<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mogranos Archives - Malware Complaints</title>
	<atom:link href="https://malwarecomplaints.info/tag/mogranos/feed/" rel="self" type="application/rss+xml" />
	<link>https://malwarecomplaints.info/tag/mogranos/</link>
	<description>Virus and Malware Removal Guides</description>
	<lastBuildDate>Fri, 02 Aug 2019 07:50:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://malwarecomplaints.info/wp-content/uploads/2020/11/Malware-Complaints-Logo.svg</url>
	<title>Mogranos Archives - Malware Complaints</title>
	<link>https://malwarecomplaints.info/tag/mogranos/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Remove Cosakos Virus Ransomware (+ .Cosakos File Recovery)</title>
		<link>https://malwarecomplaints.info/cosakos-virus-file/</link>
					<comments>https://malwarecomplaints.info/cosakos-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Fri, 02 Aug 2019 07:29:24 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cosakos]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Mogranos]]></category>
		<category><![CDATA[Nvetud]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[removal]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5213</guid>

					<description><![CDATA[<p>.Cosakos Virus in Depth Ransomware cryptoviruses such as Cosakos are some of the most dangerous computer infections that you can encounter online. Dealing with them can be very challenging, yet, there is no need to let the panic take you over. The main problem with the Ransomware-based infections is the fact that they don’t harm [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/cosakos-virus-file/">Remove Cosakos Virus Ransomware (+ .Cosakos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="cosakos-virus-in-depth" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">.Cosakos Virus in Depth</span></h2>
<figure id="attachment_5217" aria-describedby="caption-attachment-5217" style="width: 1022px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-5217 size-full" title=".Cosakos Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus.png" alt=".Cosakos Virus" width="1022" height="537" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus.png 1022w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus-800x420.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus-300x158.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus-768x404.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-Virus-810x426.png 810w" sizes="(max-width: 1022px) 100vw, 1022px" /><figcaption id="caption-attachment-5217" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Once the .Cosakos Virus is finished with encrypting your files you will find this message.</span></figcaption></figure>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Ransomware cryptoviruses such as Cosakos are some of the most dangerous computer infections that you can encounter online. Dealing with them can be very challenging, yet, there is no need to let the panic take you over. The main problem with the Ransomware-based infections is the fact that they don’t harm anything on the system and, thus, the security programs rarely can detect them. Unlike most other computer threats, such as <a href="https://en.wikipedia.org/wiki/Trojan_horse_(computing)" target="_blank" rel="noopener noreferrer">Trojans</a> or Rootkits who usually do some significant damage, these pieces of malware just apply a special encryption to the files, stored in the system without damaging them. In this way, infections like <strong>Cosakos</strong>, <a href="https://malwarecomplaints.info/nvetud-virus-file/" target="_blank" rel="noopener noreferrer">Nvetud</a> or <a href="https://malwarecomplaints.info/mogranos-virus-file/" target="_blank" rel="noopener noreferrer">Mogranos</a> prevent the victims from accessing their information and ask them to pay a ransom (usually in BitCoins) in order to regain their access. Another factor that plays a great role when it comes to surprising the victims is the stealthiness of the Ransomware. Such malware can sneak inside the system with the help of many infection methods, including through the distribution of spam, malicious email attachments, fake software update requests, infected ads and more. On top of that, in many cases, it may not be possible to reverse the effects of their attack successfully.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">To access the encrypted information, you would need to apply a special decryption key, which can reverse the applied encryption. This key, however, is kept at the server of the attackers who stay behind the Ransomware and they will ask you to pay a certain amount of money for it. They will display a ransom-demanding notification on your screen with instructions on how to make the payment.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">Professional malware researchers all around the web, who try to combat Ransomware infections, advise the victims of this blackmailing software not to give their money to the hackers. The strongest reason for that is the fact that the online crooks simply cannot be trusted. They may easily trick you into paying the ransom by promising that they will help you get your files back and then simply disappear without sending you nothing. Even if you follow every step of their ransom-payment instructions, there is no guarantee that you will get the decryption key. Not to mention that, in the event you do get one, there is no proof that it will work. The only thing that is for sure is that your money will be gone and there will be no refund, regardless of whether you get your data back or not.</span></p>
<h2 id="can-the-cosakos-file-encryption-be-broken" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 18pt;">Can the .Cosakos file encryption be broken?</span></h2>
<figure id="attachment_5218" aria-describedby="caption-attachment-5218" style="width: 817px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-5218 size-full" title=".Cosakos File" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File.png" alt=".Cosakos File" width="817" height="523" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File.png 817w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File-800x512.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File-300x192.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File-768x492.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/Cosakos-File-810x519.png 810w" sizes="(max-width: 817px) 100vw, 817px" /><figcaption id="caption-attachment-5218" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">A screenshot of an enrypted .Cosakos File.</span></figcaption></figure>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 12pt;">In case your audios, videos, images, documents and other personal files have been encrypted by Cosakos, our suggestion is to take a look at the Removal Guide below. It contains instructions on how to remove the Ransomware both manually or with the help of a professional removal tool, as well as some file-recovery suggestions. If you have backups, you can use them as well. Keep in mind though, that the effectiveness of the alternative methods may vary from case to case. Therefore, a 100% success in file-recovery cannot be guaranteed in all the cases.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table class=" alignleft" style="width: 100%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>Cosakos</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-cosakos-ransomware" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Remove .Cosakos Ransomware</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-cosakos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Cosakos</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Cosakos.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Cosakos , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-cosakos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Cosakos</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Cosakos Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-cosakos-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Cosakos Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Cosakos Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/cosakos-virus-file/">Remove Cosakos Virus Ransomware (+ .Cosakos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/cosakos-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Cosacos Virus Ransomware (+.Cosacos File Recovery)</title>
