<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>.Litar Archives - Malware Complaints</title>
	<atom:link href="https://malwarecomplaints.info/tag/litar/feed/" rel="self" type="application/rss+xml" />
	<link>https://malwarecomplaints.info/tag/litar/</link>
	<description>Virus and Malware Removal Guides</description>
	<lastBuildDate>Sun, 14 Jul 2019 13:08:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://malwarecomplaints.info/wp-content/uploads/2020/11/Malware-Complaints-Logo.svg</url>
	<title>.Litar Archives - Malware Complaints</title>
	<link>https://malwarecomplaints.info/tag/litar/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Remove .Adame Ransomware Virus (+File Recovery)</title>
		<link>https://malwarecomplaints.info/adame-virus-file/</link>
					<comments>https://malwarecomplaints.info/adame-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Sat, 13 Jul 2019 21:55:51 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[.Adame]]></category>
		<category><![CDATA[.godes]]></category>
		<category><![CDATA[.Litar]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=4821</guid>

					<description><![CDATA[<p>About the Adame Ransomware &#160; The next lines discuss a vicious malware program labeled the .Adame Ransomware, which may result in a lot of trouble in the event it gets on your machine. The nasty piece of malware belongs to the Ransomware kind of viruses and is able to use a complicated encryption code as [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/adame-virus-file/">Remove .Adame Ransomware Virus (+File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="about-the-adame-ransomware"><span style="font-family: helvetica, arial, sans-serif;">About the Adame Ransomware</span></h2>
<figure id="attachment_4822" aria-describedby="caption-attachment-4822" style="width: 1417px" class="wp-caption aligncenter"><a href="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci.jpg" target="_blank" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" class="wp-image-4822 size-full" title="How to remove Adame virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci.jpg" alt="Adame Virus" width="1417" height="591" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci.jpg 1417w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci-800x334.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci-300x125.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci-768x320.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci-1024x427.jpg 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Adame-virus-file-mci-810x338.jpg 810w" sizes="(max-width: 1417px) 100vw, 1417px" /></a><figcaption id="caption-attachment-4822" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Adame Ransomware will leave ransom instructions for you to follow</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">The next lines discuss a vicious malware program labeled the <strong>.Adame Ransomware</strong>, which may result in a lot of trouble in the event it gets on your machine. The nasty piece of malware belongs to the Ransomware kind of viruses and is able to use a complicated encryption code as a method for securing the personal documents of its victim. The moment the encryption process has been 100 % carried out, a notification message telling you about the virus contamination gets shown on your PC screen. What this kind of pop-up serves for is to notify the attacked person that a ransom transfer is expected from them. Unless the ransom is paid, the documents will stay encrypted. </span><span style="font-family: helvetica, arial, sans-serif;">If you are one of those unfortunate users that have had their system invaded by the <strong>.Adame Virus</strong>, make sure you explore the remainder of this post, as well as our Ransomware removal guide that you can find down below. </span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">A primary reason why Ransomware infections seem to have such high effectiveness has to do with the fact that this specific form of computer virus does not function like any other type of malicious software. The version of malware you might have landed is supposed to lock up your private documents without doing any damage to any of the components of your system. The encryption code it applies isn&#8217;t harmful &#8211; its original purpose is software security. However, the <strong>.Adame Virus</strong> utilizes it against the users by secretly “securing” their files and generating a special decryption key for their decryption, which is stored at remote servers. The hackers who are in control of the infection start to blackmail the victims to pay a certain amount of money in order to send them that key.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Unfortunately, due to the fact that no actual damage is caused to the system or the files, most Ransomware viruses are normally capable of staying concealed and undetected even in cases where the targeted victim has an anti-malware software on their computer. That is why, sadly, infections like <strong>.Adame</strong>. <strong><a href="https://malwarecomplaints.info/godes-virus-file/" target="_blank" rel="noopener noreferrer">.Godes</a>, <a href="https://malwarecomplaints.info/litar-virus-file/" target="_blank" rel="noopener noreferrer">.Litar</a> </strong>almost NEVER get intercepted before the completion of their malicious task of encryption-locking the user&#8217;s data.</span></p>
<h2 id="what-will-happen-with-my-adame-infected-files"><span style="font-family: helvetica, arial, sans-serif;">What will happen with my .Adame infected files</span></h2>
