Emsisoft Releases Free Decrypter for OpenToYou Ransomware

Emsisoft Releases Free Decrypter for OpenToYou Ransomware

Emsisoft CTO/researcher Fabian Wosar has created a decrypter for the newly discovered OpenToYou ransomware that will allow infected victims to recover encrypted files without needing to pay a ransom.

The ransomware’s name comes from the email address at which the crook wants victims to reach out ([email protected]), and by the file extension appended to each encrypted file ([email protected]).

OpenToYou infection process

When it first infects a computer, the OpenToYou ransomware will create a password string, use SHA-1 to derive an encryption key from the password, which it then uses to encrypt the victim’s files with the RC4 algorithm.

The ransomware targets 242 file types for encryption. The following file extensions are targeted:


As a side note, OpenToYou also encrypts files without a file extension.

The ransomware will lock files on all drives, with the exemption of the following folders:

C:\Users\All Users
C:\Program Files
C:\Program Files (x86)
C:\Program instal

Unfortunately, this exemptions list contains an error. “C:\bootmgr” is not a folder, but a file.

This slip-up on the part of OpenToYou’s author leads to situations where the ransomware encrypts the boot loader “bootmgr” on Windows workstations that use the MBR to boot. This leaves the victim’s computer in the unfortunate situation of not being able to boot the next time they restart their PC.

After the encryption process ends, the ransomware will replace the user’s desktop wallpaper with the following image:


At the same time, OpenToYou drops a file named !!!.txt on the user’s Desktop. This file contains a written version of the ransom note, as reproduced below:

Your files are encrypted!
To decrypt write on email – [email protected]
Identification key – 5E1C0884

The number “5E1C0884” from the ransom note above is the victim’s ID, which he must send to the ransomware author via email. This ID is each computer’s C: drive’s volume serial number.

At the time of writing, the ransomware appears to be under development. The reason behind this assumption is the ransomware creates a folder named “C:\Logs\” to store temporary files and debug data.

This folder’s content is always the same, and its presence can be used to detect OpenToYou ransomware infections in their early stages.

C:\Logs\1.bmp      [the desktop wallpaper image]
C:\Logs\1.jpg      [the desktop wallpaper image]

Victims affected by this ransomware can recover their data using the Emsisoft OpenToYou Decrypter, which is available for download on our site.


It is not uncommon to see in-dev ransomware being analysed and decrypted even before it’s delivered to users via spam or malvertising campaigns. If you’ve been infected by a version of this ransomware, don’t hesitate to reach out to Emsisoft researchers for help.

Users employing Emsisoft Anti-Malware or Emsisoft Internet Security have been proactively protected from this threat by Emsisoft’s Behavior Blocker technology:


This blog post is based on the OpenToYou ransomware sample with the following SHA-256 hash: 3363542a8224cb7624b699fbcc34143c80ad1063196763b9fea0e6f45091454c.

  • achmad zamrozi

    I hope emsisoft could make decryptor for sysgop.exe

  • Bobby

    The decrypter doesnt work for me it says it cant figure out the original file name

    • Sarah

      Hi there, can you provide more information? It would be best if you email [email protected] about this, so we can assist you more easily.

  • soporte TI


    .[[email protected]].wallet
    .[[email protected]].wallet

    help recive attack …i need restore my information… please help!


  • Dejan Hergelic

    Not working for wallet files

  • vimal gautam

    is there any tools to decrypt .xcrypt extension files

    [email protected]