		<link>https://malwarecomplaints.info/cosacos-virus-file/</link>
					<comments>https://malwarecomplaints.info/cosacos-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Thu, 01 Aug 2019 20:57:33 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cosacos]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[Format]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Mogranos]]></category>
		<category><![CDATA[Nelasod]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5205</guid>

					<description><![CDATA[<p>The Ransomware cryptovirus infections are a common online threat that many users get attacked by on a daily basis. The most typical trait of those infections is that they use a process known as data encryption to render the files present in the infected machine inaccessible &#8211; this allows the hackers controlling the Ransomware to</p>
<p>The post <a href="https://malwarecomplaints.info/cosacos-virus-file/">Remove Cosacos Virus Ransomware (+.Cosacos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The Ransomware cryptovirus infections are a common online threat that many users get attacked by on a daily basis. The most typical trait of those infections is that they use a process known as data encryption to render the files present in the infected machine inaccessible &#8211; this allows the hackers controlling the Ransomware to demand a ransom payment from their victims. The money is typically requested in BitCoin &#8211; the use of this infamous cryptocurrency allows the hackers to keep their anonymity since money transactions made through BitCoins are virtually untraceable to the regular users. A key thing to understand if a Ransomware infection gets a hold of your files is that the consequences of the attack may not always be fully reversible. Still, this definitely doesn’t mean you shouldn’t try to mitigate the negative effects of the attack.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>The .Cosacos virus</strong></span></p>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5189 size-full" title=".Cosacos Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt=".Cosacos Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="auto, (max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;"> Cosacos is the Ransomware cryptovirus infection that is the reason for writing the current post &#8211; it is a new and particularly unpleasant piece of malware that uses a highly sophisticated encryption code to lock up the files of the people whose computers it attacks. Such encryptions are really difficult to break even for a professional malware security expert. There are many people out there working day and night to break the encryptions of newer cryptoviruses like Cosacos in order to develop working decryptor tools. However, it takes a lot of time and effort to create a single such tool for only one Ransomware. At the same time, new Ransomware infections like Cosacos or <a href="https://malwarecomplaints.info/nelasod-virus-file/" target="_blank" rel="noopener noreferrer">Nelasod</a> get created on a daily basis, which means there’s always a number of cryptoviruses with no corresponding decryptor tools for them. On our site, you can find a list of decryptors for some of the most popular Ransomware threats. We try to update the list with the latest decryptor additions so that our users can find and use them.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Why not simply pay the ransom?</strong></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The main problem with the payment is the uncertainty of it. Even if you leave aside the fact that the money sum demanded for the files’ decryption could be quite high and that not everyone may have the opportunity to make such a payment, there is still the risk of sending the sum and not getting anything in exchange for it. The hackers behind threats like Cosacos are not to be trusted &#8211; after all, they are the people responsible for your files’ decryption. They could easily decide that sending you the key is not something they are going to do. Furthermore, what’s the guarantee that such a key even exists? Oftentimes, there is none.</span></p>
<h2 id="an-alternative-to-the-cosacos-file-encryption" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>An alternative to the .Cosacos file encryption</strong></span></h2>
<figure id="attachment_5208" aria-describedby="caption-attachment-5208" style="width: 799px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5208 size-full" title=".Cosacos File" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/cosacos.png" alt=".Cosacos File" width="799" height="521" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/cosacos.png 799w, https://malwarecomplaints.info/wp-content/uploads/2019/08/cosacos-300x196.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/cosacos-768x501.png 768w" sizes="auto, (max-width: 799px) 100vw, 799px" /><figcaption id="caption-attachment-5208" class="wp-caption-text">The ransomware will encrypt your files and add .Cosacos extension to them.</figcaption></figure>
<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">We cannot promise that if you follow the alternative we are about to present you with, you will bring all of your data back. Still, it is worth to give it a try. The first thing you’d need to do is remove the virus &#8211; the guide below and the linked removal tool will help you with that. Then, you can go to the next section of the guide to see some recovery suggestions as well as visit our list of Ransomware decryptors and try some of them.</span></p>
<h2 id="cosacos-summary" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Cosacos SUMMARY:</strong></span></h2>
<table class=" alignleft" style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Cosacos</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Cosacos Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Cosacos Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-cosacos-ransomware" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Remove Cosacos Ransomware </span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-cosacos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Cosacos</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Cosacos.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Cosacos , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-cosacos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Cosacos</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Cosacos Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-cosacos-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Cosacos Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Cosacos Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/cosacos-virus-file/">Remove Cosacos Virus Ransomware (+.Cosacos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/cosacos-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Mogranos Virus Ransomware (+.Mogranos File Recovery)</title>