<figure id="attachment_4823" aria-describedby="caption-attachment-4823" style="width: 772px" class="wp-caption aligncenter"><a href="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-.Adame-virus-mci.jpg" target="_blank" rel="noopener noreferrer"><img decoding="async" class="wp-image-4823 size-full" title="How to remove .Adame Virus files" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-.Adame-virus-mci.jpg" alt="Adame virus file" width="772" height="525" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-.Adame-virus-mci.jpg 772w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-.Adame-virus-mci-300x204.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-.Adame-virus-mci-768x522.jpg 768w" sizes="(max-width: 772px) 100vw, 772px" /></a><figcaption id="caption-attachment-4823" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">The Ademe Ransomware will encrypt your files and modify the extension of your files to .[supportcrypt2019@cock.li].Adame</span></figcaption></figure>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">A lot of users might be considering executing the ransom money payment as a quick way out of the situation, yet we have to inform you that this is possibly not the best way to approach this type of computer infections. The Ransomware online hackers highly rely on making the user think that paying the ransom is truly the only possible way out. The crooks would typically require the ransom in the form of bitcoins and may possibly also set a deadline. This cryptocurrency is extremely favored by many cyber criminals as it is utterly untraceable in the majority of the cases. That being said, it should not be hard to realize why the hackers behind the <strong>.Adame Virus</strong> prefer that the money is transacted via this type of currency. That is how those online hackers try to avoid getting brought to justice and, more often than not, they&#8217;re able to do so.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Then again, in numerous situations, even the payment of the demanded ransom might not help the virus victims because it is entirely possible that they may not receive any data-decryption details. Therefore, our recommendation for you is to take a look at all available alternatives first and only then decide on if you are going to risk your money to possibly restore your PC files or search for a better, safer alternative. What is more, here, we have something that might help you take care of the problem &#8211; a Removal Guide manual for Ransomware that could possibly help you in your struggle.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table class=" alignleft" style="width: 61.5156%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px; width: 41.0599%;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>.Adame</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px; width: 41.0599%;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px; width: 41.0599%;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px; width: 41.0599%;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px; width: 41.0599%;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-adame-ransomware-guide" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Remove .Adame Ransomware Guide</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-adame" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to .Adame</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the .Adame.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and .Adame , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-adame" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; .Adame</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to .Adame Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-adame-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: .Adame Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the .Adame Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<p>The post <a href="https://malwarecomplaints.info/adame-virus-file/">Remove .Adame Ransomware Virus (+File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/adame-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Sodin Ransomware (+File Recovery)</title>
		<link>https://malwarecomplaints.info/sodin-virus-file/</link>
					<comments>https://malwarecomplaints.info/sodin-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Thu, 04 Jul 2019 11:32:18 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[.Besub]]></category>
		<category><![CDATA[.Litar]]></category>
		<category><![CDATA[.mc9530]]></category>
		<category><![CDATA[Cve-2018-8453]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[Sodin Ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=4607</guid>

					<description><![CDATA[<p>About Sodin Ransomware &#160; Sodin Ransomware uses Cve-2018-8453 Vulnerability to penetrate your security When the ransomware is done encrypting your files, it leaves a mc9530-readme.txt file with instructions in every folder: &#160; Everyone knows that the Internet is a place where one can run into all kinds of hazardous virus programs. In today&#8217;s article, we will</p>
<p>The post <a href="https://malwarecomplaints.info/sodin-virus-file/">Remove Sodin Ransomware (+File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="about-sodin-ransomware" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">About Sodin Ransomware</span></h2>
<figure id="attachment_4613" aria-describedby="caption-attachment-4613" style="width: 934px" class="wp-caption aligncenter"><a href="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus.jpg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="wp-image-4613 size-full" title="How to Remove Sodin Ransomware instructions" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus.jpg" alt="Sodin Ransomware Removal guide" width="934" height="650" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus.jpg 934w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus-800x557.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus-300x209.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus-768x534.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-Virus-810x564.jpg 810w" sizes="auto, (max-width: 934px) 100vw, 934px" /></a><figcaption id="caption-attachment-4613" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Screenshot of the infected by Sodin Ransomware files with extension .mc9530.</span></figcaption></figure>
<p>&nbsp;</p>
<p><span style="font-family: helvetica, arial, sans-serif;"><strong>Sodin Ransomware</strong> uses <strong><a href="https://malwarecomplaints.info/remove-cve-2018-8453-vulnerability/" target="_blank" rel="noopener noreferrer">Cve-2018-8453 Vulnerability</a> </strong>to penetrate your security</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">When the ransomware is done encrypting your files, it leaves a mc9530-readme.txt file with instructions in every folder:</span></p>
