FileTypeDB

.THOR File Extension

A .THOR file is a Locky Ransomware Encrypted File, created by N/A.

Open with System Restore. Available for Windows.

What is a .THOR file?

File Extension: .THOR File Type: Locky Ransomware Encrypted File Description: A .THOR file is an encrypted file created by the Locky ransomware, a type of harmful software used by cybercriminals. This file was originally a normal file like a video (.AVI) or a spreadsheet (.XLSX) that has been encrypted, meaning it has been locked using complex encryption methods. Specifically, the Locky virus uses the RSA-2048 encryption algorithm and the AES-128 cipher to secure the files, making them inaccessible without a decryption key.

The .THOR files are a variant of Locky ransomware, similar to earlier versions like .LOCKY. These files started to appear widely in 2016. Once a computer is infected, the ransomware renames and scrambles the original files, turning them into .THOR files.

How Locky Ransomware Spreads: The Locky virus typically enters a computer through deceptive methods such as spam emails containing infected attachments, often a .DOCM file with dangerous macros. It can also spread through downloads from unreliable torrent websites and by clicking on malicious ads.

Once the ransomware is activated on a computer, it encrypts the files and changes the desktop background to include instructions on how to pay a ransom, usually demanded in Bitcoin, to get the decryption key needed to unlock the files. It also creates files like _WHAT_is.bmp and _WHAT_is.html on the desktop to inform the victim about the encryption and the demands.

Programs to Open .THOR Files: It is important to note that .THOR files cannot be opened by standard software programs because they are encrypted. The primary method to restore the files is through a system restore if backups were made before the infection. However, paying the ransom is risky and not recommended as it does not guarantee file recovery and encourages further criminal activity.

More Information: Victims of the Locky ransomware should seek professional help from cybersecurity experts. These professionals might offer possible solutions for decrypting the files or restoring them from backups. It is also crucial to maintain updated antivirus software and avoid opening suspicious emails or downloading files from untrusted sources to prevent such infections.

Verification

Our goal is to help people find the most up-to-date information about file extensions for Windows, Mac, Linux, Android and iOS. We researched over 10,000 file extensions and their respective programs that open those files. If you want to suggest edits or updates about .THOR file formats, example files, or programs that are compatible. Please contact us.

More extensions