What is TorrentLocker:
Threat Classification: Ransomware
TorrentLocker is a ransomware trojan, which targets computers running Windows operating system. The TorrentLocker Ransomware was first seen in August 2014 in Australia. The infection might come from various sources – infected files from various file sharing applications or email attachments even external USB drives. Once TorrentLocker infects the system, it encrypts almost all important files and folders using Rijndael algorithm (symmetric cipher). The malware then sends a ransom message which informs the victim that their files have been encrypted by the “CryptoLocker virus,” and the ransom page.
The TorrentLocker is said to borrow features from both the infamous CryptoLocker ransomware, as well as CryptoWall. Despite being a derivative of these malware programs, the security researchers who discovered and analyzed it – iSIGHT Partners – are referring to it as an entirely new strain, which is a bad news.
The malware then displays a “ransom message”, which actually tries to convince you that these guys are making you a big favor by selling you the decryption software. The payment is the real interesting part of this plot – it should be made through Bitcoins, which is untraceable payment method (of course), but you should send 500 Australian Dollars, which is something like 465 USD, of course if you don’t do this till 72 hours – they will ask you for a 1000 Australian Dollars!
There are two ways to remove this infection. It is totally up to you to decide which way you want to go:
1. Automatic Removal Method (recommended for regular or novice users) using a Professional Malware Removal Software.
2. Manual Removal (recommended for PC Experts or Enthusiasts).
Automatic TorrentLocker Removal:
We recommend using SpyHunter Malware Security Suite.
You can download and install SpyHunter to detect TorrentLocker and remove it, by clicking the button below. Once installed, SpyHunter will automatically scan and detect all threats present on your system, but in order to use it as a removal tool, you need to purchase a subscription.
SpyHunter will automatically scan and detect all threats present on your system.
Learn more about SpyHunter (EULA). You can find Install Instructions here: (LINK) SpyHunter`s free diagnosis offers free scans and detection. You can remove the detected files, processes and registry entries manually, by yourself, or to purchase the full version to perform an automatic removal and also to receive free professional help with any malware related queries by their technical support department.
Manual TorrentLocker Removal:
!!! Please note: You can remove TorrentLocker manually. However, you should proceed at your own risk. Any of these interventions might render your system inoperable. Therefore this manual removal method is highly recommended for PC Experts or Enthusiasts. For regular users, MalwareKillers.com recommends using SpyHunter or any other reputable security application.
1. Remove TorrentLocker by restoring your system to a previous state.
1. Reboot your computer into Safe Mode with Command Prompt. To do this, turn your computer off and then back on and immediately when you see anything on the screen, start tapping the F8 key on your keyboard.
***For Windows 8:
If you are using Windows 8, you need to hold the Shift button and tap the F8 key repeatedly, this should boot you into the new advanced “recovery mode”, where you can choose the advanced repair options to show up. On the next screen, you will need to click on the Troubleshoot option, then select Advanced Options and select Windows Startup Settings. Click on the Restart button, and you should now be able to see the Advanced Boot Options screen.
2. Using the arrow keys on your keyboard, select the option “Safe Mode with Command Prompt” and press Enter on your keyboard.
3. When the command prompt loads up, type:
Windows XP: C:\windows\system32\restore\rstrui.exe and press Enter
Windows Vista/7/8: C:\windows\system32\rstrui.exe and press Enter
4. System Restore should initialize, and you will be displayed a list of restore points. Try using a restore point created just before the date and time before the Your-computer-has-been-locked virus has infected your computer.
When System Restore has completed its task, start your computer in Windows normal mode, you would need to perform a scan with anti-spyware software as the infection might still be on the system.