<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Prandel Archives - Malware Complaints</title>
	<atom:link href="https://malwarecomplaints.info/tag/prandel/feed/" rel="self" type="application/rss+xml" />
	<link>https://malwarecomplaints.info/tag/prandel/</link>
	<description>Virus and Malware Removal Guides</description>
	<lastBuildDate>Thu, 08 Aug 2019 18:59:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://malwarecomplaints.info/wp-content/uploads/2020/11/Malware-Complaints-Logo.svg</url>
	<title>Prandel Archives - Malware Complaints</title>
	<link>https://malwarecomplaints.info/tag/prandel/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Remove Londec Virus Ransomware (+.Londec File Recovery)</title>
		<link>https://malwarecomplaints.info/londec-virus-file/</link>
					<comments>https://malwarecomplaints.info/londec-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Thu, 08 Aug 2019 13:56:31 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Brusaf]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Londec]]></category>
		<category><![CDATA[Masok]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5331</guid>

					<description><![CDATA[<p>The goal of a Ransomware cryptovirus like Londec is to make your data inaccessible to you, so that the hackers behind the infection can force you to make a ransom payment to them by telling you this is the only way you can recover your files. This is a commonly employed money extortion scheme and [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/londec-virus-file/">Remove Londec Virus Ransomware (+.Londec File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The goal of a Ransomware cryptovirus like Londec is to make your data inaccessible to you, so that the hackers behind the infection can force you to make a ransom payment to them by telling you this is the only way you can recover your files. This is a commonly employed money extortion scheme and each day thousands of users face the unpleasant consequences of the Ransomware attacks. Londec is nothing but the latest representative of this malicious software family. Our goal here is to inform you about this characteristics and about the things you can do in order to deal with this threat in the best way possible. However, it must be noted that full recovery of all of your data may not always be an option. Keep in mind that Ransomware uses an advanced file-encryption method as a means of making the files in your computer inaccessible &#8211; this file encryption can only be fully removed with the help of the corresponding decryption key. However, this key is held by the hackers who have created the malware. It is this key that you are supposed to pay a ransom for. We must tell you, however, that the ransom payment isn’t really a course of action we’d advise you to take &#8211; you may simply lose your money and still not manage to bring your data back.</span></p>
<h2 id="fighting-the-londec-virus"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Fighting the Londec virus</strong></span></h2>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-5189 size-full" title="Londec Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt="Londec Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="(max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The first thing we advise our readers to do if they face an encryption virus like Londec is to remove the malware. Otherwise, you may not be able to create new files in your machine without them getting locked by the malware. Also, if you connect some external device to your computer, the files in it may get locked up as well, making the matters even worse. This is why it is so important to get rid of the threat before trying to recover your data. The guide below will help you with the quick and effective elimination of the Londec Ransomware &#8211; just follow the steps, or use the recommended anti-malware tool for automatic removal of the infection.</span></p>
<h2 id="what-about-the-londec-file-encryption"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>What about the .Londec file encryption?</strong></span></h2>
<figure id="attachment_5335" aria-describedby="caption-attachment-5335" style="width: 792px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-5335 size-full" title=".Londec File" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/londec.png" alt=".Londec File" width="792" height="547" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/londec.png 792w, https://malwarecomplaints.info/wp-content/uploads/2019/08/londec-300x207.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/londec-768x530.png 768w" sizes="(max-width: 792px) 100vw, 792px" /><figcaption id="caption-attachment-5335" class="wp-caption-text">The ransomware will encrypt your files and add .Londec extension to them</figcaption></figure>
<p><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The issue with most Ransomware encryption-viruses like Londec,<a href="https://malwarecomplaints.info/masok-virus-file/" target="_blank" rel="noopener noreferrer"> Masok</a>, <a href="https://malwarecomplaints.info/prandel-virus-file/" target="_blank" rel="noopener noreferrer">Prandel</a> is that their encryption won’t go away even if the malware gets removed. To restore your files, you will need to try some of the suggested alternative restoration methods available in the second part of our guide. However, unfortunately, we can’t guarantee the success of those methods. They may or may not work and it all depends on the specific case of Ransomware infection. The good news is that those methods won’t cost you anything an you won’t have to pay a ransom in order to try them. One thing you may have forgotten due to panic and stress is checking your other devices for some safe and accessible copies of your files. If you find any such copies, simply copy them back onto your computer after you remove the virus.</span></p>
<h2 id="londec-summary" style="text-align: justify;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Londec SUMMARY:</strong></span></h2>
<table style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Londec</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Londec Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Londec Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="londec-ransomware-removal"><span style="font-family: helvetica, arial, sans-serif;">Londec Ransomware Removal</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-londec"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Londec</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Londec.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Londec , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-londec"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Londec</b></span></h3>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Londec Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-londec-decryption"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Londec Decryption</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Londec Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/londec-virus-file/">Remove Londec Virus Ransomware (+.Londec File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/londec-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</title>
