<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Zatrov Archives - Malware Complaints</title>
	<atom:link href="https://malwarecomplaints.info/tag/zatrov/feed/" rel="self" type="application/rss+xml" />
	<link>https://malwarecomplaints.info/tag/zatrov/</link>
	<description>Virus and Malware Removal Guides</description>
	<lastBuildDate>Tue, 06 Aug 2019 16:36:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://malwarecomplaints.info/wp-content/uploads/2020/11/Malware-Complaints-Logo.svg</url>
	<title>Zatrov Archives - Malware Complaints</title>
	<link>https://malwarecomplaints.info/tag/zatrov/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</title>
		<link>https://malwarecomplaints.info/brusaf-virus-file/</link>
					<comments>https://malwarecomplaints.info/brusaf-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Tue, 06 Aug 2019 16:20:51 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Brusaf]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Masok]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Zatrov]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5310</guid>

					<description><![CDATA[<p>The Ransomware threats are some of the sneakiest forms of computer malware that you may encounter online. These threats have the ability to apply secret encryption to all of your files and ask you to pay a ransom if you want to decrypt them. Usually, it is very difficult to crack the applied encryption and [&#8230;]</p>
<p>The post <a href="https://malwarecomplaints.info/brusaf-virus-file/">Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The Ransomware threats are some of the sneakiest forms of computer malware that you may encounter online. These threats have the ability to apply secret encryption to all of your files and ask you to pay a ransom if you want to decrypt them. Usually, it is very difficult to crack the applied encryption and bring the lokced data back if you do not have the corresponding access key. The following article is dedicated to a newly released Ransomware virus named Brusaf, which is a new representative of this file-encrypting Ransomware sub-category.</span></p>
<h2 id="the-brusaf-virus" style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">The .Brusaf virus</span></h2>
<figure id="attachment_5189" aria-describedby="caption-attachment-5189" style="width: 1158px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-5189 size-full" title=".Brusaf Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png" alt=".Brusaf Virus" width="1158" height="691" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1.png 1158w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-800x477.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-300x179.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-768x458.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-1024x611.png 1024w, https://malwarecomplaints.info/wp-content/uploads/2019/07/STOP_DJVU_Ransom_Note_Good_Quality-1-810x483.png 810w" sizes="(max-width: 1158px) 100vw, 1158px" /><figcaption id="caption-attachment-5189" class="wp-caption-text">After the ransomware is done encrypting your files, it will leave a _readme.txt file with instructions.</figcaption></figure>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Our &#8220;How to remove&#8221; team has been contacted with a call for assistance by some of our site visitors, who have had the misfortune of becoming victims of this malicious cryptovirus. And indeed, dealing with Ransomware is usually very hard. Moreover, the consequences of its attack are can be very unpleasant, especially if the encrypted files are of great importance to you. Still, we may be able to offer you some guidelines on how to deal with Brusaf in a fast and reliable manner. In the next lines, there is a manual removal guide created to help all victims of Brusaf to get rid of it. Detecting the Ransomware is really important because, otherwise, you cannot use your computer as a location for storing new data. Nevertheless, eliminating the virus may not automatically reverse the encryption applied to the targeted files. Therefore, for such cases, in the removal guide below, you will find separate instructions in a special file-recovery section, which are published to help the victims potentially get back some of their most valuable files.</span></p>
<h2 id="brusaf-file-encryption-solutions" style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">.Brusaf file encryption solutions</span></h2>
<figure id="attachment_5313" aria-describedby="caption-attachment-5313" style="width: 801px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-5313" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf.png" alt=".Brusaf File" width="801" height="499" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf.png 801w, https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf-300x187.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/brusaf-768x478.png 768w" sizes="(max-width: 801px) 100vw, 801px" /><figcaption id="caption-attachment-5313" class="wp-caption-text">The ransomware will encrypt your files and add .Brusaf extension to them.</figcaption></figure>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The most common question we get asked from victims of Ransomware is “What are the options?”. The most obvious one is to pay the ransom, which is exactly what the hackers want you to do. And that will be basically funding their criminal blackmailing scheme. The crooks want the victims to pay them in Bitcoins or some other cryptocurrency, which guarantees their identities will remain anonymous. But if you agree to pay the ransom, then you will be at the mercy of the hackers, which isn&#8217;t ideal for you. The reason is, many victims never receive the decryption solution needed for accessing their files, even after they have carefully completed all ransom payment instructions. And many more obtain a decryption key that is utterly ineffective. Therefore, most security experts do not advise the victims of Ransomware to send their money to the hackers with the hope that the latter will help them.</span></p>
