The Top 5 Ransomware Removal and Decryption Tools – MUO – MakeUseOf

Ransomware incidences are on the rise, and many targeted companies have lost millions of dollars to cybercriminals in this way.

The anonymity provided by crypto networks is partly to blame for the scourge. Most ransomware groups currently prefer that payments be made in privacy-centric tokens, a strategy that complicates the process of tracking down perpetrators.

So how can you protect against ransomware? Are there are removal tools you can use?

Here are some of the top ransomware removal and decryption tools you can use. But if in doubt, call in a professional.

1. Kaspersky

Screeenshot of Kaspersky ransomware tool page.

Kaspersky has about a dozen standalone ransomware removal tools that are designed to fix specific infections. As such, it is imperative to first identify the ransomware infection before selecting the ideal tool.

The selection includes the Shade Decryptor, which tackles Shade ransomware attacks, and the Rakhni Decryptor, which is effective against Rakhni, Agent.iih, Autoit, Aura, Pletor, Rotor, Cryptokluchen, Lamer, Democry, Lortok, Chimera, and related infections.

2. Quickheal

Quickheal has a ransomware decryption tool, which unlike Kaspersky’s, is a holistic software that detects and decrypts a wide range of ransomware infections.

The application automatically scans the computer for supported encrypted files and then decrypts them. After a scan, each encrypted file is replaced with a decrypted version. The initially encrypted documents are kept in a separate folder. Details of the decrypted files can be found in Decryption.log.

The company also has an Emergency Disk feature that can be used to boot a computer that is unable to start properly following a ransomware attack. The software is supposed to be installed on a flash drive and used when booting to allow scanning before the Operating System kicks in.

Quickheal also has an autorun protection mechanism that mitigates ransomware infections. It achieves this by preventing malware from automatically executing when introduced via a removable disk.

3. AVG

Screenshot of AVG Internet Security dashboard.

AVG antivirus has a list of sui generis ransomware removal tools that are tailored to remove specific viruses. The list includes Apocalypse, Bart, BadBlock, Legion, and TeslaCrypt ransomware tools. Their names correspond to the respective ransomware infections that they are developed to counter.

Besides this, AVG also has a built-in Ransomware Protection feature that is available in the latest AVG Internet Security version. It protects personal files against ransomware attacks by blocking file modification, deletion, and encryption. It further comes with a personalization option that allows users to specify applications that are allowed to modify certain files.

4. Emsisoft

Emsisoft has an array of ransomware removal tools that can detect infections and decrypt files. The company’s foremost option allows victims to upload infected files on the site for infection identification and resolution.

The company also has dozens of dedicated tools used to decrypt files. They include the Emsisoft Decryptor for Ims00rry, the Emsisoft Decryptor for JSWorm 2.0, and Emsisoft Decryptor for CheckMail7.

5. Windows Defender


Windows 10 comes with an in-built ransomware protection tool that allows users to specify files requiring enhanced shielding from ransomware attacks.

The feature is located under Windows Defender in the Virus & Threat Protection subset. It can be accessed by keying in “Ransomware Protection” on the Cortana search bar and then enabling Controlled Folder Access. Specific files and folders can be added to the Controlled Folder Access list.

A Last Word

Besides using anti-ransomware tools to protect files, backing them up on cloud hosting services such as Google Cloud and Microsoft’s OneDrive also helps to prevent substantial data loss in the event of a ransomware attack.

It is, however, important to note that all cloud platforms are susceptible to hack attacks, but with varying degrees that are heavily dependent on the security protocols used.

Keeping the files in an external storage device also works when trying to protect important files against online attacks.


7 Ways to Avoid Being Hit by Ransomware

Ransomware can literally ruin your life. Are you doing enough to avoid losing your personal data and photos to digital extortion?

Read Next

About The Author

Samuel Gush (19 Articles Published)

Samuel Gush is a tech writer at MakeUseOf. For any enquiries you can contact him via email at

More From Samuel Gush

Subscribe to our newsletter

Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!

Click here to subscribe