		<link>https://malwarecomplaints.info/mogranos-virus-file/</link>
					<comments>https://malwarecomplaints.info/mogranos-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 15:11:55 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[Format]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Mogranos]]></category>
		<category><![CDATA[Ndarod]]></category>
		<category><![CDATA[Nelasod]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5185</guid>

					<description><![CDATA[<p>This page aims to help you remove Mogranos for free. Our instructions also cover how any Mogranos file can be recovered. There are special types of computer threats, called Ransomware viruses, which are famous for their ability to take the user’s personal data hostage and to demand that a ransom is paid if the victim</p>
<p>The post <a href="https://malwarecomplaints.info/mogranos-virus-file/">Remove Mogranos Virus Ransomware (+.Mogranos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">This page aims to help you remove Mogranos for free. Our instructions also cover how any Mogranos file can be recovered.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">There are special types of computer threats, called Ransomware viruses, which are famous for their ability to take the user’s personal data hostage and to demand that a ransom is paid if the victim wants to access any of their files again. This type of malware is one of the most common threats on the Internet and is a very popular tool used by online criminals to extort money from regular web users.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The fact that most people don’t keep regular backup copies of their files helps the crooks a lot, because once the personal data becomes encrypted with the help of a sophisticated file-encrypting infection like Mogranos, <a href="https://malwarecomplaints.info/nelasod-virus-file/" target="_blank" rel="noopener noreferrer">Nelasod</a>, <a href="https://malwarecomplaints.info/format-virus-file/" target="_blank" rel="noopener noreferrer">Format</a>,, the only viable choice the victims have is to pay the ransom money. The criminals typically claim that they will send a special decryption key if the payment is made according to their instructions, and feed the victims with promises that everything will be back to normal.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">However, will paying the ransom really save your computer from a Ransomware like Mogranos, and is this the only solution to get your files back? Well, unfortunately, there cannot be an exact answer to this question, and the reason for that is simple: you can&#8217;t trust the anonymous criminals.</span></p>
<h2 id="will-paying-remove-the-mogranos-file-encryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">Will paying remove the .Mogranos file encryption?</span></h2>
<figure id="attachment_5187" aria-describedby="caption-attachment-5187" style="width: 803px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5187 size-full" title=".Mogranos File" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/mogranos.png" alt=".Mogranos File" width="803" height="548" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/mogranos.png 803w, https://malwarecomplaints.info/wp-content/uploads/2019/07/mogranos-800x546.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/mogranos-300x205.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/mogranos-768x524.png 768w" sizes="auto, (max-width: 803px) 100vw, 803px" /><figcaption id="caption-attachment-5187" class="wp-caption-text">The ransomware will encrypt your files and add .Mogranso extension to them.</figcaption></figure>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Regardless of how convincing the hackers may try to be, there simply is no guarantee that they will send you the secret decryption key for the files that their virus has encrypted. If you are lucky enough, you may eventually receive some decryption solution in exchange for your money, but there is practically nothing you could do if the crooks decide to not send you anything. It is not excluded that they may not even have a working decryption key, and that they may simply be trying to trick you into making the ransom payment without having any actual intention of helping you out with your data&#8217;s recovery. In this case, if you send them your money, that money will be gone in vain. This is because, in most cases, the ransom that the hackers demand is requested in BitCoin, or in another similar cryptocurrency, the transaction of which is almost impossible to trace. This method of payment allows the criminals to remain anonymous, and is one of the main reasons why they usually cannot be brought to justice by the authorities.</span></p>
<h2 id="dealing-with-mogranos-virus" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">Dealing with .Mogranos virus</span></h2>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5189 size-full" title=".Mogranos Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt=".Mogranos Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="auto, (max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">If a Ransomware like Mogranos is not removed but is left to operate in the system undisturbed, it can make your computer unusable, because it may encrypt every new file you create, as well as any other devices or backup copies you connect to the infected machine. Therefore, the most recommended course of action according to most security specialists, including our “How to remove” team, is to focus on removing Ransomware infection. Once you have successfully deleted it, you can safely connect your backup sources or give a try to some alternative file-recovery methods. If you don’t know how to do that, the removal guide below can assist you in detecting and removing Mogranos. There is also a special section with suggestions on how to retrieve some of your files without paying the ransom.</span></p>
<h2 id="mogranos-summary" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Mogranos SUMMARY:</strong></span></h2>
<table class=" alignleft" style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Mogranos</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Mogranos Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Mogranos Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="mogranos-ransomware-removal" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Mogranos Ransomware Removal</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-mogranos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Mogranos</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Mogranos.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Mogranos , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-mogranos" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Mogranos</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Mogranos Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-mogranos-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Mogranos Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Mogranos Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/mogranos-virus-file/">Remove Mogranos Virus Ransomware (+.Mogranos File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/mogranos-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