<p style="text-align: justify;"><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Unfortunately, we must say the other alternatives for coping with the effects of Brusaf, <a href="https://malwarecomplaints.info/masok-virus-file/" target="_blank" rel="noopener noreferrer">Masok</a>, <a href="https://malwarecomplaints.info/prandel-virus-file/" target="_blank" rel="noopener noreferrer">Prandel</a>on your machine aren’t that many. Plus, they may not always be very effective. But, still, they can at least help you save the money you would otherwise lose by paying the ransom. </span><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">You can start by removing the computer virus with the help of the guide below. Then, once you have removed the Ransomware, you can head over to the file-recovery section and give a try to the suggestions there. They may work differently on different systems, or might not work at all in certain cases. Still, there is no way of knowing until you actually try.</span></p>
<h2 id="brusaf-summary" style="text-align: justify;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>Brusaf SUMMARY:</strong></span></h2>
<table style="width: 99.4005%; height: 144px;">
<tbody>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="width: 89.5739%; height: 24px;"><strong>Brusaf</strong></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"><i>Ransomware</i></span></td>
</tr>
<tr style="height: 24px;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;"> <span style="color: #ff0000;">High </span><span style="color: #000000;">(Brusaf Ransomware encrypts all types of files)</span></span></td>
</tr>
<tr style="background: #fcfcfc;">
<td style="vertical-align: middle; width: 9.70082%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="width: 89.5739%; height: 24px;"><span style="font-family: helvetica, arial, sans-serif;">Brusaf Ransomware is hard to detect and aside from increased use of RAM and CPU, there would barely be any other visible red flags.</span></td>
</tr>
<tr style="height: 48px;">
<td style="vertical-align: middle; width: 9.70082%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="width: 89.5739%; height: 48px;"><span style="font-family: helvetica, arial, sans-serif;"> Most of the time, Trojans get distributed through spam e-mails and social network messages, malicious ads, shady and pirated downloads, questionable torrents and other similar methods.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="remove-brusaf-ransomware"><span style="font-family: helvetica, arial, sans-serif;">Remove Brusaf Ransomware</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-brusaf"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Brusaf</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Brusaf.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Brusaf , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-brusaf"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Brusaf</b></span></h3>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Brusaf Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-brusaf-decryption"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Brusaf Decryption</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Brusaf Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/brusaf-virus-file/">Remove Brusaf Virus Ransomware (+.Brusaf File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/brusaf-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Masok Virus Ransomware (+ .Masok File Recovery)</title>
		<link>https://malwarecomplaints.info/masok-virus-file/</link>
					<comments>https://malwarecomplaints.info/masok-virus-file/#comments</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Tue, 06 Aug 2019 09:00:40 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[Masok]]></category>
		<category><![CDATA[Prandel]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[remove]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Zatrov]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5299</guid>

					<description><![CDATA[<p>About the Masok Virus &#160; The Internet is definitely among the biggest inventions of the human race. With that being said, it could also be something hazardous if you are not observant and cautious enough. One particularly dangerous type of malware which will be the focus of this article is what is known as Ransomware.</p>
<p>The post <a href="https://malwarecomplaints.info/masok-virus-file/">Remove Masok Virus Ransomware (+ .Masok File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="about-the-masok-virus" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">About the Masok Virus</span></h2>
