• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

How To Recover Encrypted Files (Ransomware file recovery)

Myantispyware team December 4, 2019    

Recover Encrypted Files is a question, the answer to which is important for all victims of ransomware attack. Ransomware is malicious software that encrypts files and demands a ransom for their release. Encrypted files cannot be opened, that is, all encrypted files are locked and cannot be used. This may result in loss of data or important information. Since ransomware uses a complex encryption algorithm, in most cases it is impossible to decrypt encrypted files manually or create a decryptor. But not everything is so bad, everyone who has become a victim of ransomware has a chance to recover encrypted files. In this article, we will show alternative ways to recover ransomware encrypted files. Each of the methods does not require the use of paid software, is easy to repeat, contains explanatory illustrations.

Files encrypted by ransomware become useless

Encrypted files cannot be opened

Files encrypted by ransomware become useless, they cannot be used, their contents cannot be read. Even if you change the filename of the encrypted file, try to open this file in the editor, this will not help. In any case, Windows OS will report that the file was damaged or it is of an unknown type. To return files back, that is, to access their contents, encrypted files must be decrypted. Decryption requires a decryptor and a key. Ransomware authors offer victims to buy a key and a decryptor from them. Usually the size of the ransom is from 300 to 1000 dollars. All security experts agree that the ransom should not be paid. There is no guarantee that paying a ransom will provide a key to decrypt the encrypted files.

no guarantee that paying a ransom

Although decrypting files requires a decryptor and a key, which are in the hands of criminals, this does not mean that ransomware victims have no hope of recovering encrypted files. This is not true! There is a chance that allows everyone to recover the contents of encrypted files. Depending on the type of ransomware, this chance may be greater or lesser. Unfortunately, there are very few methods to recover encrypted files without the help of the decryptor. Each of these methods requires neither a decryptor nor a key, therefore these methods are suitable for any victim and can help restore files after any type of ransomware.

recover the contents of encrypted files

Regardless of which method you choose, before you begin the process of recovering encrypted files, you need to check your computer for malware. You need to be sure that ransomware is no longer on the computer. Even if there are no signs of ransomware activity, this does not mean that it disappeared or deleted itself after all the files were encrypted. Ransomware probably just hides itself, and after the appearance of new unencrypted files on the computer, it activates again and encrypts these files. In addition, an active ransomware can be a source of infection for other devices, as well as work as a spyware, that is, collect various information about the victim, which will then be sold or transmitted to attackers.

detect and remove the ransomware

We highly recommend that before you start recovering encrypted files, first check your computer for malware. It is very important to find the ransomware and completely remove it. In order to quickly find all parts of the ransomware and easily remove them, we recommend that you use free malware removal tools. Each of them tested by security experts, has a powerful malware detector, and will allow you to remove various types of malware, including ransomware, spyware, worms and trojans.




How to recover ransomware encrypted files

  • Recover encrypted files from Volume shadow copies
  • Recover encrypted files using Photo Rec

Recover encrypted files from Volume shadow copies

Volume shadow copy is a feature on modern versions of Microsoft Windows (Vista,7,8,10). It is turned on by default and creates copies of all user files. These copies can be created automatically from time to time or when creating a restore point. This allows you to retrieve copies of files that have been encrypted by ransomware. To access these shadow copies, we recommend using a program called ShadowExplorer. It is a free program that does not require installation, has a simple interface and is easy to use.

Download ShadowExplorer on your computer by clicking on the link below.

ShadowExplorer
ShadowExplorer
439489 downloads
Author: ShadowExplorer.com
Category: Security tools
Update: September 15, 2019

When the file download is complete, open the directory in which you saved the file. Right click to ‘ShadowExplorer-0.9-portable’ and select ‘Extract all’. You will see a window, as in the following figure.

Extract ShadowExplorer

Here you can change the place where the archive will be unpacked. If you do not make any changes, then in the directory where the file is located, a directory with the name ‘ShadowExplorer-0.9-portable’ will be created in which all the unzipped files will be placed. Then the contents of this directory will open. Now open directory ‘ShadowExplorerPortable-0.9’. The following is an example of the contents of this directory.

ShadowExplorer folder

Find the ShadowExplorerPortable file and run it. You will see the main window of ShadowExplorer similar to what is shown in the picture below.

