Malware may reinstall itself multiple times if you don't delete its core files. This may require tracking down dozens of files in different locations.
We recommend downloading Restoro to eradicate Malware for you (it should cut down the time to about 15 minutes).
What is MedusaLocker ransomware? And how does it carry out its attack?
MedusaLocker ransomware is a malicious program that can harm the important data in a computer, leaving them inaccessible to users. This nasty ransomware threat adds a “.encrypted” suffix to each file it encrypts. The instant its malicious payload reaches the targeted computer, it establishes a connection to its remote Command and Control server. It then begins to execute its attack by gathering information about the system. The information gathered is sent to the C&C server. From there, it downloads more malicious files that aid it in executing its attack. These malicious files are used to avoid detection from any AV program.
Additionally, MedusaLocker ransomware also alters the Windows Registry so it can achieve persistence. After that, it starts the encryption process by employing the AES cipher in locking its targeted files. Once the encryption is completed, you will notice that most of your files have the .encrypted extension. This means that files with this extension is encrypted and can’t be accessed. You will find more information about the attack once MedusaLocker ransomware releases the file named “HOW_TO_RECOVER_DATA.html” which contains the following content:
“All your data are encrypted!
Your files are encrypted, and currently unavailable.
You can check it: all files on you computer has new expansion.
By the way, everything is possible to recover (restore), but you need to buy a unique decryptor.
Otherwise, you never cant return your data.
For purchasing a decryptor contact us by email:
If you will get no answer within 24 hours contact us by our alternate emails:
Its just a business. If we do not do our work and liabilities – nobody will not cooperate with us.
To verify the possibility of the recovery of your files we can decrypted 1 file for free.
Attach 1 file to the letter (no more than 10Mb). Indicate your personal ID on the letter:
– Attempts of change files by yourself will result in a loose of data.
– Our e-mail can be blocked over time. Write now, loss of contact with us will result in a loose of data.
– Use any third party software for restoring your data or antivirus solutions will result in a loose of data.
– Decryptors of other users are unique and will not fit your files and use of those will result in a loose of data.
– If you will not cooperate with our service – for us, its does not matter. But you will lose your time and data, cause just we have the private key.”
How does MedusaLocker ransomware spread online?
The malicious payload of MedusaLocker ransomware may be distributed via spam emails. Cyber criminals, particularly ransomware developers often use this distribution method where they attach an infected file to emails. As soon as users open the infected file, it will install MedusaLocker ransomware into the system right away. This is why you must be careful in opening emails and downloading their attached files as it could be a malicious payload of some dangerous threats like MedusaLocker ransomware.
Wipe out MedusaLocker ransomware from your infected computer with the help of the following removal guide.
Step 1: First, tap the Ctrl + Shift + Esc keys in your keyboard to open the Task Manager.
Step 2: After opening the Task Manager, go to the Processes tab and look for any suspicious-looking process that takes up most of your CPU’s resources and is most likely related to MedusaLocker ransomware.
Step 3: After that, close the Task Manager.
Step 4: Tap Win + R, type in appwiz.cpl and click OK or tap Enter to open Programs and Features under Control Panel.
Step 5: Under the list of installed programs, look for MedusaLocker ransomware or anything similar and then uninstall it.
Step 6: Next, close Control Panel and tap Win + E keys to launch File Explorer.
Step 7: Navigate to the following locations below and look for the malicious payload of MedusaLocker ransomware such as “HOW_TO_RECOVER_DATA.html” and [random].exe and other suspicious files, then delete all of them.
Step 8: Close the File Explorer.
Before you proceed to the next steps below, make sure that you are tech-savvy enough to the point where you know exactly how to use and navigate your computer’s Registry. Keep in mind that any changes you make will highly impact your computer. To save you the trouble and time, you can just use Restoro, this system tool is proven to be safe and excellent enough that hackers won’t be able to hack into it. But if you can manage Windows Registry well, then, by all means, go on to the next steps.
Step 9: Tap Win + R to open Run and then type in regedit in the field and tap enter to pull up Windows Registry.
Step 10: Navigate to the following path:
- HKEY_CURRENT_USER\Control Panel\Desktop\
- HKEY_USERS\.DEFAULT\Control Panel\Desktop\
Step 11: Delete the registry keys and sub-keys created by MedusaLocker ransomware.
Step 12: Close the Registry Editor and empty the Recycle Bin.
Try to recover your encrypted files using the options given below.
You can restore the files encrypted by MedusaLocker ransomware by downloading this free decrypter. On the other hand, you can also use another alternative method to recover them using the Previous Versions feature in Windows but keep in mind that this method will only work if the ransomware threat hasn’t deleted the shadow volume copies of your files.
To restore the encrypted file using Previous Versions, right-click on it and select Properties, a new window will pop-up, then proceed to Previous Versions. It will load the file’s previous version before it was modified. After it loads, select any of the previous versions displayed on the list like the one in the illustration below. And then click the Restore button.
Complete the removal process of MedusaLocker ransomware by using a trusted and reliable program like Restoro. Refer to the following guidelines on how to use it.
Perform a full system scan using asr. To do so, follow these steps:
- Turn on your computer. If it’s already on, you have to reboot it.
- After that, the BIOS screen will be displayed, but if Windows pops up instead, reboot your computer and try again. Once you’re on the BIOS screen, repeat pressing F8, by doing so the Advanced Option shows up.
- To navigate the Advanced Option use the arrow keys and select Safe Mode with Networking then hit
- Windows will now load the Safe Mode with Networking.
- Press and hold both R key and Windows key.
- If done correctly, the Windows Run Box will show up.
- Type in the URL address, https://www.fixmypcfree.com/download.php?asr in the Run dialog box and then tap Enter or click OK.
- After that, it will download the program. Wait for the download to finish and then open the launcher to install the program.
- Once the installation process is completed, run asr to perform a full system scan.
- After the scan is completed click the “Fix, Clean & Optimize Now” button.