Infected with JohnyCryptor Ransomware? Need to decrypt your files?
What is JohnyCryptor Ransomware
JohnyCryptor is wide-spread ransomware virus, that uses AES encryption to encrypt important files (documents, photos, e-mails, music, video, gaming files). Virus adds .firstname.lastname@example.org or .email@example.com extension to encrypted files (depending on version), and creates “How to decrypt your files.txt” file on the desktop. This file contains instructions to pay the ransom and get the decryptor. Users have to pay from 0.5 to 1.5 ($250-$700) BitCoins to get the decryptor. Virus also modifies desktop background with the same instructions and picture of man wearing the hood and matrix theme. Updated ransom-demanding message says:
Attention! Your computer has been encrypted by cryptographically strong algorithm. All your files are now encrypted. You have only one way to get them back safely – using original decryption tool. Using another tools (back-ups, recovery soft and others) could corrupt your files, in case of using third-party software we don’t give guarantees that full recovery is possible, so use it on your own risk.
To get original decryptor contact us with email. In subject line write your ID, which you can find in name of every files, also attach to email 3 crypted files. (files have to be less that 2MB). JohnyCryptor@hackermail.com It is in your interest to respond as soon as possible to ensure the restoration of your files, because we won’t keep your decryption keys at our servers more than one week in interest of our security. P.S. only in case you don’t receive a response from the first email address within 24 hours, please use this alternative email address. JohnyCryptor@india.com
Use instructions in this tutorial to remove JohnyCryptor ransomware and decrypt .firstname.lastname@example.org files for free in Windows 10, Windows 8, Windows 7 or earlier versions of Windows.
JohnyCryptor Ransomware version 1 (.email@example.com files):
JohnyCryptor Ransomware version 2 (.firstname.lastname@example.org files):
How JohnyCryptor Ransomware infected your PC
JohnyCryptor Ransomware distributes using standard methods (malicious email attachments, torrent (P2P) networks, fake invoices). JohnyCryptor Ransomware uses TOR network for receiving ransom, which makes it very difficult to trace the attacker. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police, as user in this network are often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.
First of all don’t panic. Follow these easy steps below.
1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the JohnyCryptor Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.
Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to JohnyCryptor Ransomware – files, folders, registry keys.
*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.
Step 2: Remove following files and folders of JohnyCryptor Ransomware:
Remove following registry entries:
Remove following files:
How to decrypt files infected by JohnyCryptor Ransomware (.email@example.com files)?
Use automated decryption tools
There is ransomware decryptor from Kaspersky that can decrypt .firstname.lastname@example.org files. It is free and may help you restore .email@example.com files encrypted by JohnyCryptor Ransomware virus. Download it here:
You can also try to use manual methods to restore and decrypt .firstname.lastname@example.org files.
Decrypt .email@example.com files manually
Restore the system using System Restore
Although, latest versions of JohnyCryptor Ransomware remove system restore files, this method may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.
- Initiate the search for ‘system restore‘
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – JohnyCryptor Ransomware by JohnyCryptor Ransomware). This feature is available in Windows 7 and later versions.
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
Restore .firstname.lastname@example.org files using shadow copies
- Download and run Shadow Explorer.
- Select the drive and folder where your files are located and date that you want to restore them from.
- Right-click on folder you want to restore and select Export.
- Once the scanning process is done, click Recover to restore your files.
Protect your computer from ransomware
Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.
Information provided by: Alexey Abalmasov