ShadowExplorer

In the upper left corner of the window, select the drive on which encrypted files are located that you want to recover. Then, slightly to the right of the drive name, select the recovery point that is before the moment the files were encrypted.

On right panel look for a file that you wish to recover, right click to it and select Export as shown on the image below.

ShadowExplorer - recover files

Now select the directory where the recovered files will be saved, then click OK button.

ShadowExplorer - browser for folder

Unfortunately, ransomware often deletes all Shadow copies, and this blocks the ability to use the method described above to recover encrypted files. Therefore, if ShadowExplorer did not find Shadow copies (the field in which the recovery points are listed is empty), then all Shadow copies have been deleted. In this case, you have only one option left, to use data recovery tools. This method of recovering encrypted files is described below.

This video tutorial will demonstrate how to Recover encrypted files from Volume shadow copies using Shadow Explorer.

Recover encrypted files using Photo Rec

Data Recovery Utilities is your last chance to recover encrypted files. Why data recovery tools can help recover encrypted files? Before encrypting the file, some types of ransomware copies its contents to the computer’s RAM, encrypts it, then deletes the non-encrypted file, and writes the encrypted file to the hard disk. In reality, not-encrypted files are not physically deleted; they are simply marked by Windows OS as deleted. Data recovery software scan the computer’s hard drive for such files, and then restore them.

PhotoRec is a free data recovery tool that can help you recover encrypted files. This program has all the necessary functions and is absolutely free. In addition, PhotoRec has repeatedly proven its effectiveness. With its help, many users were able to recover the contents of encrypted files.

Download PhotoRec on your machine by clicking on the link below.

PhotoRec
PhotoRec
221194 downloads
Author: CGSecurity
Category: Security tools
Update: March 1, 2018

After the file download is completed, open the directory where you saved the file. Although PhotoRec does not require installation, but since it is delivered in the archive, you must unpack the archive before using it. Right click to testdisk-7.x.win and select Extract all. Follow the prompts. By default, the program will be unpacked into a new directory, which will be created in the directory where the downloaded file is located. When unpacking is completed, you will see a new directory with the name testdisk-7.x, open it.

testdisk folder

Scroll down the directory until you find a file named qphotorec_win. Run it. You will be shown the main program window as on the image below.

PhotoRec main screen

Find the box that is signed by “Please select a media to recover from”, right-click on it and select the device on which the encrypted files are located.

PhotoRec select device

PhotoRec will scan the partition table of the selected device and show a list of partitions in the list. Select the partition from which you want to start the recovery of encrypted files. Be careful, pay attention to the type of partition (usually NTFS) and its size. Skip sections marked ‘System Reserved’.

PhotoRec select partition

Having decided where PhotoRec will look for unencrypted files, now you need to select the types of files you want to restore. Click File Formats button, a small window opens with a list of file types that PhotoRec has the ability to find and restore. We advise you to leave only those types that you really need, so you will significantly speed up the process of searching and restoring files. After you make your choice, click the OK button.

PhotoRec file formats

And lastly, click on the Browse button and select where the recovered files will be written. We highly recommend that you select an external drive, flash drive, or a separate section of the internal drive. If you restore files to the same disk on which you are looking for them, then the restored files will overwrite files that have not yet been found, which will block the ability to restore their contents.

PhotoRec browse

Now you can start file recovery. Just click the Search button. The program will start searching and restoring files. PhotoRec will open a window in which information on the count of recovered files will be updated in real time.

PhotoRec search

All files that were restored are written to the directory that you specified above. When the file recovery process is completed, press the Quit button. Open the directory where the recovered files were written. You will see something like the following.

PhotoRec recovered files

All recovered files are written in recup_dir.1, recup_dir.2 … sub-directories. If you are searching for a specific file, then you can to sort your restored files by filename, extension and/or date/time.

This video tutorial will demonstrate how to Recover encrypted files using PhotoRec.

Finish words

This manual is designed to help ransomware victims recover encrypted files for free. If you have any questions or comments, then write to us. If you need help, please ask your question here.

 

Tutorials - HowTo
Useful guides

 Previous Post

How to remove Wdonmovincip.info pop-ups (Virus removal guide)

Next Post 

How to remove Tuesdaleyimperien.info pop-ups (Virus removal guide)

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

196 Comments

  1. gkpatel
    ― December 27, 2020 - 6:06 am  Reply

    how do i recover files and data corrupted by ransomware? all file types have been changed to .nobu files?

