Category Trojans/Viruses

How to remove YYTO Ransomware and decrypt .yyto, .b007, .juuj and .m5m5 files

YYTO Ransomware is new crypto-virus, that encrypt sensitive files on users computers using AES-256 cryptography. Latest version of this ransomware adds .colecyrus@mail.com.b007 suffix to the end of encrypted files. After successful encryption YYTO Ransomware places text files with instructions to pay the ransom on the desktop and in folders with affected files. Instruction files filenames are: help_to_decrypt.txt, read_to_txt_file.yyt, help.txt, encrypt.txt or Readme.txt, depending on the version of ransomware in your case. Ransom amount is between $500 and $1500.

How to remove TeslaCrypt 4.2 Ransomware and decypt .vvv and .exx files

If you are infected with ransomware and you see any of this extension added - that means your files are encrypted with TeslaCrypt 4.2 or earlier versions and your files can be decrypted. To effectively restore your files you need to remove any active process of this ransomware using special removal tools or trying standard antivirus software. After this you need to use special decoders to determine decryption key and get your files back. Follow instructions below to remove TeslaCrypt 4.2 Ransomware and decrypt .vvv or .exx files in Windows 10, Windows 8, Windows 7.

How to remove Arena Ransomware and decrypt .arena files

Arena Ransomware is successor of Dharma Ransomware from CrySis crypto-virus family. This malware uses asymmetric cryptography to encrypt users files, such as documents, photos, music, videos, games etc. This version appends .arena extension to affected files. After finishing encryption process various versions of Arena Ransomware can create different text or html files with instructions: FILES ENCRYPTED.txt, info.hta, Your personal data are encrypted!.txt, _HELP_INSTRUCTION.TXT. Ransomware can demand payment from 0.3 to 1 BitCoins (which is equivalent to $2000 - $6000) for decryption services, but usually malefactors don't send any keys.

How to remove Sage 2.2 Ransomware and decrypt .sage files

Sage 2.2 Ransomware is successor of Sage 2.0 Ransomware and Sage Ransomware based on CryLocker family. It was changed in terms of design of desktop background and payment pages. It also uses new filenames for instructions file and image file (!HELP_SOS.hta and !HELP_SOS.bmp). Virus still adds .sage file extension to encrypted files and uses Microsoft SAPI voice to read the message on your desktop aloud. This is done to create negative psychological effect. Latest version of this ransomware demands 0.17720 BTC or almost $1000 for decryption.