• Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

MyAntiSpyware

Menu
  • Downloads
  • Threats
    • Adware
    • Browser Hijacking
    • Phishing
    • Ransomware
  • Questions and Answers
  • Recover Encrypted Files
  • Free Malware Removal Tools

.Cetori file extension. How to remove virus. Restore, Decrypt .cetori files.

Myantispyware team August 22, 2019    

What is a Cetori file? A file with the .cetori extension is a file that has been locked by Cetori ransomware. This security threat is also known as crypto malware that use very strong hybrid encryption with a large key in order to block users’ data. It’s not possible to open the files by simply changing the file extension. The photos, documents and music will be unlocked only if victims pay for the private key that will unlock these files.

Files encrypted by cetori virus

Files encrypted by cetori virus

The files that will be encrypted include the following file extensions:

.fpk, .mdb, .wbk, .xdb, .wire, .xls, .hkdb, .sis, .wpl, .ysp, .indd, .xyp, .ncf, .blob, .sidd, .lbf, .bsa, .xy3, .wma, .sie, .txt, .iwi, .jpe, .mlx, .rb, .dba, .pptx, .rofl, .1st, .jpg, .mrwref, .xdl, .bar, .t13, .xxx, .srw, .wmd, .slm, .wpa, .das, .xyw, .dng, .xlsb, .yml, .desc, .pptm, .css, .rtf, .xlgc, .wsh, .dcr, .xar, .w3x, .dbf, .zabw, .cdr, .webdoc, .x3f, .wpg, .xmmap, .nrw, .psd, .zdc, .bay, .big, .wot, .pkpass, .xpm, .p7b, .wn, .wbc, .qdf, .xlsx, .bik, .raf, .p12, .wmv, .2bp, .odp, .r3d, .xml, .wps, .hvpl, .menu, .itdb, .srf, .xlsm, .gho, .wm, .xbplate, .orf, .wpd, .sum, .layout, .ods, .ppt, .x3f, .sql, .py, .qic, .lvl, .wp5, .wbz, .wpt, .pst, .xmind, .fos, .vfs0, .3dm, .xll, .avi, .raw, .forge, .kf, .xlsm, .mddata, .wsd, .vpp_pc, .x, .db0, .cer, .re4, .mcmeta, .sr2, .mef, .odc, .wp6, .odb, .pdd, .lrf, .litemod, .wdp, .dmp, .cr2, .ntl, .zip, .cfr, .wma, .dwg, .apk, .m4a, .pak, .icxs, .sb, .yal, .0, .accdb, .wp, .js, .asset, .wri, .wdb, .gdb, .3fr, .upk, .crw, .erf, .rar, .zw, .odm, .xls, .rw2, .xbdoc, .ibank, .crt, .vcf, .dxg, .dazip, .hplg, .y, .ff, .kdb, .mp4, .psk, .png, .wmo, .ws, .pfx, .mdbackup, .p7c, .wpb, .sid, .csv, .wpd, .1, .bc7, .mdf, .wgz, .x3d, .docm, .xlk, .mpqge, .wbm, .itm, .vdf, .d3dbsp, .xwp, .wbmp, .xlsx, .arw, .svg, .m3u, .bkf, .eps, .rim, .wav, .ptx, .wbd, .ai, .wsc, .doc, .zi, .docx, .vpk, .wp4, .arch00, .ltx, .iwd, .sidn, .zip, .7z, .snx, .wb2, .fsh, .ybk, .vtf, .webp, .wpw, .zdb, .der, .wcf, .m2, .t12, wallet, .ztmp, .wmf, .flv, .map, .bc6, .hkx, .xld, .wotreplay, .sav, .bkp, .xf, .epk, .kdc, .jpeg, .mov, .esm, .pdf, .cas

Upon encryption, all encrypted documents, photos and music will then be appended with the .cetori extension (e.g., ‘photo.jpg is renamed to ‘photo.jpg.cetori’). Ransomware leaves a ransomnote named ‘_readme.txt’ with instructions for extortion and ransom payment.

ATTENTION!
 