    1. Myantispyware team
      ― December 27, 2020 - 11:42 pm  Reply

      Use the following guide: https://www.myantispyware.com/2020/12/04/how-to-remove-nobu-ransomware-decrypt-nobu-files/

  2. simon
    ― December 30, 2020 - 3:08 pm  Reply

    i think i found a key hacers hidet the key is in the note in bs player file type repl open wet note pad just at the full bottom where it ses your id
    there is a key hidden full botom i dont now what tu du now that i fund the key

  3. yilin
    ― January 6, 2021 - 6:53 am  Reply

    Hi, my files including pictures, document pdf, notepad all those when open all have many weird words. I have tried use kaspersky ransomware but it couldn’t solve it, saying that wrong format file. What should i do?

    1. Myantispyware team
      ― January 10, 2021 - 3:44 am  Reply

      Maybe your files are encrypted. Have you seen any strange files on your desktop or disk that have a ransom demand message?

  4. Mahesh
    ― January 15, 2021 - 12:25 am  Reply

    Thank you for the help. it worked for me and now i can recover my study files. thanks a lot.keep doing good things.

  5. Rapy
    ― January 16, 2021 - 11:24 am  Reply

    How to recover coos file on my External drive? my files converted All to .coos Please heelp

    1. Myantispyware team
      ― January 21, 2021 - 3:40 am  Reply

      Try PhotoRec.

  6. win
    ― February 1, 2021 - 12:04 am  Reply

    how do i decrypt and recover files and data corrupted by ransomware? all file types have been changed to .POLA files?

    1. Myantispyware team
      ― February 1, 2021 - 12:08 am  Reply

      Use the following guide: https://www.myantispyware.com/2021/01/24/how-to-remove-pola-ransomware-decrypt-pola-files/

  7. Apaar
    ― February 4, 2021 - 7:35 am  Reply

    I m trying to decrypt this WBXD files but i m not able to can someone please help me ?

    1. Myantispyware team
      ― February 7, 2021 - 12:28 am  Reply

      Use the following guide: https://www.myantispyware.com/2021/01/18/how-to-remove-wbxd-ransomware-decrypt-wbxd-files/

  8. umair
    ― February 6, 2021 - 11:43 pm  Reply

    all my pc files are converted to .boop extension by online id and im unable to decrypt the file as I have used many softwares.please hepl me i do not know what to do know…?

    1. Myantispyware team
      ― February 7, 2021 - 12:29 am  Reply

      Your files are encrypted with an online key. It is impossible to decrypt the files, since only the authors of the virus have the decryption key. Try to restore the contents of encrypted files using the steps linked below: How to recover encrypted files.

  9. Aleksandar
    ― February 18, 2021 - 7:00 pm  Reply

    i am infected with ransomware that have a .diysw extension!
    Any help for that?
    crypted all my photos and videos

    1. Myantispyware team
      ― February 19, 2021 - 1:19 am  Reply

      Post here the contents of the ransom demand message (ransomnote)

  10. malyka
    ― February 22, 2021 - 12:35 pm  Reply

    .ygkz decryption please

    1. Myantispyware team
      ― February 23, 2021 - 3:50 am  Reply

      If the files are encrypted with an online key, then you have a small chance to recover the files, try ShadowExplorer and PhotoRec

  11. daniel
    ― February 26, 2021 - 6:16 am  Reply

    hello i got infected by igdm virus anyone can helo

    1. Myantispyware team
      ― February 26, 2021 - 6:37 am  Reply

      Use the following guide: https://www.myantispyware.com/2020/12/09/how-to-remove-igdm-ransomware-decrypt-igdm-files/

  12. mahiraj
    ― February 27, 2021 - 2:07 am  Reply

    hello, my files were encrypted with STOP/DJVU ransomware .igal extension…. the above methods for recovering were succesfull using photoreq… but the decrpyted photos are not mine! they are just random photos of songs/albus etc. is it because my files were encypted with an online key? can i get my files back? also, i’m able to recover photos… videos aren’t decrpted… please tell me a solution for that toooo!! they are really important.
    APPRECIATE IT !

