We have made a collection of ransomware decryption tools in order to help you with getting your files back. The ransomware decryption tools which have been listed here, have been collected from various online sources. Where it is possible – we will try to mention the source of the ransomware decryption tool.
There is just one important thing you need to keep in mind – there is no guarantee that the decryption tools that have been listed here will be able to get your files back. The ransomware environment is moving in a very fast pace which means that the tools that are listed here can be outdated in just a couple of days.
The Locky family changes the extensions of the files with the .locky extention, this is a strong indicator that your device has become the victim of the Locky ransomware family.
Emsisoft Decrypter for AutoLocky
The guys from Emsisoft said the following about the Locky family:
AutoLocky is a new ransomware written in the popular scripting language AutoIt. It tries to imitate the complex and sophisticated Locky ransomware, but is nowhere near as complex and sophisticated, which makes decryption feasible.
Which means that there is a chance to getting your files back.
You can download the Emsisoft Decrypter for AutoLocky directly from the official Emsisoft website.
The HydraCrypt and UmbreCrypt is another ransomware family which is known for encryption various files on the infected device – another known item with this ransomware family is the fact that it changes the last 15bits of any encrypted file – which in order results in a damaged or corrupt file. If that has happened, you can use repair tools to repair the corrupted or damaged file – another method is to open and save the file again.