Don't worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
 
You can get and look video overview decrypt tool:
https://we.tl/t-B2xUNoHxJk
 
To get this software you need write on our e-mail:
gorentos@bitmessage.ch
 
Reserve e-mail address to contact us:
gorentos2@firemail.cc

Your personal ID:

 

Threat Summary

Name Cetori
Type Crypto malware, Filecoder, Ransomware, Crypto virus, File locker
Encrypted files extension .cetori
Ransom note _readme.txt
Contact gorentos@bitmessage.ch
Ransom amount $980 in Bitcoins
Symptoms Your photos, documents and music fail to open. Windows Explorer displays a blank icon for the file type. Your documents, photos and music now have new extensions that end with something like .cetori. Files called like ‘_readme.txt’, or ‘_readme” in every folder with an encrypted file.
Distribution ways Spam or phishing emails that are created to get people to open an attachment or click on a link. Drive-by downloads from a compromised webpage. Social media posts (they can be used to mislead users to download malicious software with a built-in ransomware downloader or click a malicious link). USB flash drives containing malware.
Removal To remove Cetori ransomware use the removal guide
Decryption To decrypt Cetori ransomware use the steps

 

This blog post is created for those who are searching for a solution to completely delete Cetori virus from the PC, and for those who want to learn as much as possible about how recover documents, photos and music. We hope you will find answers to all your questions in this article.

Quick links

  1. How to remove Cetori file virus
  2. Run STOPDecrypter to decrypt .cetori files
  3. How to restore .cetori files

How to remove Cetori file virus

Security researchers have built efficient malware removal tools to help users in uninstalling Ransomware, trojans and worms. Below we will share with you the best malicious software removal tools with the ability to locate and remove Cetori crypto malware and other malicious software.



How to delete Cetori ransomware with Zemana Anti-Malware

Zemana is a free malicious software removal tool. Currently, there are two versions of the tool, one of them is free and second is paid (premium). The principle difference between the free and paid version of the utility is real-time protection module. If you just need to check your personal computer for malware and delete Cetori ransomware related folders,files and registry keys, then the free version will be enough for you.

Installing the Zemana is simple. First you’ll need to download Zemana Anti Malware from the following link. Save it to your Desktop.

Zemana AntiMalware
Zemana AntiMalware
164987 downloads
Author: Zemana Ltd
Category: Security tools
Update: July 16, 2019

When the downloading process is complete, close all windows on your personal computer. Further, start the setup file called Zemana.AntiMalware.Setup. If the “User Account Control” dialog box pops up as shown on the screen below, press the “Yes” button.

Zemana uac

It will show the “Setup wizard” that will assist you install Zemana on the system. Follow the prompts and do not make any changes to default settings.

Zemana AntiMalware SetupWizard

Once setup is done successfully, Zemana Free will automatically launch and you can see its main window as displayed in the following example.

Next, press the “Scan” button to perform a system scan for the Cetori crypto virus, other kinds of potential threats such as malicious software and trojans. A scan may take anywhere from 10 to 30 minutes, depending on the number of files on your computer and the speed of your computer.

Zemana Free look for Cetori crypto malware, other malicious software, worms and trojans

When that process is done, the results are displayed in the scan report. Review the results once the tool has done the system scan. If you think an entry should not be quarantined, then uncheck it. Otherwise, simply click “Next” button.

Zemana AntiMalware scan is complete

The Zemana will uninstall Cetori crypto malware, other malware, worms and trojans and move threats to the program’s quarantine. When finished, you can be prompted to restart your personal computer.

Automatically remove Cetori ransomware with MalwareBytes

You can remove Cetori virus automatically through the use of MalwareBytes Free. We suggest this free malware removal utility because it may easily delete ransomware, adware, malicious software and other unwanted apps with all their components such as files, folders and registry entries.

Download MalwareBytes Free on your MS Windows Desktop by clicking on the link below.

Malwarebytes Anti-malware
Malwarebytes Anti-malware
327224 downloads
Author: Malwarebytes
Category: Security tools
Update: April 15, 2020

Once downloading is finished, close all software and windows on your computer. Double-click the install file named mb3-setup. If the “User Account Control” dialog box pops up as on the image below, click the “Yes” button.

MalwareBytes Free for Microsoft Windows uac prompt

It will open the “Setup wizard” that will help you setup MalwareBytes on your computer. Follow the prompts and do not make any changes to default settings.

MalwareBytes Anti Malware (MBAM) for MS Windows install wizard

Once setup is done successfully, click Finish button. MalwareBytes Free will automatically start and you can see its main screen like below.

MalwareBytes Anti Malware for Microsoft Windows

Now click the “Scan Now” button . MalwareBytes application will scan through the whole PC system for the Cetori ransomware virus and other security threats. A scan can take anywhere from 10 to 30 minutes, depending on the number of files on your system and the speed of your computer. While the MalwareBytes utility is scanning, you can see number of objects it has identified as being infected by malicious software.

MalwareBytes Free for Windows search for Cetori crypto virus, other kinds of potential threats like malware and trojans

When MalwareBytes AntiMalware has finished scanning, it will show the Scan Results. You may remove items (move to Quarantine) by simply press “Quarantine Selected” button. The MalwareBytes will delete Cetori ransomware, other kinds of potential threats like malicious software and trojans. After the procedure is done, you may be prompted to reboot the PC system.

