malwarebytes banner


How to remove BlackByte Ransomware and decrypt .blackbyte files

BlackByte is the name of a data-locker that encrypts files stored on a device. Such malware is more known as ransomware because it extorts money from victims for the recovery of data. Even though BlackByte is new and little observed, there are enough details to differ it from other infections. One of them is the .blackbyte extension that is appended to each encrypted file. For instance, a piece like 1.pdf will change its extension to 1.pdf.blackbyte and reset the original icon. The next step after encrypting all available data is ransom note creation. BlackByte generates the BlackByte_restoremyfiles.hta file, which displays recovery details. Within, victims are instructed to contact cyber criminals by e-mail. This action is mandatory to receive further instructions on how to purchase a file decryptor. This decryptor is unique and held only by cybercriminals. The price of ransom can vary from person to person reaching hundreds of dollars. Keep in mind that paying the ransom is always a risk to lose your money for nothing. Many extortionists tend to fool their victims and not send any decryption instruments even after receiving the requested money. Unfortunately, there are no third-party decryptors that can guarantee 100% decryption of BlackByte files.

How to remove Ranion Ransomware and decrypt .ransom or .r44s files

Ranion is a malware group that develops and spreads ransomware infections. Its recent version is called R44s, which encrypts data using strong cryptographic algorithms and then demands money for its redemption. Victims can spot their files have been encrypted by visual means. First versions of Ranion Ransomware discovered in Novemver, 2017 used .ransom extension. Now the virus assigns the plain .r44s extension to all compromised pieces. Here is a quick example of how files will look after successful encryption - 1.pdf.r44s, 1.jpg.r44s, 1.xls.r44s, and so forth depending on the original file name. Right after this encryption process ends, R44s creates an HTML file named README_TO_DECRYPT_FILES.html.

How to remove Artemis Ransomware and decrypt .artemis, .ultimate or .999 files

Discovered by a malware researcher named S!Ri, Artemis belongs to the PewPew ransomware family. Frauds behind this family have spread a number of high-risk infections that run data encryption. Artemis is the most recent variant of file-encryptor that cuts access to most stored data using multi-layer cryptographic algorithms. These algorithms make data thoroughly encrypted, which disables users from opening them. Besides that, encrypted files locked off by Artemis get changed in visual means as well. For instance, a file like 1.pdf will change to something like's_ID.[].artemis and reset its original icon. This string consists of the victims' ID, email address, and .artemis extension at the end. Then, as soon as encryption gets to a close, Artemis prompts the info-decrypt.hta to appear across the entire screen. Recent versions of the malware use ReadMe-[victim's_ID].txt ransom note name and use .ultimate and .999 extensions ([victim's_ID].[].ultimate and[victim's_ID].[].999).

How to remove GoodMorning Ransomware and decrypt .GoodMorning, .LOCKED or .REAL files

GoodMorning is a malicious program classified as ransomware. Its main goal lies in earning money on victims whose data has been encrypted with strong ciphers. Usually, victims end up aware of the infection after GoodMorning assigns a new complex extension to compromised files (ending with .GoodMorning, .LOCKED or .REAL). For example, 1.pdf and other files stored on a system will be changed to this pattern 1.pdf.Id(045AEBC75) Send Email( or .Id = D8CXXXXX Email = .LOCKED. The ID inside of extensions will differ individually as it is unique to each of the victims. Then, once all files end up encrypted and visually changed, the virus creates text notes called either GoodMorning.txt, ReadIt.txt or ReadMe.txt. It is meant to explain broader instructions on how to recover your data.

How to remove Wiot Ransomware and decrypt .wiot files

Wiot Ransomware (a.k.a. STOP Ransomware or Djvu Ransomware) is extremely dangerous virus that encrypts files using AES-256 encryption algorithm and adds .wiot extensions to affected files. The infection mostly involves important and valuable files, like photos, documents, databases, e-mails, videos, etc. Wiot Ransomware does not touch system files to allow Windows to operate, so users will be able to pay the ransom. If the malware server is unavailable (computer is not connected to the Internet, remote hackers' server does not work), then the encryption tool uses the key and identifier that is hard-coded in it and performs offline encryption. In this case, it will be possible to decrypt the files without paying the ransom. Wiot Ransomware creates _readme.txt file, that contains ransom message and contact details, on the desktop and in the folders with encrypted files. Developers can be contacted via e-mail: and

How to remove Pagar Ransomware and decrypt files

Pagar is a ransomware program that infects Windows systems to encrypt personal data. It affects the configuration of stored files making them totally inaccessible. This means any attempts to open the files will be denied due to encryption. Besides configuration changes, Pagar Ransomware alters data by visual means as well - by assigning the extension to each file under encryption. For instance, a file like 1.pdf will change to and reset its original icon to blank. After all files end up encrypted, Pagar creates a ransom note called Urgent Notice.txt, which explains how to recover the data. Ransomware developers are being concise and say you have 72 hours to send 0.035 BTC to the attached wallet. Right after completing the payment, victims should contact developers via attaching their own wallet address and unique ID (written in the note). Unfortunately, there is zero information on whether Pagar developers can be trusted.