What is help@decryptservice.info?
help@decryptservice.info is an email address associated with a variant of BandarChor ransomware ransomware. The ransomware encrypts files, adds help@decryptservice.info to the end of files, and demands a ransom payment to recover encrypted files.
Table of Contents
Overview
| Names | Distribution |
|---|---|
| help@decryptservice.info virus, help@decryptservice.info ransomware | Email, Exploit Kit, Social Media |
help@decryptservice.info virus is predominantly distributed by malicious email messages that contain malicious links and attachments. The email attachments will usually be a .zip file or fake Microsoft Word document file. If contents from the .zip file are manually extracted it will unpack another file that is usually a JavaScript file, JScript Encoded file, or VBScript Script file. When the file is manually executed by the user it will cause the malware to spread across the machine and begin the file encryption process.
Screenshot

help@decryptservice.info ransomware encrypts files that match certain file extensions with RSA and AES encryption ciphers. Once the encryption process is finalized it will render the files inaccessible to the user. The files are appended a new file extension at the end of the file name and given a new file type. The file name will become randomized or be appended a pattern such as [original_file_name].id-[ID]_help@decryptservice.info. A ransom note named HOW TO DECRYPT.txt will be placed in every folder the virus encrypted files in and on Windows desktop. In addition, Windows desktop might also change to an image of the ransom note and an image file of the ransom note will also be left in every folder the virus encrypted files in.
It is suggested to avoid paying ransomware authors to decrypt your files. Luckily, this ransomware has free removal and decryption programs listed below. Third-party programs Shadow Explorer, PhotoRec, or Recuva can also be used to potentially recover files encrypted by this virus. A user may also be able to retrieve encrypted files by performing a system restore to a date and time before the infection occurred.
Removal Software
| Name | Detection | Download |
|---|---|---|
| Malwarebytes 3.0 Premium | Ransomware.Globe | Buy |
| Malwarebytes Anti-Malware Free | Ransomware.Globe | Download (Free) |
| HitmanPro by Surfright | [Threat_Name] | Download (Free) |
View more: Antivirus Software, Antimalware Software, Optimization and Cleaning Software
Decryption Software
File Recovery Software
| Name | Description | Download |
|---|---|---|
| Shadow Explorer | Restores lost or damaged files from Shadow Copies | Download (Free) |
| Photorec | Recovers lost files | Download (Free) |
| Recuva | Recovers lost files | Download (Free) | Buy |
Troubleshoot
Alternative methods are suggested if there are issues removing help@decryptservice.info ransomware from an infected computer.
How to Restore your computer
If a restore point has previously been established on your machine you will be able to perform a system restore in order to restore your machine to a date and time before it was infected. You will lose files on your computer that were obtained prior to the restore point.
There are several options to restore your computer. Most computers have their own restore software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default restore program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.
How to Recover your computer to factory settings
A system recovery (or reset) will recover your computer to factory settings. You will lose the current programs and files on your computer.
There are several options to recover your computer to factory settings. Most computers have their own recovery software that can be found by performing a search. Additionally, computers that run the Windows Operating System have a default recovery program that can also be found by performing a search.
A boot screen that can be used to access options to restore your computer can be reached by rebooting your computer and pressing the F8 key once the manufacture screen is displayed.
- FBI Seeks Info in Steam Malware Investigation
- GhostPoster Browser Extensions Reached 840,000 Installs Before Removal From Stores
- Kimwolf Android Botnet Exploits Residential Proxies to Breach Internal Networks
- ClickFix Attack Uses Fake Windows BSOD Screens to Deploy Malware
- DroidLock Malware Locks Android Phones and Demands Ransom
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.



1 Comment
i have i files infect with this viruse