<figure id="attachment_5302" aria-describedby="caption-attachment-5302" style="width: 825px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5302 size-full" title="Masok Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci.jpg" alt="Masok Virus" width="825" height="598" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci.jpg 825w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-800x580.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-300x217.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-768x557.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-masok-virus-mci-810x587.jpg 810w" sizes="auto, (max-width: 825px) 100vw, 825px" /><figcaption id="caption-attachment-5302" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">The Masok Virus will leave a ransom message with instructions in a _readme.txt file</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">The Internet is definitely among the biggest inventions of the human race. With that being said, it could also be something hazardous if you are not observant and cautious enough. One particularly dangerous type of malware which will be the focus of this article is what is known as Ransomware. The reason why this form of PC viruses are called Ransomware has to do with the fact they&#8217;re typically employed for blackmailing the web users into transferring a set amount of money to some anonymous online hackers. The cryptovirus we are going to be putting our emphasis on within the next paragraphs is one that&#8217;s well known for sealing the targeted user&#8217;s personal files by using a highly-advanced encryption code and afterward, demanding a ransom to be paid in exchange for the file-decryption key that can recover the data. The name of this particular virus that we&#8217;re referring to is Masok and in case you&#8217;re among the numerous unlucky victims of this dangerous infection, in the next lines, you will find some vital information that might help you deal with it and a special Masok removal guide.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Ransomware isn&#8217;t like any other malware on the web and operates quite differently than the majority of computer infections. Perhaps that’s the main reason this kind of insidious threats should be blamed for such a big number of hard-to-deal-with issues. Anti-malware programs are, most of the time, ineffective against Ransomware due to the ability of the malware to remain completely hidden. This is possible mostly due to the unique and uncommon behavior and methods, used by the infection. If malware like Masok, <a href="https://malwarecomplaints.info/prandel-virus-file/" target="_blank" rel="noopener noreferrer">Prandel</a>, <a href="https://malwarecomplaints.info/zatrov-virus-file/" target="_blank" rel="noopener noreferrer">Zatrov</a> gets in your system, it will actually not aim to cause any destruction or harm to the computer or the files which are on it. That way, the cryptovirus will not trigger the virus definitions of the anti-virus program that you might have on your PC and will be able to remain unnoticed. The file encryption it uses to render your personal files inaccessible is, actually, a widely used file protection method, that does not damage anything and is usually non-harmful. Its idea is only to lock the target data and secure it with a special decryption key. Nevertheless, since you don’t have the key needed to decrypt your files, you will still be in trouble if they&#8217;ve been locked-up by Masok since you won’t be able to open or use them, even though they may still be stored on your computer.</span></p>
<h2 id="what-to-do-with-masok-files" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">What to do with .masok files?</span></h2>
<figure id="attachment_5304" aria-describedby="caption-attachment-5304" style="width: 936px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5304 size-full" title=".masok files" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci.jpg" alt=".masok files" width="936" height="603" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci.jpg 936w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-800x515.jpg 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-300x193.jpg 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-768x495.jpg 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/remove-.masok-files-mci-810x522.jpg 810w" sizes="auto, (max-width: 936px) 100vw, 936px" /><figcaption id="caption-attachment-5304" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">Screenshot of encrypted by .masok files</span></figcaption></figure>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">The hackers, who stay behind Masok, will use that against you and will not hesitate to blackmail you in all possible ways in order to make you pay for the decryption key which is typically stored on their servers. The success of the Ransomware blackmailing method relies on the fear of the victims and their desperate attempts to regain access to their files.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">If you want to tackle such a virus attack, however, it is necessary to get well aware of all the alternatives and the risks and try to explore other options instead of acting out of panic and giving the hackers the money they desire. In this way, you will have a chance to remove the nasty virus from your system and even restore some of your files from backups or by other means without risking your hard-earned money.</span></p>
<p style="text-align: left;"><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table class=" alignleft" style="width: 86.0578%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>Masok</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px; width: 66.6729%;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px; width: 18.9203%;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px; width: 66.6729%;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="masok-ransomware-removal" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Masok Ransomware Removal</span></h2>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-masok" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Masok</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Masok.</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Masok , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-masok" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Masok</b></span></h3>
