AI Detective Prevents AI-Powered Crimes
🛡️

Ransomware Decryptor Guidance Hub

Identify your ransomware • Get the official decryptor • Follow step-by-step recovery instructions

🔍 Ransomware Identifier

How would you like to identify your ransomware?

OPTION 1: By File Extension

Enter the extension of your encrypted files (e.g., .encrypted, .locked, .crypted)

OPTION 2: By Ransom Note

Paste text from your ransom note file for analysis

OPTION 3: Browse All Ransomware Families
All A-C D-G H-L M-P R-S T-Z

📊 Hub Statistics

200+
Ransomware Families Tracked
135+
Decryptors Available
Weekly
Database Updates

🆕 Recently Added Decryptors (2023-2026)

FunkSec Decryptor
Jan 2025 • Bitdefender • .funksec, .FunkSec
Rhysida Decryptor
Dec 2024 • Avast/No More Ransom • .rhysida
Akira Decryptor
Dec 2024 • Avast • .akira
Black Basta Decryptor
Nov 2024 • SRLabs • .basta
Phobos/8Base Decryptor
Oct 2024 • Europol/Avast • .phobos, .eight
LockBit 3.0 Decryptor
Oct 2024 • Avast/No More Ransom • .lockbit3
BianLian Decryptor
Oct 2024 • Avast • .bianlian
DoNex Decryptor
Sep 2024 • Avast • .donex
Midnight/Endpoint Decryptor
Nov 2024 • Kaspersky • .endpoint
HomuWitch Decryptor
Aug 2024 • Emsisoft • .homuwitch
Hive v1-v4 Decryptor
2024 • FBI/No More Ransom • .hive
TargetCompany Decryptor
2024 • Avast • .mallox, .tohnichi
ShrinkLocker Decryptor
Nov 2024 • Bitdefender • Abuses Windows BitLocker
Brain Cipher Decryptor
Dec 2024 • Self-released • Indonesia data center attack
Key Group Decryptor
Aug 2024 • EclecticIQ • Weak encryption exploited
BlackCat/ALPHV Decryptor
Dec 2023 • FBI • 500+ victim keys released
MortalKombat Decryptor
2023 • Bitdefender • Free decryptor
Conti Decryptor
2022 • Kaspersky • Source code + keys leaked
Yanluowang Decryptor
2024 • Kaspersky • Cryptographic vulnerability

🦠 Major Ransomware Families (Decryptors Available)

STOP/DJVU Ransomware
Most Common • Emsisoft • 4.6M+ downloads
GandCrab v1-v5.2
Bitdefender • .CRAB, .GDCB, .KRAB
REvil/Sodinokibi
Bitdefender • .sodinokibi, .revil
Dharma/CrySIS
Kaspersky • .dharma, .wallet
Maze/Sekhmet/Egregor
Emsisoft • Keys leaked by operators
Avaddon
Emsisoft • Keys released by operators
Diavol
Emsisoft • .lock64
DeadBolt (QNAP)
Emsisoft • .deadbolt

📚 Full Decryptor Database (A-Z)

Complete list of 200+ ransomware families with available free decryptors. Click any entry for download links.

⭐ = Recently added (2023-2026) | Data sources: No More Ransom, Emsisoft, Kaspersky, Avast

⚠️ Active Threats Without Public Decryptors

These ransomware families are currently active but have no free public decryptor available. If infected, do NOT pay the ransom — preserve encrypted files and check back regularly as new decryptors are released.

🔴 RansomHub
🔴 Medusa
🔴 Play
🔴 BlackSuit / Royal
🔴 Cl0p
🔴 INC Ransom
🔴 Hunters International
🔴 Cactus
🔴 Qilin / Agenda
🔴 DragonForce
🔴 Fog
🔴 Lynx

💡 Tip: Report ransomware incidents to FBI IC3 and CISA StopRansomware. Do not pay the ransom — there is no guarantee of recovery and it funds criminal activity.

← Back to Identification
🦠

STOP/DJVU Ransomware

✅ DECRYPTOR AVAILABLE
Last Updated: December 2024 Decryptor Source: Emsisoft

📋 Ransomware Information

First Seen:
December 2018
File Extensions:
.djvu, .djvuq, .djvur, .djvut, .pdff, .tro, .tfunde, .tfudet, .rumba, .adobe, .adobee, .blower, .promos, .promoz, etc.
Ransom Note:
_readme.txt
Encryption:
Salsa20 + RSA-1024
Decryptable:
✅ Yes (for offline keys)
⚠️ Partial (for online keys)

🔓 Step-by-Step Recovery Instructions

STEP 1: Download the Decryptor

Download the official STOP Djvu Decryptor from Emsisoft:

→ https://www.emsisoft.com/ransomware-decryption/stop-djvu
File size: ~2.5 MB | Last updated: December 2024

STEP 2: Prepare Your Files

Before running the decryptor:

  • ✓ Ensure ransomware is removed (run antivirus first)
  • ✓ Create backup of encrypted files (just in case)
  • ✓ Gather file pairs (original + encrypted) if you have any
  • ✓ Note your Personal ID from _readme.txt
STEP 3: Run the Decryptor
  1. Extract the downloaded ZIP file
  2. Right-click decrypt_STOPDjvu.exe → Run as Administrator
  3. Accept the license terms
  4. Click "Add Folder" to select folders with encrypted files
  5. Click "Decrypt"
⚠️ IMPORTANT: The decryptor works for OFFLINE KEYS only. If your ID ends in "t1" it's an offline key (high chance). If your ID is different, it may be an online key (lower chance, but new keys are added regularly).
STEP 4: Verify Recovery

After decryption completes:

  • ✓ Check a few recovered files to ensure they open correctly
  • ✓ Keep encrypted backups until you verify all files
  • ✓ Delete encrypted files only after full verification