<figure id="attachment_4614" aria-describedby="caption-attachment-4614" style="width: 737px" class="wp-caption aligncenter"><a href="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-viruss.jpg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="wp-image-4614 size-full" title="How to remove Sodin Ransomware instructions" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-viruss.jpg" alt="Sodin Ransomware removal guide" width="737" height="859" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-viruss.jpg 737w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-viruss-257x300.jpg 257w, https://malwarecomplaints.info/wp-content/uploads/2019/07/Remove-Sodin-viruss-521x607.jpg 521w" sizes="auto, (max-width: 737px) 100vw, 737px" /></a><figcaption id="caption-attachment-4614" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Sodin Ransom message with instructions on how to pay</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Everyone knows that the Internet is a place where one can run into all kinds of hazardous virus programs. In today&#8217;s article, we will talk about one really problematic and difficult to handle form of virus which researchers tend to call Ransomware. This sort of viruses is very hard to handle since they differ greatly from all other versions of malware. In order to illustrate how they operate, we will take as an example one of their latest representatives which goes under the name of <strong>Sodin Ransomware</strong>. What the <strong>Sodin Virus</strong> does once it gets inside the computer is it renders inaccessible the victim&#8217;s data by using a highly-advanced encryption code. Immediately after the encryption takes place, the user is blackmailed into paying a ransom if they wish to obtain the key that is supposed to enable them to re-access the encryption-locked files. Details on how exactly to execute the ransom payment are generally given within a pop-up message which gets generated by the Ransomware as soon as the file encryption procedure has ended.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">For those of you who have already stumbled upon this nasty malware piece, we&#8217;ve created a special removal guide which explains how to deal with the infection and how to remove it.</span></p>
<h2 id="risks-of-sodin-ransomware" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Risks of Sodin Ransomware</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">At the beginning of this article we said that Ransomware is not an ordinary type of malware and operates quite differently than most other kinds of computer threats. This is mainly because the Ransomware uses the method of file-encryption, which is generally non-harmful and commonly used data-protection method, to cause great harm to the users. What makes this <a href="https://en.wikipedia.org/wiki/Malware" target="_blank" rel="noopener noreferrer">malware</a> type especially popular with cyber-terrorists is also the fact that most security programs usually don’t recognize the file-encryption processes as something malicious and, therefore, don’t take actions against it. In addition, virtually no warning signs are caused by this type of process and it is really tricky to detect and intercept it.</span></p>
<h2 id="removing-sodin-ransomware-manually" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Removing Sodin Ransomware manually</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">As we would like to stop you from making a mistake that may cost you a lot of money, we are going to tell you why paying the ransom to the hackers behind <strong>Sodin Ransomware, <a href="https://malwarecomplaints.info/besub-virus-file/" target="_blank" rel="noopener noreferrer">.Besub</a>, <a href="https://malwarecomplaints.info/litar-virus-file/" target="_blank" rel="noopener noreferrer">.Litar </a></strong>(or any other Ransomware) is perhaps not the most advisable &#8220;solution&#8221;.  Naturally, the criminals that are blackmailing you really want you to send them the money and they are determined to do their best to convince you to follow their instructions. Typically, they promise to send you a special decryption key that is stored on their servers with the idea of “helping” you to regain access to your encrypted files. They also may give you a short deadline and may threaten to destroy that key if no ransom is paid within the given time. However, trusting the criminals and hoping that they will fulfill all of their promises once you give them your money is quite risky. Moreover, there is always a bothering possibility of paying the ransom and not obtaining anything in return. Not to mention that giving money to anonymous hackers is a direct form of sponsorship to their criminal practice. For this reason, what we would recommend is to opt for legitimate methods and alternatives that could help you remove the <strong>Sodin Virus</strong> and restore your files by other means. You can start by reviewing all potential solutions and ways to handle the Ransomware and give all of them a try, leaving the ransom payment as a final option if all else fails.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table class=" alignleft" style="width: 62.209%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px; width: 41.7533%;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>Sodin</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px; width: 41.7533%;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px; width: 41.7533%;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px; width: 41.7533%;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px; width: 20.0594%;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px; width: 41.7533%;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-sodin-ransomware-guide" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Remove Sodin Ransomware Guide</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-sodin" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Sodin</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Sodin.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Sodin , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-sodin" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Sodin</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Sodin Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-sodin-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Sodin Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Sodin Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/sodin-virus-file/">Remove Sodin Ransomware (+File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/sodin-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