<p style="text-align: left;"><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Masok Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-masok-decryption" style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Masok Decryption</b></span></h3>
<p style="text-align: left;"><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Masok Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR" style="text-align: left;"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/masok-virus-file/">Remove Masok Virus Ransomware (+ .Masok File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/masok-virus-file/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Remove Zatrov Virus Ransomware (+ .Zatrov File Recovery)</title>
		<link>https://malwarecomplaints.info/zatrov-virus-file/</link>
					<comments>https://malwarecomplaints.info/zatrov-virus-file/#respond</comments>
		
		<dc:creator><![CDATA[Daniel Sadakov]]></dc:creator>
		<pubDate>Mon, 05 Aug 2019 19:11:05 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[.Adame]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[file encryption]]></category>
		<category><![CDATA[file recovery]]></category>
		<category><![CDATA[how to remove]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[removal]]></category>
		<category><![CDATA[STOP ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Zatrov]]></category>
		<guid isPermaLink="false">https://malwarecomplaints.info/?p=5288</guid>

					<description><![CDATA[<p>The Ransomware cryptoviruses are amongst the most difficult type of malicious code that you may face. The secret encryptions they are capable of applying to all of your files are generally very challenging to reverse. What’s more, the criminals create Ransomware infections that are more sophisticated than ever before. The following article is focused on</p>
<p>The post <a href="https://malwarecomplaints.info/zatrov-virus-file/">Remove Zatrov Virus Ransomware (+ .Zatrov File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">The Ransomware cryptoviruses are amongst the most difficult type of malicious code that you may face. The secret encryptions they are capable of applying to all of your files are generally very challenging to reverse. What’s more, the criminals create Ransomware infections that are more sophisticated than ever before. The following article is focused on one newly released Ransomware virus known as Zatrov.  This threat is part of the file-encrypting sub-category and can secretly encrypt a variety of file types and ask for a ransom to be paid in exchange for their decryption. Removing such a Ransomware is usually extremely difficult, and the effects of its attack are quite serious. Still, if you stay with us, we may be able to offer you some guidelines on how to deal with Zatrov. In the next lines, you will find a step-by-step removal guide created to help all regular web users get rid of the malware. Detecting it is very important so it cannot cause any further damage. However, eliminating the virus alone is not going to automatically reverse the encryption of the affected files. Therefore, we have integrated separate instructions within the same removal guide with the intentions to help the victims of Zatrov  get some of their most valuable files back.</span></p>
<h2 id="the-specifics-of-the-zatrov-virus"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">The specifics of the .Zatrov virus</span></h2>
<figure id="attachment_5292" aria-describedby="caption-attachment-5292" style="width: 1023px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5292 size-full" title=".Zatrov Virus" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus.png" alt=".Zatrov Virus" width="1023" height="537" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus.png 1023w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus-800x420.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus-300x157.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus-768x403.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-Virus-810x425.png 810w" sizes="auto, (max-width: 1023px) 100vw, 1023px" /><figcaption id="caption-attachment-5292" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">The .Zatrov Virus will display this message holding instructions.</span></figcaption></figure>
<p><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Ransomware infections, unlike pretty much any other malware type, can function right under the nose of most antivirus software. Ironically, antivirus programs typically do not consider the process of file encryption as malicious, and that is because it essentially is not. So, even if a person has a powerful anti-malware tool installed on their computer, the software may not notify them about the presence of the infection. This is one of the reasons why destructive malware of this type is so successful in its attacks. And that’s also one of the main reasons why it’s so dangerous – there is extremely little chance that you would be able to detect and remove a Ransomware virus just before it completes its file-encryption task. In addition to that, the encryption itself is quite sophisticated and usually cannot be reversed without the help of a special decryption key. And as a result, cracking the code used by the cyber criminals most times may prove impossible.</span></p>