		<link>https://malwarecomplaints.info/brusaf-virus-file/</link>
					<comments>https://malwarecomplaints.info/brusaf-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Tue, 06 Aug 2019 16:20:51 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Brusaf]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Masok]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Zatrov]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5310</guid>

					<description><![CDATA[<p>The Ransomware threats are some of the sneakiest forms of computer malware that you may encounter online. These threats have the ability to apply secret encryption to all of your files and ask you to pay a ransom if you want to decrypt them. Usually, it is very difficult to crack the applied encryption and</p>
<p>The post <a href="https://malwarecomplaints.info/brusaf-virus-file/">Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The Ransomware threats are some of the sneakiest forms of computer malware that you may encounter online. These threats have the ability to apply secret encryption to all of your files and ask you to pay a ransom if you want to decrypt them. Usually, it is very difficult to crack the applied encryption and bring the lokced data back if you do not have the corresponding access key. The following article is dedicated to a newly released Ransomware virus named Brusaf, which is a new representative of this file-encrypting Ransomware sub-category.</span></p>
<h2 id="the-brusaf-virus" style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">The .Brusaf virus</span></h2>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5189 size-full" title=".Brusaf Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt=".Brusaf Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="auto, (max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Our &#8220;How to remove&#8221; team has been contacted with a call for assistance by some of our site visitors, who have had the misfortune of becoming victims of this malicious cryptovirus. And indeed, dealing with Ransomware is usually very hard. Moreover, the consequences of its attack are can be very unpleasant, especially if the encrypted files are of great importance to you. Still, we may be able to offer you some guidelines on how to deal with Brusaf in a fast and reliable manner. In the next lines, there is a manual removal guide created to help all victims of Brusaf to get rid of it. Detecting the Ransomware is really important because, otherwise, you cannot use your computer as a location for storing new data. Nevertheless, eliminating the virus may not automatically reverse the encryption applied to the targeted files. Therefore, for such cases, in the removal guide below, you will find separate instructions in a special file-recovery section, which are published to help the victims potentially get back some of their most valuable files.</span></p>
<h2 id="brusaf-file-encryption-solutions" style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">.Brusaf file encryption solutions</span></h2>
<figure id="attachment_5313" aria-describedby="caption-attachment-5313" style="width: 801px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-5313" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf.png" alt=".Brusaf File" width="801" height="499" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf.png 801w, https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf-300x187.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf-768x478.png 768w" sizes="auto, (max-width: 801px) 100vw, 801px" /><figcaption id="caption-attachment-5313" class="wp-caption-text">The ransomware will encrypt your files and add .Brusaf extension to them.</figcaption></figure>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The most common question we get asked from victims of Ransomware is “What are the options?”. The most obvious one is to pay the ransom, which is exactly what the hackers want you to do. And that will be basically funding their criminal blackmailing scheme. The crooks want the victims to pay them in Bitcoins or some other cryptocurrency, which guarantees their identities will remain anonymous. But if you agree to pay the ransom, then you will be at the mercy of the hackers, which isn&#8217;t ideal for you. The reason is, many victims never receive the decryption solution needed for accessing their files, even after they have carefully completed all ransom payment instructions. And many more obtain a decryption key that is utterly ineffective. Therefore, most security experts do not advise the victims of Ransomware to send their money to the hackers with the hope that the latter will help them.</span></p>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Unfortunately, we must say the other alternatives for coping with the effects of Brusaf, <a href="https://malwarecomplaints.info/masok-virus-file/" target="_blank" rel="noopener noreferrer">Masok</a>, <a href="https://malwarecomplaints.info/prandel-virus-file/" target="_blank" rel="noopener noreferrer">Prandel</a>on your machine aren’t that many. Plus, they may not always be very effective. But, still, they can at least help you save the money you would otherwise lose by paying the ransom. </span><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">You can start by removing the computer virus with the help of the guide below. Then, once you have removed the Ransomware, you can head over to the file-recovery section and give a try to the suggestions there. They may work differently on different systems, or might not work at all in certain cases. Still, there is no way of knowing until you actually try.</span></p>
<h2 id="brusaf-summary" style="text-align: justify;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Brusaf SUMMARY:</strong></span></h2>
<table style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Brusaf</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Brusaf Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Brusaf Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-brusaf-ransomware"><span style="font-family: helvetica, arial, sans-serif;">Remove Brusaf Ransomware</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-brusaf"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Brusaf</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Brusaf.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Brusaf , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-brusaf"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Brusaf</b></span></h3>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Brusaf Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-brusaf-decryption"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Brusaf Decryption</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Brusaf Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/brusaf-virus-file/">Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/brusaf-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Masok Virus Ransomware (+ .Masok File Recovery)</title>
		<link>https://malwarecomplaints.info/masok-virus-file/</link>