    1. Myantispyware team
      ― March 11, 2021 - 8:40 pm  Reply

      if the files are encrypted with the online key, they cannot be decrypted. The only hope for file recovery is ShadowExplorer and PhotoRec

  13. Milen
    ― March 22, 2021 - 4:38 pm  Reply

    Hello,

    somehow my laptop get infected with many malaware viruses!!I succeed to cleen them but most of my txt and photo and pdf files left with strange end *.ribd!!How can i restore my files!!shadow explorer don’t wanna work!!Photo rec is paid!!Have You got an idea what to do!!I don’t want to reinstall eveything!!Thanks!!

    1. Myantispyware team
      ― March 22, 2021 - 8:24 pm  Reply

      At the moment, you have a small chance to recover encrypted files using ShadowExplorer and PhotoRec. If the first program did not help you, use the second one. Also, PhotoRec is a free program, you can download it from our website. PhotoRec download link: https://www.myantispyware.com/download/photorec

  14. Abdullah S
    ― April 12, 2021 - 2:34 am  Reply

    i have problem of .urnb format files spreads in my whole computer. how to recover my files please tell me ?

    1. Myantispyware team
      ― April 12, 2021 - 3:09 am  Reply

      Use the instructions: https://www.myantispyware.com/2021/04/05/how-to-remove-urnb-ransomware-decrypt-urnb-files/

  15. Aryan Mahesh
    ― April 20, 2021 - 3:59 am  Reply

    Hi Myantispyware team,

    I see my laptop files all show *.lmas extension dated Apr 13. Personal ID at bottom of _reamme.txt the last part of it is “….jmAMboY”. Can you suggest me how can i decrypt my files please.

    Regards,
    Mahesh

    1. Myantispyware team
      ― April 20, 2021 - 4:18 am  Reply

      The “…jmAMboY” ID is related to an online key, so files cannot be decrypted. Try to restore the contents of encrypted files using the steps linked below: How to recover encrypted files.

  16. kajteyger
    ― April 26, 2021 - 6:09 am  Reply

    File: C:\LDPlayer\LDPlayer4.0\rightbar.config.wrui
    Error: No key for New Variant online ID: DfpwcxS40CewlRqNMcHilDcGIHyWXipGs991i3W1
    Notice: this ID appears to be an online ID, decryption is impossible

    1. Myantispyware team
      ― May 16, 2021 - 6:18 pm  Reply

      The “DfpwcxS40CewlRqNMcHilDcGIHyWXipGs991i3W1” ID is related to an online key, so files cannot be decrypted. Try to restore the contents of encrypted files using the steps linked below: How to recover encrypted files.

  17. Badsha
    ― May 8, 2021 - 3:08 am  Reply

    Hi

    My system was encrypt with ransomware virus, all files are encrypted with .wrui extenstion and each folder have not _readme.txt with Personal ID “0294IekdfgHkz5AYNHg05onQEVknFKAwJ3Diurp2OjUsKW3BP7”.
    Can you suggest me how can I decrypt my files please.

    Regards,
    Badsha

    1. Myantispyware team
      ― May 8, 2021 - 10:21 pm  Reply

      The “0294IekdfgHkz5AYNHg05onQEVknFKAwJ3Diurp2OjUsKW3BP7 ” ID is related to an online key, so files cannot be decrypted. Try to restore the contents of encrypted files using the steps above.

  18. hector
    ― May 10, 2021 - 12:57 pm  Reply

    my file type is with pcqq, how can i restore my file. please help, thats all my project file.thanks

    1. Myantispyware team
      ― May 13, 2021 - 3:55 am  Reply

      At the moment, the only chance to restore files (if there are no backups) is to use ShadowExplorer and PhotoRec

      1. Kishore
        ― May 14, 2021 - 4:26 am

        I too got affected but can’t recover files using shadow explorer

  19. Erblin
    ― May 11, 2021 - 2:39 pm  Reply

    how do i recover my .pcqq files, located in local disk (D:) directory ,all my files are there

  20. Alam
    ― May 20, 2021 - 2:00 am  Reply

    how do i recover files and data corrupted by ransomware? all file types have been changed to .nusm ?

