What is Gedantar ransomware? And how does it carry out its attack?

Gedantar ransomware is a new ransomware Trojan and an updated version of the Unlock92 virus which was discovered way back in November 2016. This ransomware was discovered by Karsten Hahn, a security researcher. It most likely targets Russian-speaking users based on its ransom note written in Russian.
This file-encrypting threat aims at popular file types like documents, images, audio, video, archives, databases and other kinds of files. In its encryption process, Gedantar uses the RSA 2048 encryption algorithm and renames files using the pattern, “<filename>_<8-rand-chars>.<ext>”. After it encrypts files, Gedantar ransomware drops its ransom note which is contained in a file named “<20-rand-chars>.jpg” where crooks ask victims to send email to the address, [email protected] or reach out to them via the TOR network. Here’s the full context of the ransom note:
“Ваши файльi были зашифрованы с помощью алгоритма Г5А-2048 Если вы хотите их вернуть то отправьте один из зашифрованных файлов на е-mai1: [email protected]
Если вы не получили ответ в течение суток то скачайте с сайта л.огрго]ес.согл браузер ТОК и с его помощью зайдите на сайт http://n3r2kuzhw2h7x6j5.onion – там будет указан действующий и почтовый ящик.
Попытки самостоятельного восстановления файлов могут безвозвратно их испортить!”
Moreover, Gedantar ransomware also changes the desktop wallpaper where cybercrooks behind this threat display the same threatening message. Nonetheless, paying the ransom is not recommended as these crooks can’t be trusted.
How does Gedantar ransomware proliferate?
At the time of writing, it isn’t clear how Gedantar ransomware proliferates but it most likely does use malicious spam email attachments. Such emails contain obfuscated attachments that could be a document, PDF or ZIP file that when executed, will download and install Gedantar ransomware into the targeted system.
Follow the guidelines provided below to obliterate Gedantar ransomware from your system.
Step 1: The first thing you need to do is to obliterate the process of Gedantar ransomware by opening the Task Manager – simply tap the Ctrl + Shift + Esc keys on your keyboard.
Step 2: After that, click the Processes tab and look for any suspicious-looking process that takes up most of your CPU’s resources and is most likely related to Gedantar ransomware and then end its processes.

Step 3: Now that the malicious process is eliminated, close the Task Manager.
Step 4: Next, tap Win + R, type in appwiz.cpl and click OK or tap Enter to open Control Panel’s list of installed programs.
Step 5: Under the list of installed programs, look for Gedantar ransomware or anything similar and then uninstall it.

Step 6: Then close Control Panel and tap Win + E keys to launch File Explorer.
Step 7: Navigate to the following locations below and look for Gedantar ransomware’s malicious components like Gedantar.exe and <20-rand-chars>.jpg as well as other suspicious files it has created and downloaded into the system and then delete all of them.

  • %TEMP%
  • %WINDIR%\System32\Tasks
  • %APPDATA%\Microsoft\Windows\Templates\
  • %USERPROFILE%\Downloads
  • %USERPROFILE%\Desktop

Step 8: Close the File Explorer.
Before you go on any further, make sure that you are tech savvy enough to the point where you know exactly how to use and navigate your computer’s Registry. Keep in mind that any changes you make will highly impact your computer. To save you the trouble and time, you can just use [product-name] this system tool is proven to be safe and excellent enough that hackers won’t be able to hack into it. But if you can manage Windows Registry well, then, by all means, go on to the next steps.
Step 9: Tap Win + R to open Run and then type in regedit in the field and tap enter to pull up Windows Registry.

Step 10: Navigate to the following path:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background
  • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization
  • HKEY_CURRENT_USER\Control Panel\Desktop\ScreenSaveTimeOut
  • HKEY_CURRENT_USER\Control Panel\Desktop

Step 11: Delete the registry keys and sub-keys created by Gedantar ransomware.
Step12. Close the Registry Editor and empty the Recycle Bin.
After you’ve covered the steps provided above, you need to continue the removal process using a reliable program like [product-name]. How? Follow the advanced removal steps below.
Perform a full system scan using [product-code]. To do so, follow these steps:

  1. Turn on your computer. If it’s already on, you have to reboot
  2. After that, the BIOS screen will be displayed, but if Windows pops up instead, reboot your computer and try again. Once you’re on the BIOS screen, repeat pressing F8, by doing so the Advanced Option shows up.

  1. To navigate the Advanced Option use the arrow keys and select Safe Mode with Networking then hit
  2. Windows will now load the SafeMode with Networking.
  3. Press and hold both R key and Windows key.

  1. If done correctly, the Windows Run Box will show up.
  2. Type in the URL address, [product-url] in the Run dialog box and then tap Enter or click OK.
  3. After that, it will download the program. Wait for the download to finish and then open the launcher to install the program.
  4. Once the installation process is completed, run [product-code] to perform a full system scan.

  1. After the scan is completed click the “Fix, Clean & Optimize Nowbutton.


logo main menu

Copyright © 2023, FixMyPcFree. All Rights Reserved Trademarks: Microsoft Windows logos are registered trademarks of Microsoft. Disclaimer: is not affiliated with Microsoft, nor claim direct affiliation. The information on this page is provided for information purposes only. Protection Status

Log in with your credentials

Forgot your details?