Severity scale:  

Remove Thor ransomware / virus (Removal Instructions) - updated Nov 2016

removal by Olivia Morelli - -   Also known as Locky | Type: Ransomware

How dangerous is Thor file virus?

Thor ransomware is cypto-type malware which hails from an infamous family of Locky ransomware. Together with this threat, security researchers discovered Perl ransomware, .Shit file extension virus and Odin virus. Thor is not just an ordinary member of this group of viruses because it can encrypt files with over 400 different file extensions. To make victim’s files useless, it uses a combination of RSA and AES ciphers that distort the structure of every file and scramble the filename by adding .thor file extension to them. As a result, you can easily notice the fact that your computer is hijacked by this ransomware. Of course, the affected files are not available for a free use – to start using them again you are required to pay a ransom of 0.5 bitcoin. This version of Thor virus uses two files to “inform” its victim about the encryption of his or hers files and a need to pay a special payment. Documents that are supposed to reveal that are presented as _WHAT_is.html and _WHAT_is.bmp. What is even worse is that this virus is programmed to continue the scan of the system. Once it discovers new files added to it, it initiates another encryption process, so there is no doubt that you must initiate Thor removal on your computer as soon as you find one of its encrypted files. For that, use Reimage Reimage Cleaner Intego.

The aim of Thor ransomware is to make files inaccessible and force the victim to pay the ransom. This virus asks for approximately 0.50 Bitcoin to set victim’s files free, and this sum equals to 330 US dollars. The ransom notes that Thor virus leaves on the compromised system explain to the victim how to download Tor browser, which is needed in order to access the ransom payment site. The payment site asks to enter the personal ID, which is presented in the ransom note or to enter any encrypted file name. If your files have been compromised by this ransomware, you have two options – send your money to cyber criminals and wait until they provide the decryption software (unlikely to happen) or remove Thor virus using the anti-malware tool and restore your files from a backup. If you do not have a backup, we are afraid that there is no way to restore corrupted data, but you can still try some of the data recovery techniques described below this post.

Image of Thor ransomware

Infiltration techniques used by this ransomware

Each version of Locky virus uses quite similar methods to infiltrate victim’s computers. Some of them are delivered via malicious emails, others infect target computers with the help of exploit kits, and others spread via malware-laden ads. Thor ransomware typically arrives in a form of .vbs, .dll, .zip, .js, .hta or .doc file, and can be executed unwillingly. It is not surprising, considering that such files do not look suspicious at all. Unfortunately, unprotected computers cannot fight against ransomware attack, so they get infected. As we have mentioned before, there is no way to revert damage that ransomware viruses do, unless the victim has data backup stored on an external storage device. To protect your files, you can use external hard drives, USB sticks and similar solutions. If you want to use online back up solutions, such as cloud services, make sure they are disconnected all the time to protect your data from the entire loss. In case of infiltration, make sure you remove Thor virus from your computer and then use your backup to restore encrypted files.

Update on Thor file virus distribution

Questions about Thor ransomware virus

According to the latest reports, Thor virus spreads as a misleading email message titled as Budget or Budget forecast. It has Zip attachment added to it which seems like an excel file with the budget-themed name. Later, you can see that the attachment is, in fact, the .vbs file that seeks to infect you with Thor ransomware or other versions of Locky. The body of the message asks you to double check the file added to it. However, you should be careful with such emails, especially if they come from people you are not familiar with. Besides, we should warn you about the latest scam used to promote Locky ransomware several days ago because there is a huge chance that scammers will start using it for the distribution of Thor malware. In this case, they are trying to trick their victims into believing that the alleged U.S. Office of Personnel Management (OPM) account manager detected illegal operations in their bank account. However, after looking closer at this message it seems obvious that it is filled with grammar or typo mistakes. Please, make sure you contact your bank and its representatives before clicking the infected file added to such message. If you can see this warning on your computer’s desktop, you are infected. In this case, please, proceed to Thor removal process:


All of your files are encrypted with RSA-2048 and AES-128 ciphers.
More information about the RSA and AES can be found here:
Decrypting of your files is only possible with the private key and decrypt program, All which is on our secret server.
To receive your private key follow one of the links:
If all of this addresses are not available, follow these steps:

1. Download and install Tor Browser: https://….
2. After a successful installation, run the browser and wait for initialization.
3. Type in the address bar: 
4. Follow the instructions on the site.
!!! Your personal identification ID: !!!

Removal methods of Thor virus

If your PC is already infected with this ransomware, you must remove Thor virus entirely because it can try to encrypt your newest files and files that are kept on the network. To do that, you should use reliable anti-malware tool after updating. If you do not have any security software on your computer, you should choose one of those that are given below. To restore your files without a backup, we highly recommend following “Data recovery” steps that are provided below the Thor removal steps. Please, do NOT think about paying the ransom because that’s how you can lead yourself to the risk of losing your files AND the money. Keep in mind that people who you are dealing with are hackers. They will do anything to increase their income.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Thor virus, follow these steps:

Remove Thor using Safe Mode with Networking

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Thor

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Thor removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Thor using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Thor. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that Thor removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Thor from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

After removing the ransomware from the compromised computer, victims can restore their files using data backups. One simply needs to plug the data storage device to the computer and import needed files to the PC. In case you do not have a data backup, there are some other recovery solutions for files encrypted by Thor ransomware:

If your files are encrypted by Thor, you can use several methods to restore them:

Download Data Recovery Pro to recover files encrypted by Thor virus

To recover your files after infiltration of Thor virus, you can use a special data recovery program. To recover infected files, follow the steps provided below and see how they work:

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by Thor ransomware;
  • Restore them.

Use Windows Previous Versions feature to restore files affected by Thor ransomware

If System Restore function was enabled on your computer, you can try Windows Previous Versions feature. For using this option to recover your encrypted files, follow these steps:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Thor decrypter is not available yet

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Thor and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Access your website securely from any location

When you work on the domain, site, blog, or different project that requires constant management, content creation, or coding, you may need to connect to the server and content management service more often. It is a hassle when your website is protected from suspicious connections and unauthorized IP addresses.

The best solution for creating a tighter network could be a dedicated/fixed IP address. If you make your IP address static and set to your device, you can connect to the CMS from any location and do not create any additional issues for server or network manager that need to monitor connections and activities. This is how you bypass some of the authentications factors and can remotely use your banking accounts without triggering suspicious with each login. 

VPN software providers like Private Internet Access can help you with such settings and offer the option to control the online reputation and manage projects easily from any part of the world. It is better to clock the access to your website from different IP addresses. So you can keep the project safe and secure when you have the dedicated IP address VPN and protected access to the content management system.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions

Removal guides in other languages

  1. LEO says:
    October 26th, 2016 at 12:28 pm


  2. madison says:
    October 26th, 2016 at 12:28 pm

    How can I eliminate this?? I dont have antimalware

  3. Galyot says:
    October 26th, 2016 at 12:30 pm

    Gurl better dont try… you can mess the PC up. It is always better to use a program that is developed with intention to help inexperienced PC users to clean infected devices.

  4. drop says:
    October 26th, 2016 at 12:30 pm

    does anyone know how to decrypt encrypted .thor files

Your opinion regarding Thor ransomware virus