How To Use The Emsisoft Decrypter For Jsworm 2.0
How To Use The Emsisoft Decrypter For Jsworm 2.0
The decrypter requires access to a ransom note left by the malware, typically called “JSWORM-
DECRYPT.txt”
2. Run the decrypter as an administrator. The license terms will show up, which you must agree to
by clicking the “Yes” button:
4. The decrypter will display the reconstructed encryption details once the recovery process has
finished. The display is purely informational to confirm that the required encryption details have
been found:
6. By default, the decrypter will pre-populate the locations to decrypt with the currently connected
drives and network drives. Additional locations can be added using the “Add” button.
7. Decrypters typically offer various options depending on the particular malware family. The
available options are located in the Options tab and can be enabled or disabled there. You can
find a detailed list of the available Options below.
9. The decrypter will inform you once the decryption process is finished. If you require the report
for your personal records, you can save it by clicking the “Save log” button. You can also copy it
straight to your clipboard to paste it into emails or forum posts if you are asked to.