Pizdec ransomware is a newly discovered variant of the infamous GlobeImposter ransomware family. This malicious software encrypts victims’ files and appends the “.pizdec” extension to filenames, rendering them inaccessible. Affected users receive a ransom note in an HTML file named “how_to_back_files.html”, instructing them to pay a ransom in Bitcoin (BTC) to recover their files.
Threat Summary
Attribute | Details |
---|---|
Threat Name | Pizdec Ransomware |
Threat Type | Ransomware, File-Encrypting Malware |
File Extension | .pizdec |
Ransom Note | how_to_back_files.html |
Ransom Amount | $1,000 in BTC or 0.5 BTC |
Bitcoin Wallet | 3FmLKtBZB435pwa8BTknPKXsUeYkRu4u82 |
Cybercriminal Contact | solodinero@seznam.cz , ToxID: 9CDB535E2DFE3DFAFF17A2263A03A684 B816FC9E69F159301D25E56C8EB47C32468D0F8129BD |
Detection Names | Avast (Win32:RansomX-gen [Ransom]), Combo Cleaner (Generic.Ransom.GlobeImposter.CEDAC9A9), ESET-NOD32 (A Variant Of Win32/Filecoder.FV), Kaspersky (Trojan-Ransom.Win32.Purgen.ahp), Microsoft (Ransom:Win32/Necne) |
Symptoms | Files are encrypted and renamed with .pizdec , ransom note appears, system performance issues |
Damage | File encryption, potential additional malware infections, financial loss |
Distribution Methods | Malicious email attachments, phishing, torrent websites, fake software updates, drive-by downloads, untrustworthy free software |
Danger Level | High |

Remove Pizdec Ransomware
With SpyHunter
Pizdec Ransomware: How It Works
Once inside a system, Pizdec ransomware scans for files to encrypt. Each affected file gets the “.pizdec” extension appended, changing names like:
- Before:
document.pdf
- After:
document.pdf.pizdec
After encryption, the ransomware generates a ransom note with payment instructions. The attackers claim that corporate networks have been breached and demand a ransom of either $1,000 in BTC or 0.5 BTC.
Ransom Note: how_to_back_files.html
The ransom note states:
YOUR CORPORATE NETWORK LOCKED!
ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED.
TO RESTORE FILES YOU WILL NEED A DECRYPTOR!
To get the decryptor you should:
- Pay for decrypting your network – 0.5 BTC
- Buy BTC on one of these sites:
hxxps://binance.com
hxxps://www.coinbase.com
Bitcoin Wallet: 3FmLKtBZB435pwa8BTknPKXsUeYkRu4u82
Send $1000 USD in BTC for decrypt
Our contacts:
- Email:
solodinero@seznam.cz
- ToxID:
9CDB535E2DFE3DFAFF17A2263A03A684 B816FC9E69F159301D25E56C8EB47C32468D0F8129BD
Never pay to any other address than those listed here!
We do not use any other messengers except TOX and the contact listed here!
© 2025 Suffering Corporation | All Rights Reserved.
Manual Ransomware Removal Process
Important: Manual removal is recommended only for experienced users, as incorrect actions can lead to data loss or incomplete removal of the ransomware. If unsure, consider the SpyHunter Removal Method for a guided, automated solution.
Step 1: Disconnect from the Internet
- Immediately disable Wi-Fi or unplug the Ethernet cable to prevent the ransomware from communicating with remote servers.
- This can prevent additional encryption or further infections.
Step 2: Boot into Safe Mode
For Windows Users
- Windows 10/11:
- Press Windows + R, type
msconfig
, and press Enter. - Under the Boot tab, select Safe boot and check Network.
- Click Apply, then OK, and restart your PC.
- Press Windows + R, type
- Windows 7/8:
- Restart your PC and press F8 repeatedly before Windows starts.
- Select Safe Mode with Networking and press Enter.
For Mac Users
- Restart your Mac and hold the Shift key immediately after the startup chime.
- Release the key when the Apple logo appears.
- Your Mac will boot in Safe Mode.
Step 3: Identify and Terminate Malicious Processes
Windows
- Open Task Manager by pressing Ctrl + Shift + Esc.
- Look for unusual processes consuming high CPU or memory.
- Right-click on the suspicious process and select End Task.
Mac
- Open Activity Monitor (Finder > Applications > Utilities > Activity Monitor).
- Look for unknown or high-resource-consuming processes.
- Select the suspicious process and click Force Quit.
Step 4: Delete Ransomware Files
Windows
- Open File Explorer and navigate to:
C:\Users\[Your Username]\AppData\Local
C:\Users\[Your Username]\AppData\Roaming
C:\Windows\System32
- Identify and delete suspicious files (randomly named or recently modified items).
- Clear temporary files:
- Press Windows + R, type
%temp%
, and hit Enter. - Delete all files in the Temp folder.
- Press Windows + R, type
Mac
- Open Finder and select Go > Go to Folder.
- Type
~/Library/Application Support
and check for unfamiliar files or folders. - Remove unknown
.plist
files from~/Library/LaunchAgents
.
Step 5: Remove Ransomware Entries from Registry or System Settings
Windows
- Press Windows + R, type
regedit
, and hit Enter. - Navigate to:
HKEY_CURRENT_USER\Software
HKEY_LOCAL_MACHINE\Software
- Identify and delete ransomware-related registry entries.
Mac
- Open System Preferences > Users & Groups.
- Select the Login Items tab and remove any unknown startup programs.
- Check
~/Library/Preferences
for malicious settings.
Step 6: Restore System Using a Backup or Restore Point
Windows
- Press Windows + R, type
rstrui
, and press Enter. - Choose a restore point from before the infection and proceed.
Mac
- Restart your Mac and enter macOS Utilities by holding Command + R.
- Select Restore from Time Machine Backup and restore a safe backup.
Step 7: Attempt to Decrypt Files
- Check No More Ransom (www.nomoreransom.org) for available decryption tools.
- If unavailable, restore files from backups.
Automated Ransomware Removal with SpyHunter

Remove Pizdec Ransomware
With SpyHunter
If manual removal is too complex or risky, SpyHunter offers a safer, automated method for detecting and removing ransomware.
Step 1: Download SpyHunter
- Get SpyHunter from the official Enigma Software website.
Step 2: Install SpyHunter
- Open the downloaded file (
SpyHunter-Installer.exe
or.dmg
for Mac users). - Follow the installation prompts.
- Launch SpyHunter upon completion.
Step 3: Run a Full System Scan
- Click Start Scan Now to detect malware and ransomware.
- Wait for the scan to complete and review detected threats.
Step 4: Remove Detected Ransomware
- Click Fix Threats to remove identified ransomware components.
- SpyHunter will clean your system automatically.
Step 5: SpyHunter’s Custom Malware HelpDesk
- If ransomware persists, use SpyHunter’s Malware HelpDesk for custom malware fixes.
Step 6: Restore Files
- Use backups stored on external drives or cloud storage.
- If no backup is available, check No More Ransom for decryption tools.
Preventing Future Ransomware Attacks
- Keep backups: Use cloud storage or an external hard drive.
- Install a reliable security tool: SpyHunter offers real-time protection against malware.
- Enable Windows Defender or Mac security features for additional protection.
- Avoid phishing emails and unknown attachments.
- Regularly update Windows, macOS, and installed applications.