Have you let L0cked Ransomware into your Windows operating system? If you have, most likely, you were tricked into doing that. Was the infection launched after you opened a corrupted spam email attachment that was meant to open a harmless document? This is the method of distribution that most ransomware creators employ, and such threats as Avcrypt Ransomware, BlackRuby-2 Ransomware, or Scammerlocker Ransomware are also likely to be spread in the same manner. Once the infections are in, they can do real damage. In most cases, ransomware threats encrypt files to push the victims into paying ransoms for alleged decryptors. Then there are ransomware infections that wipe data without providing the victim with any solution. The infection we are discussing in this report does not belong to either of these groups because it does not encrypt files in the first place. Is it possible that it will be upgraded in the future? That is very possible, but, right now, the only thing it can do is expose users to intimidating ransom demands. If you want to learn more about this, as well as how to delete L0cked Ransomware, keep reading.
Do you have 250 USD to spare? That is how much the creator of the devious L0cked Ransomware wants you to pay. The ransom is introduced to the victims via a window that is launched by the ransomware. On the left side of the window, the sum of the ransom is shown along with a timer and links to pages that explain what Bitcoins are and how to purchase them. Bitcoin is a virtual cryptocurrency that is often used by malware creators for anonymous money transactions. If you choose to obey the demands, you would have to purchase 250 USD-worth of Bitcoins and then transfer them to a unique wallet that was set up by the creator of L0cked Ransomware. Why would you pay the ransom? That is because it is the only option that you are offered and because free tools that would decrypt files do not exist. Some users jump to paying the ransom because they are intimidated. Of course, before you make any rash decisions, you need to check if your files were encrypted (they should have the “.lckd” extension appended to their names). If files are not encrypted, you need to remove the ransomware as soon as possible. Note that if you postpone the removal of this threat, you could face other security issues.
The only additional file that L0cked Ransomware seems to create is called “BK.jpg,” and you should find it in the %PUBLIC%\Pictures\ folder. This image file automatically replaces your Desktop background image to introduce you to an email address that belongs to the creator of the threat, email@example.com. Is it a good idea for you to email cyber criminals? Of course, it is not because they can record your address to send spam in the future. Also, they could expose you to other malicious infections. For example, if you pay the ransom as told, and then you email cyber criminals to inform them about it, they could send you a malicious file disguised as a file decryptor. Most likely, however, you would not hear from them after you paid the ransom. You would not get your files decrypted either. This is a very real risk you need to think about if you choose to pay the ransom. Note that even if you get your files back – which is unlikely to happen – you still need to remove L0cked Ransomware.
Whether or not you can remove L0cked Ransomware depends on whether or not you can find and erase the .exe file that belongs to this threat. The name of this file can be random, and its location is hard to predict also. Of course, the most logical locations of recently downloaded files are the Desktop, the Downloads folder, or the %TEMP% directory, but we cannot guarantee that you will be able to locate it here. If deleting L0cked Ransomware manually proves to be difficult, a reliable anti-malware program can be extremely helpful. First of all, it will scan the system and automatically remove every single threat, and who knows how many of those exist on your system. Second, it will protect your operating system from malware invasion in the future. If your system is protected reliably, and your personal files are backed up, you will not need to worry about malware again.