css3menu.com Remove (old) anti-virus application Underneath you will find a list of tools that can help to decrypt files that are encrypted by ransomware.
Although over 160.000 keys are used by the tools, it is only a relative small part of the total amount that is used by the bad guys.
If these tools can't decrypt the file(s) and you do not have a clean backup of them, consider your files lost.

NAME DECRYPTS INFORMATION
Coinvault Coinvault The National High Tech Crime Unit (NHTCU) of the Netherlands’ police, the Netherlands’ National Prosecutors Office and Kaspersky Lab have been working together to fight the CoinVault ransomware campaign. During the joint investigation they have been able to obtain data that can help you to decrypt the files being held hostage on your PC. They provide both decryption keys and the decryption application.
For more information : How-to guide
Shade
(kaspersky)
Shade File extensions :.breaking_bad, .heisenberg, .xtbl, .ytbl
Shade
(Intel/McAfee)
Shade File extensions :.breaking_bad, .heisenberg, .xtbl, .ytbl
For more information : How-to guide
Rakhni Agent.iih For more information : How-to guide.
Aura Aura For more information : How-to guide.
AutoIt Autoit For more information : How-to guide.
Bitman Bitman For more information : How-to guide.
Cryptokluchen Cryptokluchen For more information : How-to guide.
Democry Democry For more information : How-to guide.
Lamer Lamer For more information : How-to guide.
Lortok Lortok For more information : How-to guide.
Pletor Pletor For more information : How-to guide.
Rakhni Rakhni For more information : How-to guide.
Rotor Rotor For more information : How-to guide.
TeslaCrypt
(Trend Micro)
Versions 1 and 2 File extensions :.ECC, .VVV, CCC, ZZZ, AAA, ABC, XYZ
For more information : How-to guide.
TeslaCrypt
(Kaspersky)
Versions 3 and 4 File extensions : .XXX, .TTT, .MP3, .MICRO
For more information : How-to guide.

© 2014 - ACHE