How to remove Osiris ransomware and decrypt .osiris files

Standard

What is Osiris Ransomware

Osiris Ransomware is newest variant of Locky ransomware. According to its name, new virus adds .osiris suffix to encrypted files and modifies filenames so they look like that: [8_random_characters]-[4_random_characters]-[4_random_characters]-[8_random_characters]-[12_random_characters].osiris. Osiris encrypts files with RSA-2048 and AES-128 algorithms that currently cannot be decrypted. Ransom is near 2.5 BitCoins (~$1880) and there is no earthly use to pay it. Osiris ransomware alters desktop background with typical image with text instructions. User can only make payment to anonymous Bitcoin wallets, so that police cannot keep track on malefactors. Virus copies 3 files (OSIRIS.html, OSIRIS_[4_digit_number].html and OSIRIS.bmp) to the folder with encrypted files. Read this guide to remove Osiris ransomware and decrypt .osiris files in Windows 10, 8, 7, XP.

osiris ransom note
osiris decryptor page
files encrypted by locky osiris

Note: Hackers usually do not send any decryptors or decryption keys even if you pay them. Wait until working decryptor appears or try to restore .osiris files manually from backup or using instructions below.

How Osiris Ransomware infected your PC

Osiris spreads via e-mails with malicious attachments with strange extensions (.xls, .tdb, .zk, .342, .343, .552) or through Facebook spam messages. E-mails pretend to be from DHL or FedEx. Infection is realized via archived java-script files or built-in macros inside the Word or Excel document, that will then download main executable. JavaScript files icons may look like text files and unsuspecting users usually click on them. Virus assigns certain ID with the victims, that is used to name those files and supposedly to send decryption key. In order to prevent infection with this type of threats in future we recommend you to use SpyHunter and HitmanPro with Cryptoguard. Example of spam e-mail that distributes Locky (.osiris) virus.

From: "Marina"
To: [REDACTED]
Subject: Emailing: _0828817_36073220
Date: Mon, 05 Dec 2016 15:24:01 +0530

Your message is ready to be sent with the following file or link
attachments:

_0828817_36073220

Note: To protect against computer viruses, e-mail programs may prevent
sending or receiving certain types of file attachments. Check your e-mail
security settings to determine how attachments are handled.

Attachment: _0828817_36073220.xls

Download Osiris Ransomware Removal Tool

Download Removal Tool

To remove Osiris Ransomware completely we recommend you to use SpyHunter from EnigmaSoftware Group LLC. It detects and removes all files, folders and registry keys of Osiris Ransomware.

Alternative remover

Download Malwarebytes Anti-Malware

As a good free alternative to remove Osiris Ransomware use Malwarebytes Anti-Malware. It will detect core files and processes of Osiris ransomware and eliminate them to allow you start decryption of your files.

How to remove Osiris Ransomware manually

It is not recommended to remove Osiris Ransomware manually, for safer solution use Removal Tools instead.

Osiris Ransomware files:


OSIRIS.bmp
OSIRIS.html
OSIRIS_[4_digit_number].html

Osiris Ransomware registry keys:


no information

How to decrypt and restore .osiris files

Use automated decryptors

kaspersky rannoh decryptor

Osiris Ransomware allows user to decrypt 1 file for free. This can be used to attempt and decrypt all files by determining encryption key using this decrypted file and comparing it with encrypted one using special tools. Ransomware decryptor from Kaspersky may be useful in this case. It is free and easy to use. Download Kaspersky Ransomware Decryptor here:

Download Kaspersky Ransomware Decryptor

There is no purpose to pay the ransom, because there is no guarantee you will receive the key, but you will put your bank credentials at risk.

If you are infected with Osiris ransomware and removed it from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:

Using Windows Previous Versions option:

  1. Right-click on infected file and choose Properties.
  2. Select Previous Versions tab.
  3. Choose particular version of the file and click Copy.
  4. To restore the selected file and replace the existing one, click on the Restore button.
  5. In case there is no items in the list choose alternative method.

Using Shadow Explorer:

  1. Download Shadow Explorer program.
  2. Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
  3. Select the drive and date that you want to restore from.
  4. Right-click on a folder name and select Export.
  5. In case there is other dates in the list choose alternative method.

If you are using Dropbox:

  1. Login to the DropBox website and go to the folder that contains encrypted files.
  2. Right-click on the encrypted file and select Previous Versions.
  3. Select the version of the file you wish to restore and click on the Restore button.

How to protect computer from viruses like Osiris Ransomware in future

Use Malwarebytes Anti-Ransomware Beta

Famous anti-malware vendor Malwarebytes along with EasySync Solutions created tool that will help you with active anti-ransomware protection as additional shield to your current protection.

Download Malwarebytes Anti-Ransomware Beta

Use HitmanPro.Alert with CryptoGuard

Dutch vendor of legendary cloud-based scanner HitmanPro – SurfRight released active antivirus solution HitmanPro.Alert with CryptoGuard feature that effectively protects from latest versions of cryptoviruses.

Download HitmanPro.Alert with CryptoGuard
  • Debbie Farr

    We have the Osiris ransomware virus on our main server and has infected every excel and word document we have. How can i remove it? Malwarebytes didnt work, and i tried several others with no help.
    Any Ideas?

    • Debbie Farr

      Can anyone help with this problem?

      • Tom B

        One of our clients was affected by this infection yesterday. Almost all the data on the file server was encrypted. The easiest and safest solution was to recover from backup. It took us roughly 3 hours to get them back up. Good luck!

        • sanjeev

          how did you delete the existing osiris files from server? i see the files return back once i delete

          • Edward Spencer

            The Ransomware virus files will almost certainly not be running from the server but from a computer on the network. To find out which one check the properties of the OSIRIS.htm file in an encrypted location and under details check the owner of that file. That will be the user logged into the PC encrypting files.

  • Jimmy Kringle

    LISTEN UP IF YOU HAVE RANSOMWARE INSTALLED IN YOUR PC/NETWORK!

    I HAVE THE SOLUTION FOR REMOVING ALL AND I MEAN ALL RANSOMWARE INCLUDING THE LATEST Petya Or NotPetya!

    THIS INCLUDES ANYTHING THAT PASSWORD PROTECT YOUR FILES, FOLDERS OR EVEN COMPLETE HARD DRIVE(S)!

    WE DO NOT AND WILL NOT ASK FOR ANY COMPENSATION AT ALL INCLUDING MONEY!

    GET IT BEFORE YOU PAY A HUGE PRICE TO RETRIEVE YOUR FILES, OR WORSE, LOSE ALL YOUR FILES!!

    Download:
    https://sabercathost.com/9fnP/All-in-one_Ransomware_Removal_Tool.zip

    OR

    Download:
    https://www.sendspace.com/file/pm43vn

    Password: rrt

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close