  21. Samuel
    ― May 24, 2021 - 5:14 pm  Reply

    how can i recover a system restore point when deleted
    Pls i wanna know, I mistakenly deleted my system restore point when using shadow explorer to restore back my files that were encrypted by NUSM. Thank you

    1. Myantispyware team
      ― June 8, 2021 - 2:49 am  Reply

      When shadow copies are deleted, it is difficult to recover them, but there is a chance. You can find some information by going to the following link: kazamiya.net/en/DeletedSC

  22. Manik
    ― May 25, 2021 - 12:54 pm  Reply

    How do I recover files and data corrupted by ransomware? all file types have been changed to .nusm files?

  23. FITO
    ― May 26, 2021 - 5:29 am  Reply

    I m trying to decrypt this EHIZ files but i m not able to can someone please help me ?

  24. Nasty
    ― June 4, 2021 - 5:12 am  Reply

    My external drive been encrypted with Ehiz virus. what can I do

  25. Dinesh
    ― June 8, 2021 - 2:06 am  Reply

    i was infected with .igvm all files turned into .igvm format i have copied some of important files to pendrive and reset the pc now pc is working good but i want files to be decrypted which are in pendrive can i connect pendrive to my pc and check is their any problem if i connect and see the files in pendrive.

  26. ck
    ― June 9, 2021 - 3:13 am  Reply

    my pc is infected with djvu with online id key. EbdUur4eN30a2mDHyRyl9INx0NUeB4Gq51E0GxGn
    what to do I need to recover my doc and pdf files

  27. saran
    ― June 13, 2021 - 11:53 pm  Reply

    sir
    my computer got virus stop djvu ransomware,
    but all the files encrpted online, kindly assist how to decrypt the files
    No key for New Variant online ID: MzWgWuJIfkTu2xtkfmwImHHBLxU7hYA9mf916gPE

    thanks

    1. Myantispyware team
      ― July 7, 2021 - 12:06 am  Reply

      The “MzWgWuJIfkTu2xtkfmwImHHBLxU7hYA9mf916gPE” ID is related to an online key, so files cannot be decrypted. You can only hope that someday file decryption will be possible. There are no other ways to recover files other than those described above.

  28. Jeffrey
    ― June 19, 2021 - 12:00 am  Reply

    My laptop files have now all a new extension .sspq
    61yDX5QmH3HHgoyHm1GBgMPsiNs00F5WJCQF0Nlw
    and this is the message left on my laptop how can I repair my files please help

  29. noobs
    ― June 19, 2021 - 2:33 am  Reply

    how do i decrypt a whole file from 1 folder and not other bothering other file?

    1. Myantispyware team
      ― July 7, 2021 - 12:08 am  Reply

      Using ShadowEplorer you can restore a file you need separately, the PhotoRec does not provide such an opportunity.

  30. Edy Mikhael
    ― June 22, 2021 - 11:40 am  Reply

    I have done recover my file,so what should i do with the ecrypted one?,should i delete it?

    1. Myantispyware team
      ― July 7, 2021 - 12:10 am  Reply

      If you don’t need information in encrypted files, just delete them. Another option is to reinstall the Windows OS.

« Previous 1 2 3 4 Next »

Leave a Reply Cancel reply

New Guides

Spotifyreview.com Reviews, Spotify Song Reviewer Job Legit Or Scam, Uncovering the Truth!
Hespited.co.in Virus Removal Guide
scam alert
Kurepos.co.in Virus Removal Guide
How to remove Rwandapeaks.top pop-up ads
scam alert
Beware of Xfane.com: Fake Bitcoin Promo Code Scams

Follow Us

Search

Useful Guides

Files encrypted by ransomware become useless
How To Recover Encrypted Files (Ransomware file recovery)
Malwarebytes won’t install, run or update – How to fix it
How to reset Internet Explorer settings to default
How to remove pop-up ads [Chrome, Firefox, IE, Opera, Edge]
How to reset Google Chrome settings to default

Recent Guides

Wdonmovincip.info
How to remove Wdonmovincip.info pop-ups (Virus removal guide)
Adtrafficjam.com
How to remove Adtrafficjam.com pop-ups (Virus removal guide)
Ritteddelibacyca.info
How to remove Ritteddelibacyca.info pop-ups (Virus removal guide)
Express Package Finder Tab
How to remove Express Package Finder Tab (Virus removal guide)
Search.hexpresspackagefinder.com
How to remove Search.hexpresspackagefinder.com [Chrome, Firefox, IE, Edge]

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.