malwarebytes banner


Articles about removing Windows lockers, Browser lockers, Crypto-viruses and other types of blackmailing threats.

How to remove Dharma-2020 Ransomware and decrypt .2020 files

Discovered recently, Dharma-2020 is a ransomware program that uses strong cryptographic algorithms to block data and demand to pay a ransom. After the virus attacks your computer, it instantly ciphers the stored files by retitling them with a criminal's e-mail address and other symbols. For example, 1.mp4 will be renamed into something like{random-8-digit-alphanumerical-sequence}.[].2020. After successful encryption, the program shows a message window and creates a ransom note called FILES ENCRYPTED.txt. The malware locks any attempts to decrypt your files and to use certain security programs. Then, Dharma-2020 Ransomware does a pure classic asking users to pay a ransom in BTC (from $50 to $500) and send a paycheck to their e-mail after which, they will give you a decryption program.

How to remove Oonn Ransomware and decrypt .oonn files

STOP Ransomware is a plague of 2019, tenacious virus based on encryption technology. Ransomware uses the AES encryption algorithm to encode important files and extorts a ransom in BitCoins for decryption. This malware aims western countries mostly, but there've been thousands of infections detected in other parts of the world. Oonn Ransomware uses the same patterns but adds different extension to modify the files. Version that we observe today appends .oonn extension. The crypto-virus affects the user's valuable data: photos, videos, documents, it takes hostage potentially important files. Malefactors demand $980 for the decryption tool. The are mockingly offer a 50% discount if users pay fast. There is no reason to trust the developers of computer viruses. In the entire history of the activity of Oonn Ransomware, there were no cases, when they sent a decryption tool to the people who paid. On the contrary, there are chances to return the files using instructions and tools featured in this article. For example, computer security enthusiasts developed STOPDecrypter, that can help in 5-10% of cases. Full decryption is the only possible if there your computer or ransomware servers were offline during the process of encryption.

How to remove BlackClaw Ransomware and decrypt .apocalypse or .bclaw files

BlackClaw is a recent ransomware infection that uses AES and RSA algorithms to encrypt user's data. Some experts similized it with another file-encrypting virus called Billy's Apocalypse"because of similar ransom note details, however, as research continued, it turned out that there is no correlation with it. BlackClaw is an independent piece that assigns .apocalypse extension to encrypted files. For example, a file like 1.mp4 will suffer a change to 1.mp4.apocalypse. After these changes have been applied, users no longer have access to their data. The next step of BlackClaw after blocking data is dropping a text file (RECOVER YOUR FILES.hta or RECOVER YOUR FILES.txt) that notifies people about encryption. To decrypt files, users have to give 50$ over to bitcoin address mentioned in the note and contact extortionists via the Telegram channel. Thereafter, victims will supposedly get a decryption tool to restore locked files. Although 50$ is not that big amount for ransomware developers, there is still a risk of being fooled and ignored by cyber criminals after making a payment.

How to remove Dharma-GNS Ransomware and decrypt .GNS files

Determined by Jakub Kroustek, GNS Ransomware belongs to the Dharma family that encrypts users' data and demands a certain fee to get it back. Likewise other Dharma versions, GNS applies a string of symbols including victim's ID, cybercriminal's email (, and .GNS extension at the end. If an original file like 1.mp4 gets configured by GNS, it will be renamed to[].GNS or similarly. The next stage after encryption is presenting victims with detailed instructions on the decryption process. These are incorporated in the FILES ENCRYPTED.txt file or a pop-up window that comes after encryption. Choosing to pay a ransom is also a huge risk since most people get scammed and do not receive promised tools as a result. Our guide below will teach you how to deal with such infections like GNS and create better soil for being protected in the future.

How to remove Oled-Makop Ransomware and decrypt .oled, .makop, .btc or .shootlock files

Oled-Makop Ransomware is a type of virus that aims at encrypting multiple files and demanding a payment to get decryption software. All of these symptoms are part of ransomware operation. Once installed, it is configured to cipher various kinds of data ranging from videos, images, text files, PDFs to others. Then, the isolated files are suffering a couple of changes: firstly, they change their extensions to .[].oled or .[].makop (.[].makop)and reset their icons to clean sheets. For example, normal 1.mp4 will be transformed into 1.mp4.[].makop immediately after the penetration. After that, the program creates a ransom note, called readme-warning.txt, where developers explain why your data was locked and how to recover it. To incept their trust, they are offering to decrypt one simple file with .jpg, .xls and .doc extensions (not over 1 MB) by sending it via a given e-mail as well as proceeding a payment to get a "scanner-decoder" program. Very often, decryption with third-parties tools is impossible without the involvement of malware developers. However, it does not mean that you have to gift them money since there is a risk that they will not keep their promises. Instead, you should delete Oled-Makop Ransomware from your computer to ensure further safety and recover the lost data from an external backup if possible.

How to remove Ragnar Locker Ransomware and decrypt .ragnar or .ragn@r files

Ragnar Locker is a malicious piece classified as ransomware that encrypts personal data and disables the work of installed programs like ConnectWise and Kaseya, which provide solutions for many Windows services, including data recovery, ransomware protection, and other ways to secure privacy. This is made to slacken the ability of the system to counter ransomware infection. In fact, you will not spot these changes and your data will be locked instantly. The way Ragnar Locker encrypts user's files is by assigning the .ragnar (or .ragn@r) extension with random characters. For instance, the original file named 1.mp4 will be retitled to 1.mp4.ragnar_0FE49CCB and reset its icon as well. After the encryption process gets to a close, Ragnar Locker creates a text file named according to the combination used for encrypted files (RGNR_0FE49CCB.txt). Unfortunately, attempting to use third-parties utilities for decryption, may injure data and lead to its permanent loss. Therefore, the best way to retrieve files for free is to delete Ragnar Locker Ransomware and restore blocked files from backup (USB-storage), if possible.