Remove New Philadelphia Ransomware and Restore .locked Files - How to, Technology and PC Security Forum |

Remove New Philadelphia Ransomware and Restore .locked Files

philadelphia-2-ransomware-senosrstechforum-ransom-noteNew version of Philadelphia ransomware, which was part of the Stampado variants has been released, again using the same .locked file extension. The difference in this version is that it demands .3 BTC from affected victims and features a new ransom message that is also a program with instructions for payment and decryption. The first variant of the virus was first discovered in September when it was put for sale as a service online. Luckily immediately after it’s release, researchers at EmsiSoft have cracked the virus, creating a free decryptor. It is yet to be seen whether or not decryption will be available for this ransomware variant as well. Until then we highly recommend to read this article and remove the Philadelphia virus completely and learn alternative methods on how to restore your files.

Threat Summary



Short DescriptionThe malware encrypts users files using a strong encryption algorithm, making direct decryption possible only via a unique decryption key available to the cyber-criminals.
SymptomsPhiladelphia Ransomware leaves a ransom note and may delete random files from your computer based on the Russian roulette principle if the terms in the note are not met. Changed file names and the various file extensions may be used.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Philadelphia


Malware Removal Tool

User ExperienceJoin our forum to Discuss Philadelphia 2 Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Is the New Philadelphia Distributed

In order to be widespread, the second instance of Philadelphia ransomware may use a malicious file embedded in a malicious pdf document or a Microsoft Word file. The message in the file may be a fake letter from the government or a fake Invoice or any other type of written document or important file as the case with 1st variant of Philadelphia:


After the user opens the file, an exploit kit or a trojan may cause the infection. After this infection, the malware may remotely connect to the malicious servers of the cyber-criminals only to download the payload of Philadelphia onto the computer.

New Philadelphia Ransomware – More Information

As soon as the new variant of Philadelphia has infected a computer, it may immediately drop it’s files under different names in one of the commonly targeted Windows folders by malware where it can act in a privileged and obfuscated mode:


After the files are dropped on the user PC, the Philadelphia virus may begin to modify it’s settings. To begin with, the virus may target the Windows Update registry key to run a successful encryption via the update process:

→HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update

After having done this, the Philadelphia malware may also immediately begin to encrypt files. Similar to the first version of Philadelphia, this one may target some or all and more of the following file extensions:


For encryption, Philadelphia may employ a cipher that generates a decryption key which is sent to the cyber-criminals’ server. The server may be located somewhere in South America, since the previous version of Philadelphia targeted primarily Brazillian users.

Files that were encrypted by the Philadelphia virus may or may not have their names changed and may appear as the following:


The affected users are convinced that their only way out is if they follow the ransom instructions of Philadelphia ransomware:

→“All your documents (databases, texts, images, videos, musics, source code, etc.) have been encrypted.
What can I do?
To decrypt your files you will need to buy the secret key from us.
You can use to buy bitcoins, or any other preferred method.
If for any reason you need to contact us write email to”

Judging by the e-mail address used in this ransomware, it may target users in Europe. But bear in mind that since Stampado variants like Philadelphia have been released for sale in the deep web, it may target anyone on any place in the world and it is very difficult to pinpoint the exact area of impact.

Remove Philadelphia 2 Ransowmare and Restore Encrypted Files

To fully erase this variant of Philadelphia ransomware, advices are to focus on the instructions for ransomware removal which we have prepared for you below. In case you are having difficulty in manually locating the files that are associated with the new Philadelphia ransomware, experts always refer to anti-malware software as the best tool for effectively removing all files and registry values created by ransomware viruses.

To attempt and restore your files, we advise you to try the free decryptor for the first variant of Philadelphia and let us know in the comment section below whether or not it works for you. Below you will find instructions on how to use it:

Decrypt Files Encrypted by Philadelphia Ransomware


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share