<h2 id="how-can-you-reverse-the-zatrov-file-encryption"><span style="font-family: helvetica, arial, sans-serif; font-size: 14pt;">How can you reverse the .Zatrov file encryption?</span></h2>
<figure id="attachment_5293" aria-describedby="caption-attachment-5293" style="width: 816px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-5293 size-full" title=".Zatrov File" src="https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File.png" alt=".Zatrov File" width="816" height="522" srcset="https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File.png 816w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File-800x512.png 800w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File-300x192.png 300w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File-768x491.png 768w, https://malwarecomplaints.info/wp-content/uploads/2019/08/zatrov-File-810x518.png 810w" sizes="auto, (max-width: 816px) 100vw, 816px" /><figcaption id="caption-attachment-5293" class="wp-caption-text"><span style="font-family: helvetica, arial, sans-serif;">A screenshot of an encrypted .Zatrov files.</span></figcaption></figure>
<p><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">There aren’t many options to deal with a Ransomware cryptovirus such as <a href="https://malwarecomplaints.info/adame-virus-file/" target="_blank" rel="noopener noreferrer">Adame</a> or <a href="https://malwarecomplaints.info/kovasoh-virus-file/" target="_blank" rel="noopener noreferrer">Kovasoh</a>. Yet, one of the very first is usually to pay the ransom, which is exactly what the cyber criminals want you to perform. Such a course of action, however, is basically funding their criminal scheme. Furthermore, there is no guarantee that once you give your money to the hackers they will really help you recover your encrypted files. In fact, many victims never receive the decryption solution they were guaranteed by the crooks, even after they paid. And many more obtain a decryption key that is absolutely ineffective in reversing the encryption.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif; font-size: 10pt;">Thus, we believe that paying the ransom is not advisable at all and should be considered only as a last-resort option. It is much better to take some time and research some legitimate alternatives to remove Zatrov and recover your data without giving your money to the criminals. That’s why we suggest you to start with the instructions in the removal guide below and give a try to the free file-recovery methods, mentioned there.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt; font-family: helvetica, arial, sans-serif;"><strong>SUMMARY:</strong></span></p>
<table style="width: 100%;">
<tbody>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Name</span></td>
<td style="height: 21px;"><span style="text-decoration: underline; font-family: helvetica, arial, sans-serif;"><strong>Zatrov</strong></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Type</span></td>
<td style="height: 21px;"><em><span style="font-family: helvetica, arial, sans-serif;">Ransomware</span></em></td>
</tr>
<tr style="height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Danger Level</span></td>
<td style="height: 21px;"><span style="font-family: helvetica, arial, sans-serif;"><span style="color: #cd3028;">High </span><span style="color: #000000;">(Ransomware is by far the worst threat you can encounter)</span></span></td>
</tr>
<tr style="background: #fcfcfc; height: 21px;">
<td style="vertical-align: middle; height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Symptoms</span></td>
<td style="height: 21px;"><span style="font-family: helvetica, arial, sans-serif;">Very few and unnoticeable ones before the ransom notification comes up.</span></td>
</tr>
<tr style="height: 21.4827px;">
<td style="vertical-align: middle; height: 21.4827px;"><span style="font-family: helvetica, arial, sans-serif;">Distribution Method</span></td>
<td style="height: 21.4827px;"><span style="font-family: helvetica, arial, sans-serif;">From fake ads and fake system requests to spam emails and contagious web pages.</span></td>
</tr>
</tbody>
</table>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_third_banner]</span></p>
<h2 id="zatrov-ransomware-removal"><span style="font-family: helvetica, arial, sans-serif;">.Zatrov Ransomware Removal</span></h2>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>1: Preparations</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">Note: Before you go any further, we advise you to bookmark this page or have it open on a separate device such as your smartphone or another PC. Some of the steps might require you to exit your browser on this PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>2: Task Manager</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press Ctrl + Shift + Esc to enter the Task Manager. Go to the Tab labeled Processes (Details for Win 8/10). </span>Carefully look through the list of processes that are currently active on you PC.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If any of them seems shady, consumes too much RAM/CPU or has some strange description or no description at all, right-click on it, select </span><b>Open File Location </b><span style="font-weight: 400;">and delete everything there.<br />
<img loading="lazy" decoding="async" class="alignnone size-full wp-image-94" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png" alt="" width="666" height="594" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10.png 666w, https://malwarecomplaints.info/wp-content/uploads/2017/01/task-manager-win-10-300x268.png 300w" sizes="auto, (max-width: 666px) 100vw, 666px" /><br />
