What is Locky virus
Update: in some cases .locky files can by decrypted by AutoLocky Decryptor from EmsiSoft. Read below to download free decryptor and leave comments if it works!
Locky is ransomware virus that encrypts you files using the RSA-2048 and AES-1024 algorithms and demands 0.5 BTC (bitcoins) (equivalent to $207) for receiving “Locky Decrypter” to allow user decrypt his documents and images. This is very dangerous blackmailing virus and there are currently only few ways to decrypt your files. In this guide we collected all information available that can help you remove Locky ransomware virus and restore infected files.
How Locky virus infected your PC
Locky virus spreads via spam e-mail attachments as .doc or .xls file. Texts of these e-mails try to ensure user that attachments contains important invoice. After downloading it asks user to enable macros to be able to see the contents of the document. This macros downloads and runs executable file that starts encrypting user files. Affected files names are modified to unique 16 letter and digit combination with a .locky file extension. Then Locky virus opens _Locky_recover_instructions.txt file with instructions and URLs that lead to The Locky Decrypter Page.
Download Locky Virus Removal Tool
To remove Locky Virus completely we recommend you to use WiperSoft AntiSpyware from WiperSoft. It detects and removes all files, folders and registry keys of Locky Virus.
As a good free alternative to remove Locky Virus use Malwarebytes Anti-Malware. It will detect core files and processes of Locky ransomware and eliminate them to allow you start decryption of your files.
How to remove Locky virus manually
It is not recommended to remove Locky virus manually, for safer solution use Removal Tools instead.
Locky virus files:
Locky virus reg keys:
HKCU\Control Panel\Desktop\Wallpaper "%UserProfile%\Desktop\_Locky_recover_instructions.bmp"
How to decrypt and restore .locky files
Update! Download free AutoLocky Decryptor from EmsiSoft here:
There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
If you are infected with Locky ransomware and removed it from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some cryptolockers. However, there is currently no automatic decryption tool for .locky files. To attempt to remove them you can do the following:
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there is other dates in the list choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses like Locky in future
Use Malwarebytes Anti-Ransomware Beta
Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.
Use HitmanPro.Alert with CryptoGuard
Dutch vendor of legendary cloud-based scanner HitmanPro – Surfright released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.