					<comments>https://malwarecomplaints.info/masok-virus-file/#comments</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Tue, 06 Aug 2019 09:00:40 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Masok]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Zatrov]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5299</guid>

					<description><![CDATA[<p>About the Masok Virus &#160; The Internet is definitely among the biggest inventions of the human race. With that being said, it could also be something hazardous if you are not observant and cautious enough. One particularly dangerous type of malware which will be the focus of this article is what is known as Ransomware.</p>
<p>The post <a href="https://malwarecomplaints.info/masok-virus-file/">Remove Masok Virus Ransomware (+ .Masok File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="about-the-masok-virus" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">About the Masok Virus</span></h2>
<figure id="attachment_5302" aria-describedby="caption-attachment-5302" style="width: 825px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5302 size-full" title="Masok Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci.jpg" alt="Masok Virus" width="825" height="598" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci.jpg 825w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-800x580.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-300x217.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-768x557.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-810x587.jpg 810w" sizes="auto, (max-width: 825px) 100vw, 825px" /><figcaption id="caption-attachment-5302" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">The Masok Virus will leave a ransom message with instructions in a _readme.txt file</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">The Internet is definitely among the biggest inventions of the human race. With that being said, it could also be something hazardous if you are not observant and cautious enough. One particularly dangerous type of malware which will be the focus of this article is what is known as Ransomware. The reason why this form of PC viruses are called Ransomware has to do with the fact they&#8217;re typically employed for blackmailing the web users into transferring a set amount of money to some anonymous online hackers. The cryptovirus we are going to be putting our emphasis on within the next paragraphs is one that&#8217;s well known for sealing the targeted user&#8217;s personal files by using a highly-advanced encryption code and afterward, demanding a ransom to be paid in exchange for the file-decryption key that can recover the data. The name of this particular virus that we&#8217;re referring to is Masok and in case you&#8217;re among the numerous unlucky victims of this dangerous infection, in the next lines, you will find some vital information that might help you deal with it and a special Masok removal guide.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Ransomware isn&#8217;t like any other malware on the web and operates quite differently than the majority of computer infections. Perhaps that’s the main reason this kind of insidious threats should be blamed for such a big number of hard-to-deal-with issues. Anti-malware programs are, most of the time, ineffective against Ransomware due to the ability of the malware to remain completely hidden. This is possible mostly due to the unique and uncommon behavior and methods, used by the infection. If malware like Masok, <a href="https://malwarecomplaints.info/prandel-virus-file/" target="_blank" rel="noopener noreferrer">Prandel</a>, <a href="https://malwarecomplaints.info/zatrov-virus-file/" target="_blank" rel="noopener noreferrer">Zatrov</a> gets in your system, it will actually not aim to cause any destruction or harm to the computer or the files which are on it. That way, the cryptovirus will not trigger the virus definitions of the anti-virus program that you might have on your PC and will be able to remain unnoticed. The file encryption it uses to render your personal files inaccessible is, actually, a widely used file protection method, that does not damage anything and is usually non-harmful. Its idea is only to lock the target data and secure it with a special decryption key. Nevertheless, since you don’t have the key needed to decrypt your files, you will still be in trouble if they&#8217;ve been locked-up by Masok since you won’t be able to open or use them, even though they may still be stored on your computer.</span></p>
<h2 id="what-to-do-with-masok-files" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">What to do with .masok files?</span></h2>
<figure id="attachment_5304" aria-describedby="caption-attachment-5304" style="width: 936px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5304 size-full" title=".masok files" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci.jpg" alt=".masok files" width="936" height="603" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci.jpg 936w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-800x515.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-300x193.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-768x495.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-810x522.jpg 810w" sizes="auto, (max-width: 936px) 100vw, 936px" /><figcaption id="caption-attachment-5304" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Screenshot of encrypted by .masok files</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">The hackers, who stay behind Masok, will use that against you and will not hesitate to blackmail you in all possible ways in order to make you pay for the decryption key which is typically stored on their servers. The success of the Ransomware blackmailing method relies on the fear of the victims and their desperate attempts to regain access to their files.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">If you want to tackle such a virus attack, however, it is necessary to get well aware of all the alternatives and the risks and try to explore other options instead of acting out of panic and giving the hackers the money they desire. In this way, you will have a chance to remove the nasty virus from your system and even restore some of your files from backups or by other means without risking your hard-earned money.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table class=" alignleft" style="width: 86.0578%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>Masok</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px; width: 66.6729%;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="masok-ransomware-removal" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Masok Ransomware Removal</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-masok" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Masok</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Masok.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Masok , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-masok" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Masok</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Masok Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-masok-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Masok Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Masok Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/masok-virus-file/">Remove Masok Virus Ransomware (+ .Masok File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/masok-virus-file/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Prandel Virus Ransomware (+.Prandel File Recovery)</title>