</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Also, even if you do not delete the files, be sure to stop the process by right-clicking on it and selecting </span><b>End Process</b><span style="font-weight: 400;">.</span></span></p>
<h3 id="3-ip-related-to-zatrov"><span style="font-family: helvetica, arial, sans-serif;"><b>3: IP related to Zatrov</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Go to c:\windows\system32\drivers\etc\hosts</span><span style="font-weight: 400;">. Open the hosts file with notepad.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Find where it says </span><b>Localhost </b><span style="font-weight: 400;">and take a look below that. </span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignnone wp-image-3349 size-full" title="Hosts file" src="https://howtoremove.guide/wp-content/uploads/2015/07/hosts_opt-1.png" alt="hosts_opt (1)" width="350" height="185" /></span></span></p>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;">If you see any IP addresses there (below Localhost) send them to us here, in the comments since they might be coming from the Zatrov.</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">[add_forth_banner]</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>4: Disable Startup programs</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Re-open the </span><b>Start Menu </b><span style="font-weight: 400;">and type </span><b>msconfig</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Click on the first search result. </span><span style="font-weight: 400;">In the next window, go to the </span><b>Startup </b><span style="font-weight: 400;">tab. If you are on Win 10,  it will send you to the Startup part of the task manager instead, as in the picture:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-95" src="http://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png" alt="" width="575" height="388" srcset="https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig.png 575w, https://malwarecomplaints.info/wp-content/uploads/2017/01/msconfig-300x202.png 300w" sizes="auto, (max-width: 575px) 100vw, 575px" /></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">If you see any sketchy/shady looking entries in the list with an unknown manufacturer or a manufacturer name that looks suspicious as there could be a link between them and Zatrov , disable those programs and select </span><b>OK</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><b>5: Registry Editor</b></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Press </span><b>Windows key + R </b><span style="font-weight: 400;">and in the resulting window type </span><b>regedit</b><span style="font-weight: 400;">.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Now, press </span><b>Ctrl + F </b><span style="font-weight: 400;">and type the name of the virus.</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything that gets found. </span>If you are not sure about whether to delete something, do not hesitate to ask us in the comments. Keep in mind that if you delete the wrong thing, you might cause all sorts of issues to your PC.</span></p>
<h3 id="6-deleting-potentially-malicious-data-zatrov"><span style="font-family: helvetica, arial, sans-serif;"><b>6: Deleting potentially malicious data &#8211; Zatrov</b></span></h3>
<p><span style="font-weight: 400; font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Type each of the following locations in the Windows search box and hit enter to open the locations:</span></span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%AppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%LocalAppData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%ProgramData%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%WinDir%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;">%Temp%</span></p>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">Delete everything you see in </span><b>Temp </b>linked to Zatrov Ransomware<span style="font-weight: 400;">. </span><span style="font-weight: 400;">About the other folders, sort their contents by date and delete only the most recent entries. As always, if you are not sure about something, write to us in the comment section.</span></span></p>
<h3 id="7-zatrov-decryption"><span style="font-family: helvetica, arial, sans-serif;"><b>7: Zatrov Decryption</b></span></h3>
<p><span style="font-family: helvetica, arial, sans-serif;"><span style="font-weight: 400;">The previous steps were all aimed at removing the Zatrov Ransomware from your PC. However, in order to regain access to your files, you will also need to decrypt them or restore them. For that, we have a separate article with detailed instructions on what you have to do in order to unlock your data. <a href="http://malwarecomplaints.info/ransomware-decryption-guide/">Here is a </a></span><a href="http://malwarecomplaints.info/ransomware-decryption-guide/"><span style="font-weight: 400;">link</span></a><span style="font-weight: 400;"> to that guide.</span></span></p>
<div id="for-windows-98-xp-and-7" dir="LTR" style="text-align: justify;">
<div id="for-windows-8-and-8-1" dir="LTR"></div>
</div>
<p>The post <a href="https://malwarecomplaints.info/zatrov-virus-file/">Remove Zatrov Virus Ransomware (+ .Zatrov File Recovery)</a> appeared first on <a href="https://malwarecomplaints.info">Malware Complaints</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://malwarecomplaints.info/zatrov-virus-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
