How to Recover Files Using Amnesia2 Decrypter?


Issue: How to Recover Files Using Amnesia2 Decrypter?

I’ve just downloaded Amnesia2 Decrypter. Could you explain how to use it?

Solved Answer

Amnesia2 Decrypter has just been released a few days ago, making the lives of those infected much less miserable since they can now recover their files absolutely free. The experts have updated the old Amnesia decryptor’s code to search and decrypt the new extensions .01 and .02 that the second virus variant appends to the encrypted files. The decryption software has been developed by a reputable cyber security company Emsisoft. The group of Emsisoft researchers has already achieved major success decrypting a bunch of other ransomware including Cry128, CryptON, Globe3 and many more. As for the Amnesia2 Decrypter, at the moment of writing, it has already been downloaded 692 times, and this number only grows with each day. If you want to recover your files, scroll down below where you will find the decryptor’s quick download link as well as a brief guide explaining how to use it. If you are not sure if you are infected with Amnesia2, we’ve also prepared a short reminder of the typical virus characteristics below.

Illustration of Amnesia 2 decrypter

Amnesia2 is a follow-up version of the Amnesia ransomware which has been released soon after the original virus was decrypted. The hackers hoped to achieve better success by introducing some few changes to this new virus variant. The extortionists have added .01 and .02 extensions to mark encrypted files and have programmed the virus to replace the original filenames with strings of random characters. This makes it even more difficult to recover files when you don’t know what you are recovering. The crooks have not forgotten the ransom note as well. This document has shifted from a .txt file to .html and have been renamed as RECOVER-FILES.HTML. The document contains the following:

Your files are Encrypted!
For data recovery needs decryptor.
To buy the decryptor, you must pay the cost of 0.5 Bitcoin.
[“Buy Decryptor” button]
Free decryption as guarantee.
Before paying you can send us 1 file for free decryption.
To send a message or file use this form:

You can tell that the extortionists have improved and become more professional as they are now giving the victims and insurance by allowing to decrypt one selected file. Nevertheless, collaboration with the criminals can be dangerous and in this case, absolutely unnecessary as you can decrypt your files for free following the guidelines below.

Step 1: Get ready for the decryption

For the file decryption to pass successfully, you must remove every piece of the malicious Amnesia2 files from your computer. If you fail to do so, the decryption will be just a waste of time: the virus will perform a secondary encryption, and you will have to go through the procedure all over again. You may rely on security software like Fortect to clean up your computer. It is also recommended to create a backup copy of the encrypted data just to be sure you won’t lose any of your important documents in case something goes wrong during the decryption.

Step 2: How to use Amnesia2 Decrypter?

The main principle on which Emsisoft decrypters work is focused on analyzing two versions of the same file. One version of the file should be a healthy, while the second one affected by the virus. The software will compare the two versions together and derive a private key which will later be applied for the recovery of the rest of the encrypted files. So, the first step of the Amnesia2 should be finding the files. Then, you can finally download the Amnesia2 Decrypter.

  1. When you download the decrypter launch it and drop the selected file pair on the indicated window.
    The key recovery procedure will commence immediately, so you will have to wait for the “Decryption key found” notification to show up. OK to confirm.
  2. Click OK again to agree with the “Licence terms.”
  3. In the new Decrypter window, you will be asked to pick the files, folders of whole computer partitions that you want to decrypt. We suggest starting small and picking one or a couple of less important files for a test run.
  4. When you are happy with your selections, click the “Decrypt” button. This will start the data recovery process.

If after completing these steps your selected files are decrypted, you can go through the same process again and recover the rest of your system.

Recover files and other system components automatically

To recover your files and other system components, you can use free guides by experts. However, if you feel that you are not experienced enough to implement the whole recovery process yourself, we recommend using recovery solutions listed below. We have tested each of these programs and their effectiveness for you, so all you need to do is to let these tools do all the work.

do it now!
recovery software Happiness
do it now!
recovery software Happiness
Compatible with Microsoft Windows Compatible with OS X
Do you have any trouble?
If you are having problems related to FortectMac Washing Machine X9, you can reach our tech experts to ask them for help. The more details you provide, the better solution they will provide you.
Fortect - a patented specialized Windows repair program. It will diagnose your damaged PC. It will scan all System Files, DLLs and Registry Keys that have been damaged by security threats.Mac Washing Machine X9 - a patented specialized Mac OS X repair program. It will diagnose your damaged computer. It will scan all System Files and Registry Keys that have been damaged by security threats.
This patented repair process uses a database of 25 million components that can replace any damaged or missing file on user's computer.
To repair damaged system, you have to purchase the licensed version of Fortect malware removal tool.To repair damaged system, you have to purchase the licensed version of Mac Washing Machine X9 malware removal tool.

Access geo-restricted video content with a VPN

Private Internet Access is a VPN that can prevent your Internet Service Provider, the government, and third-parties from tracking your online and allow you to stay completely anonymous. The software provides dedicated servers for torrenting and streaming, ensuring optimal performance and not slowing you down. You can also bypass geo-restrictions and view such services as Netflix, BBC, Disney+, and other popular streaming services without limitations, regardless of where you are.

Don’t pay ransomware authors – use alternative data recovery options

Malware attacks, particularly ransomware, are by far the biggest danger to your pictures, videos, work, or school files. Since cybercriminals use a robust encryption algorithm to lock data, it can no longer be used until a ransom in bitcoin is paid. Instead of paying hackers, you should first try to use alternative recovery methods that could help you to retrieve at least some portion of the lost data. Otherwise, you could also lose your money, along with the files. One of the best tools that could restore at least some of the encrypted files –  Data Recovery Pro.

About the author
Gabriel E. Hall
Gabriel E. Hall - Passionate computer expert

Gabriel E. Hall is an expert troubleshooter who has been working in the information technology industry for years.

Contact Gabriel E. Hall
About the company Esolutions

What you can add more about the problem: "How to Recover Files Using Amnesia2 Decrypter?"