MalwareBytes Anti-Malware for Microsoft Windows reboot prompt

We suggest you look at the following video, which completely explains the procedure of using the MalwareBytes to remove adware, browser hijacker and other malware.

If the problem with Cetori ransomware is still remained

If MalwareBytes anti-malware or Zemana anti-malware cannot delete this crypto virus, then we suggests to run the KVRT. KVRT is a free removal tool for crypto malwares, adware software, potentially unwanted software and toolbars.

Download Kaspersky virus removal tool (KVRT) on your computer by clicking on the link below.

Kaspersky virus removal tool
Kaspersky virus removal tool
129279 downloads
Author: Kaspersky® lab
Category: Security tools
Update: March 5, 2018

Once downloading is complete, double-click on the Kaspersky virus removal tool icon. Once initialization process is complete, you’ll see the Kaspersky virus removal tool screen as displayed in the figure below.

Kaspersky virus removal tool main window

Click Change Parameters and set a check near all your drives. Click OK to close the Parameters window. Next click Start scan button to scan for Cetori crypto virus and other known infections. A system scan can take anywhere from 5 to 30 minutes, depending on your computer. While the Kaspersky virus removal tool program is checking, you can see number of objects it has identified as threat.

KVRT scanning

After the scan get finished, Kaspersky virus removal tool will open a list of all threats found by the scan as shown on the image below.

KVRT scan report

When you are ready, press on Continue to begin a cleaning process.

Run STOPDecrypter to decrypt .cetori files

With some variants of Cetori file virus, it is possible to decrypt encrypted files using free tools listed below.



Michael Gillespie (@) released the Cetori decryption tool named STOPDecrypter. It can decrypt .cetori files if they were locked by one of the known OFFLINE KEY’s retrieved by Michael Gillespie. Please check the twitter post for more info.

Cetori decryption tool

Cetori decryption tool

STOPDecrypter is a program that can be used for Cetori files decryption. One of the biggest advantages of using STOPDecrypter is that is free and easy to use. Also, it constantly keeps updating its ‘OFFLINE KEYs’ DB. Let’s see how to install STOPDecrypter and decrypt .cetori files using this free tool.

  1. STOP Decrypter can be downloaded from the following link. Save it on your Microsoft Windows desktop or in any other place.
    download.bleepingcomputer.com/demonslay335/STOPDecrypter.zip
  2. After the download is done, close all programs and windows on your computer. Open a file location.
  3. Right-click on the icon that’s named STOPDecrypter.zip. Further, select ‘Extract all’ and follow the prompts.
  4. Once the extraction process is done, right click on STOPDecrypter, choose ‘Run as Admininstrator’. Select Directory and press Decrypt button.

If STOPDecrypter does not help you to decrypt .cetori files, in some cases, you have a chance to restore your personal files, which were encrypted by crypto virus. This is possible due to the use of the tools named ShadowExplorer and PhotoRec. An example of recovering encrypted personal files is given below.

How to restore .cetori files

In some cases, you can recover files encrypted by Cetori crypto virus. Try both methods. Important to understand that we cannot guarantee that you will be able to recover all encrypted photos, documents and music.




Use ShadowExplorer to restore .cetori files

If automated backup (System Restore) is enabled, then you can use it to restore all encrypted files to previous versions.

Visit the page linked below to download ShadowExplorer. Save it on your Windows desktop.

ShadowExplorer
ShadowExplorer
439626 downloads
Author: ShadowExplorer.com
Category: Security tools
Update: September 15, 2019

After the download is done, extract the downloaded file to a directory on your PC. This will create the necessary files like below.

ShadowExplorer folder

Run the ShadowExplorerPortable program. Now select the date (2) that you want to restore from and the drive (1) you want to restore files (folders) from similar to the one below.

recover encrypted files with ShadowExplorer tool

On right panel navigate to the file (folder) you want to restore. Right-click to the file or folder and click the Export button such as the one below.

ShadowExplorer recover .cetori files

And finally, specify a folder (your Desktop) to save the shadow copy of encrypted file and press ‘OK’ button.

Use PhotoRec to restore .cetori files

Before a file is encrypted, the Cetori crypto virus makes a copy of this file, encrypts it, and then deletes the original file. This can allow you to restore your documents, photos and music using file recover apps such as PhotoRec.

Download PhotoRec on your system from the link below.

PhotoRec
PhotoRec
221290 downloads
Author: CGSecurity
Category: Security tools
Update: March 1, 2018

After the downloading process is complete, open a directory in which you saved it. Right click to testdisk-7.0.win and select Extract all. Follow the prompts. Next please open the testdisk-7.0 folder like the one below.

testdisk photorec folder

Double click on qphotorec_win to run PhotoRec for Windows. It’ll show a screen as displayed in the figure below.