		<link>https://malwarecomplaints.info/prandel-virus-file/</link>
					<comments>https://malwarecomplaints.info/prandel-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Sun, 04 Aug 2019 09:17:51 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cosakos]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Kovasoh]]></category>
		<category><![CDATA[Lutej]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[removal]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5253</guid>

					<description><![CDATA[<p>An attack from a Ransomware virus on your computer would probably not result in any actual damage to the system or to your online virtual security, but it could definitely lead to severe data loss, especially if you have some important files in your computer that haven’t been backed up properly. Here, we will go</p>
<p>The post <a href="https://malwarecomplaints.info/prandel-virus-file/">Remove Prandel Virus Ransomware (+.Prandel File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">An attack from a Ransomware virus on your computer would probably not result in any actual damage to the system or to your online virtual security, but it could definitely lead to severe data loss, especially if you have some important files in your computer that haven’t been backed up properly. Here, we will go over the most important traits of this type of nasty infections, focusing our attention on one particular piece of Ransomware malware named Prandel. The reason Prandel will be the central topic of this post is because it is one of the latest representatives of the Ransomware cryptovirus family. Many are the users who have had the misfortune or finding out that all of their data has gotten encrypted by this insidious and sneaky piece of malware. Many of the people reading this are likely among those unfortunate users. Hopefully, by the end of this article, those of you who have had their data sealed by this cryptovirus’ encryption will be able to make an informed and rational decision about how to approach this unpleasant situation in order to deal with it in an optimal way, with as few negative consequences as possible.</span></p>
<h2 id="the-prandel-virus-ransom-demands" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>The .Prandel virus ransom demands</strong></span></h2>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5189 size-full" title=".Prandel Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt=".Prandel Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="auto, (max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">Of course, the goal of the hackers behind a threat like Prandel, <a href="https://malwarecomplaints.info/kovasoh-virus-file/" target="_blank" rel="noopener noreferrer">Kovasoh</a>,<a href="https://malwarecomplaints.info/cosakos-virus-file/" target="_blank" rel="noopener noreferrer"><strong>Cosakos</strong></a>, is none other than making money via blackmailing their victims. Since the only surefire method of opening your encrypted files again is through the use of an access key that corresponds to the specific encryption code placed on your data by the Ransomware, the criminals behind the virus use this to harass and blackmail their victims. They offer you the said key in exchange for a money payment that must be made in some cryptocurrency (usually, in BitCoin). Supposedly, the blackmailers would send you the key the moment they receive your money. Needless to say, you can’t really trust the words of hackers like these. Sending them your money may or may not result in the liberation of your files. The only certain thing if you choose to pay the ransom is that the money you send to the online criminals would be gone for good, and there would be no way of refunding it even if you don’t get to unlock your files afterwards.</span></p>
<h2 id="prandel-file-recovery-alternative-options" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>.Prandel file recovery &#8211; alternative options</strong></span></h2>
<figure id="attachment_5256" aria-describedby="caption-attachment-5256" style="width: 800px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5256 size-full" title=".Prandel File" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/prandel.png" alt=".Prandel File" width="800" height="527" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/prandel.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/prandel-300x198.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/prandel-768x506.png 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption id="caption-attachment-5256" class="wp-caption-text">The ransomware will encrypt your files and add .Prandel extension to them.</figcaption></figure>
<p style="text-align: left;"><span style="font-weight: 400; font-size: 10pt; font-family: helvetica, arial, sans-serif;">The biggest problem with Ransomware is that there aren’t really any universal and always-working file-restoration options &#8211; as we already pointed out, not even paying the ransom could guarantee that you will get your files back. Still, this doesn’t mean there’s nothing you can try to bring back your data. However, if you are going for some of the alternative methods of data restoration (or even if you aren’t), you will need to first remove the infection. The good news is that, with the aid of the guide we’ve posted below and the advanced removal tool that you will find linked there, you should be able to eliminate the nasty piece of malware. After that, you are advised to visit the second section of the removal guide, where you will learn about several different techniques you can use in order to get some of your data back.</span></p>
<h2 id="prandel-summary" style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Prandel SUMMARY:</strong></span></h2>
<table class=" alignleft" style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Prandel</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Prandel Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Prandel Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-prandel-ransomware" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Remove Prandel Ransomware </span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-prandel" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Prandel</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Prandel.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Prandel , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-prandel" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Prandel</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Prandel Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-prandel-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Prandel Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Prandel Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/prandel-virus-file/">Remove Prandel Virus Ransomware (+.Prandel File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/prandel-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
