When the Doctor ransomware appeared many users have complained, sending multiple files for decryption. This lead us to research the matter and provide users with a relevant solution to files encrypted by this nasty ransomware. The ransomware is also believed to attack Windows backup and delete the File History. And file recovery software may not help much. This is why we have created detailed instructions to assist you, the user in successfully removing the threat and decrypting your data.
1.Remove of Doctor@freelinuxmail.org Ransomware
Before decrypting the files encrypted by the Doctor ransomware, you should know that it is vital to remove the malware from your computer. This is why you should first remove it using the instructions below:
2.Decrypt Your Files
Fortunately for all our sake, Kaspersky have kindly provided the users with a free decryptor. It is called RakhniDecryptor and you can download it from Kaspersky’s virus fighting utilities page.
Here is how to decode your files using RakhniDecryptor:
Step 1: Download and start the RakhniDecryptor.exe:
Step 2: Click on the “Start Scan” button. It will open a window from which you can select a file to decrypt.
Step 3: Look for files that are more important to you first and select them to start the decryption process. This is because it may take some time. A good strategy is to attempt decrypting files that are smaller in size. This is because if the files have the same password other larger files can be automatically decrypted by the tool using the same password.
Step 4: Set your computer’s settings to prevent it from automatically shutting down. Here is how to stop your PC from shutting down.
1) Press +R and then type “powercfg.cpl”.
2) After the power plan window has opened go to Change plan settings for your current power plan.
3) After you are there, set everything to “Never” from the drop-down menus and then “Apply” it.
4) Close the Change plan settings Window and reopen it. Everything should look saved to “Never“. After this is done click on the blue highlighted text saying “Change advanced power settings”.
5) Check the Hard Disk option and if there are remaining times, switch them to never by clicking on the highlighted text like the picture above shows.
Finally, click on Apply and close it and you are done. Make sure your computer is plugged in the AC and the Power Plan with the changed settings is active. Decryption may take from several hours to several days, it really depends. But we urge users to keep trying to decrypt their files and NOT pay the ransom money by the Doctor@freelinuxmail.org ransomware. This is because for one there is no guarantee the cyber-criminals will give you the decryption keys back and also by paying you fund their operation.
For more information, any questions or simply experience sharing you may check out our forum topic about the Doctor@freelinuxmail.org ransomware.