PhotoRec for windows

Select a drive to recover as on the image below.

photorec choose drive

You will see a list of available partitions. Select a partition that holds encrypted personal files as displayed on the image below.

photorec choose partition

Click File Formats button and specify file types to recover. You can to enable or disable the restore of certain file types. When this is done, press OK button.

PhotoRec file formats

Next, press Browse button to select where recovered personal files should be written, then press Search.

photorec

Count of recovered files is updated in real time. All restored documents, photos and music are written in a folder that you have selected on the previous step. You can to access the files even if the recovery process is not finished.

When the restore is finished, click on Quit button. Next, open the directory where recovered photos, documents and music are stored. You will see a contents as on the image below.

PhotoRec - result of restore

All restored documents, photos and music are written in recup_dir.1, recup_dir.2 … sub-directories. If you’re looking for a specific file, then you can to sort your recovered files by extension and/or date/time.

How to protect your personal computer from Cetori crypto virus?

Most antivirus applications already have built-in protection system against the ransomware. Therefore, if your personal computer does not have an antivirus application, make sure you install it. As an extra protection, run the HitmanPro.Alert.

Use HitmanPro.Alert to protect your PC system from Cetori ransomware

All-in-all, HitmanPro.Alert is a fantastic tool to protect your system from any ransomware. If ransomware is detected, then HitmanPro.Alert automatically neutralizes malware and restores the encrypted files. HitmanPro.Alert is compatible with all versions of Microsoft Windows operating system from Windows XP to Windows 10.

Click the link below to download the latest version of HitmanPro.Alert for MS Windows. Save it on your Windows desktop.

HitmanPro.Alert
HitmanPro.Alert
6877 downloads
Author: Sophos
Category: Security tools
Update: March 6, 2019

When the downloading process is complete, open the directory in which you saved it. You will see an icon like below.

HitmanPro.Alert file icon

Double click the HitmanPro Alert desktop icon. After the tool is started, you’ll be shown a window where you can choose a level of protection, as shown in the figure below.

HitmanPro.Alert install

Now click the Install button to activate the protection.

Finish words

After completing the steps above, your machine should be clean from Cetori crypto virus and other malicious software. Your PC will no longer encrypt your personal files. Unfortunately, if the few simple steps does not help you, then you have caught a new crypto malware, and then the best way – ask for help here.

 

Virus

 Previous Post

How to remove Donaldbluepage.icu popups virus [Malware removal]

Next Post 

How to remove Vinuser.biz popups virus [Malware removal]

Author: Myantispyware team

Myantispyware is an information security website created in 2004. Our content is written in collaboration with Cyber Security specialists, IT experts, under the direction of Patrik Holder and Valeri Tchmych, founders of Myantispyware.com.

Leave a Reply Cancel reply

New Guides

scam alert
Remove Searchernow.com Redirect: Chrome, Edge, Firefox
Avoid the ExLig.com Bitcoin Scam: Insights on Promo Code Frauds
scam alert
Denwex.com Review: Bitcoin Promo Codes as a Scam
scam alert
CEFOLEX.com Review: A Closer Look at the Bitcoin Promo Code Scam
The Bigexcoin.com Bitcoin Promo Code Scam: How to Stay Safe

Follow Us

Search

Useful Guides

Best free malware removal tools
Best Free Malware Removal Tools 2025
DNSChanger
How to remove DNSChanger malware virus [Updated Apr. 2018]
Managed by your organization chrome virus
Chrome Managed by your organization malware removal guide
Smart Captcha Virus redirect
What is a Virus that Redirects Web Pages? A Comprehensive Guide
remove chrome extension
How to remove Chrome extensions installed by enterprise policy

Recent Guides

donaldbluepage.icu
How to remove Donaldbluepage.icu popups virus [Malware removal]
givemegreenbottle.icu
How to remove Givemegreenbottle.icu popups virus [Malware removal]
qualuru.biz
How to remove Qualuru.biz pop-ups [Chrome, Firefox, IE, Edge]
neemwear.biz
How to remove Neemwear.biz pop-ups [Chrome, Firefox, IE, Edge]
Newsmode Me popups virus
How to remove Newsmode Me virus popups [Malware removal guide]

Myantispyware.com

Myantispyware has been a trusted source for computer security and technology advice since 2004. Our mission is to provide reliable tech guidance and expert, practical solutions to help you stay safe online and protect your digital life.

Social Links

Pages

About Us
Contact Us
Privacy Policy

Copyright © 2004 - 2024 MASW - Myantispyware.com.