOR website which presents victims with the main requirements and demands. In addition to this, some .txt files are going to be inserted on computer desktops. ._HOW_TO_DECRYPT_MY_FILES__.txt and .READ_ME_FOR_DECRYPT__.txt are the files that will be opened in Notepads and require victims to download TOR browser. Infections like CryptoTorLocker and ApolloLocker both provide instructions for victims in separate websites, opened via TOR.

My Decryptor crypto-malware main symptoms and features

There are two extensions that My Decryptor ransomware might append to files, encrypted with AES algorithm. One of them is .kgpvwnr or .[random]. Victims are given an opportunity to decrypt 1 file free of charge. In the TOR website, there are different sections. In one of them, users are presented with a chance of loading an executable into a server of hackers. It is assumed that this ransomware (Ransomware: An executive guide to one of the biggest menaces on the web) initiates targeted attacks since it spawns different subdomains for every victim.

My Decryptor virus

However, the file must not be larger than 2048 kilobytes. In the TOR domain, users will also notice sections of “Support” and “Reload current page”. The latter section is necessary when ransoms are paid and users wish to have their files decrypted. However, it is unknown whether this option really does work. Opportunity to decrypt some of the ruined files is also offered by Wyvern ransomware.

My Decryptor crypto-virus gives 5 days for users to pay the 0.200 BTC which equals 1130.49 USD. This fee is definitely steep for some users and many of the victims of this infection might not even have the necessary resources to pay it Furthermore, If the ransom does not reach the indicated bitcoin wallet in the indicated period of time, users will be now required 0.400 BTC instead. This quals and even more disturbing amount of money: 2260.98 USD. Whatever you do, do not pay these sums. Hackers can never be trusted to actually decrypt files (FBI: No, you shouldn’t pay ransomware extortionists). Most of them disappear after ransoms reach their accounts.

What about decryption of damaged files?

If this infection has been successfully completed, you are probably looking for a way to decrypt your precious executables. Currently, we are not aware of tools that would be capable of doing so. Nevertheless, security researchers could be able to produce a free tool for decryption. If this happens, we will inform you about this good news.

My Decryptor ransomware

For now, we can only suggest the usual file-decryption options that might not always work. Check the guidelines after this article for more information about file recovery. The best option would be to store important digital data in safe alternative locations. For instance, you could try backup storages or simply upload files into USDB flash drives.

Removal and ways to avoid ransomware

In order to know how ransomware infections can be avoided, you need to know the exact methods of their distribution. One of the most common ways is to spread crypto-malware via malicious email letters. If you find a suspicious message in your email account, be sure to check its respectability before opening attachments or clicking on recommended links.

In addition to this, ransomware could be distributed via other techniques. For instance, malware-laden pop-ups can bring payloads or their downloaders into operating systems. Therefore, do not click on random online ads. Especially beware of those adverts that offer free stuff, scans, software or opportunities to win prizes.

The last thing we need to discuss is the removal of this ransomware infection. It is important to get rid of all malicious content before file-recovery options are pursued. If a malware threat is still inside your operating system, files can be re-encrypted and the file-decrypting will go to waste. To keep operating systems clean and properly functioning, we hope that you will consider installing Spyhunter.

How to recover My Decryptor ransomware virus encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before My Decryptor ransomware virus has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of My Decryptor ransomware virus

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to My Decryptor ransomware virus. You can check other tools here.  

Step 3. Restore My Decryptor ransomware virus affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually My Decryptor ransomware virus tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover My Decryptor ransomware virus encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *