Xorist 2020 Ransomware
Xorist 2020 is a malicious ransomware strain that encrypts victim files and demands ransom payment for decryption. First observed in the wild on March 1, 2020, this ransomware has been actively targeting systems worldwide. Security researchers also track this malware under the aliases: Xorist 2020-2021.
Quick facts
How Xorist 2020 ransomware works
File encryption patterns
Xorist 2020 modifies encrypted files using specific patterns to mark them as encrypted:
Ransom note and payment demands
After encrypting files, Xorist 2020 displays ransom notes demanding payment for file recovery:
notes/HOW TO DECRYPT FILES.txt
notes/HOW TO DECRYPT FILES.txt
notes/КАК РАСШИФРОВАТЬ ФАЙЛЫ.txt
Technical indicators
Associated executable files
The following executable files are associated with Xorist 2020 ransomware:
- 4.exe
- sAadsA.exe
- Z2.exe
- 9bysyq8v045hrnf.exe
- 1pqtu9v4f52721w.exe
- virus.exe
- WU17sDZVZ12PQjL.exe
- Office aktivator cz KSMpico.exe
- BS.Player 2.74.exe
- KMSpico 10.1.9 Windows and Office Activator.exe
- DAEMON Tools Lite2020.exe
- Farm Mania �ESKY! .exe
- Gay porn Free CZ.exe
- Aktivator ilegalni windows 10.exe
- Half-life (crack).exe
- AVG PC Tuneup 2020.exe
- 274qxsg6j941muk.exe
- Minecraft client 2020.exe
- dddd.exe
- satanfin.exe
- NIGG3R.bin
- one.exe
- payload_1.bin
- Additional accounting requirments.doc
- divinity.exe
About this analysis
This Xorist 2020 ransomware analysis is part of Elastio's comprehensive ransomware detection database. Elastio provides advanced ransomware protection and recovery, helping organizations defend against and recover from ransomware attacks like Xorist 2020.
Last updated: December 30, 2025
Elastio detects Xorist 2020 inside your data and backups.
The Hunt Engine uses Deep File Inspection to identify Xorist 2020 across live data, replicated data, and backups. If this family is in your environment, Elastio finds it before encryption completes. Run a scan against your recovery points to confirm.
Recent ransomware
Explore other threats in our database