{"id":5868,"date":"2020-09-02T14:27:38","date_gmt":"2020-09-02T14:27:38","guid":{"rendered":"https:\/\/www.fileinspect.com\/blog\/?p=5868"},"modified":"2020-09-02T14:27:38","modified_gmt":"2020-09-02T14:27:38","slug":"remove-picovirus-ransomware","status":"publish","type":"post","link":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/","title":{"rendered":"How to remove PicoVirus ransomware and to fix the harm it has done?"},"content":{"rendered":"<p>PicoVirus is a ransomware threat wreaking havoc over the internet. Originally known as Pico Ransomware v1.0, PicoVirus is one of the most lethal and dreaded malware entities capable of damaging your computer system to a point where it\u2019s completely useless. This file-encoding malware sneaks into your computer without your knowledge, locking all your crucial files, like images, documents, and videos, and they can only be decrypted by its creators after paying the specified ransom.<\/p>\n<p>This dangerous crypto virus has been causing a lot of damage and loss to thousands of innocent computer users. That\u2019s why we prepared a post explaining what PicoVirus is, what it does, and how to remove it from your PC.<\/p>\n<p>The PicoVirus ransomware is just one of the dozens of ransomware entities developed by hackers for extortion purposes. Although they are developed by different cybercriminals, they share a common agenda \u2013 to encrypt a victim\u2019s data and demand a ransom. The amounts required may vary, and different encryption algorithms are used.<\/p>\n<p>What makes ransomware entities so dangerous is that they use sophisticated algorithms, like RSA, to generate unique decryption keys. This makes it impossible to manually decrypt the affected files.<\/p>\n<h2>What Does PicoVirus Do in Windows 10?<\/h2>\n<p>The main purpose of the PicoVirus ransomware is to extort money from victims. Hence, it&#8217;s designed to scan for specific files that are likely to store valuable information. It takes control of these files and blackmails the victims.<\/p>\n<p>Once PicoVirus infiltrates your computer, it encrypts most of your stored data by using a sophisticated cryptographic algorithm, making your files inaccessible. This nasty threat then renames all of the compromised files and appends the \u201c.pico\u201d extension to each filename. For example, the filename \u201csample.ppt\u201d is renamed to \u201csample.ppt.pico\u201d.<\/p>\n<p>When the PicoVirus ransomware first gets into your machine, it modifies your default registry entries and gets activated every time you reboot Windows. It then performs a deep scan of all the folders on your PC, looking for specific data that is included in its target list. Once it identifies such files, it locks them and makes them virtually impossible to restore.<\/p>\n<p>Immediately after encryption, PicoVirus creates a ransom note titled README.txt on your system\u2019s local drives. The note informs you that all your data has been encrypted and in order to unlock it, you need to pay a ransom of $100 in the form of Bitcoin or Ether. The note goes on to threaten you that failure to meet the hackers\u2019 demands will lead to the automatic deletion of all your data. Here\u2019s how the ransom note is presented:<\/p>\n<p><i>[\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014]<\/i><\/p>\n<p><i>Pico Ransomware v1.0<\/i><\/p>\n<p><i>Your files was encrypted. To decrypt your files,<\/i><\/p>\n<p><i>follow next steps:<\/i><\/p>\n<ol>\n<li><i>Send $100 to one of these wallets:<\/i><\/li>\n<\/ol>\n<p><i>BTC: 3QK9umWMV1nrn8nadZ9eGnJ76Bg4jiJLem<\/i><\/p>\n<p><i>ETH: 0xBb171CC7113dbdc532C42D22928f6b6c56fBE242<\/i><\/p>\n<ol start=\"2\">\n<li><i>Send your TXID and your MachineID to mail<\/i><\/li>\n<\/ol>\n<p><i>E-Mail: de.picocode@gmail.com<\/i><\/p>\n<p><i>MactineID:<\/i><\/p>\n<p><i>[\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014]<\/i><\/p>\n<p><i>Do not waste your time, files can only be<\/i><\/p>\n<p><i>decrypted by our decode tool.<\/i><\/p>\n<p>According to the data recovery instructions in the ransom note, the only way to restore your files is through a decryption key, which is unique to each system and which will be sent to you after paying the ransom. As you can see, the hackers have provided contact details for you to get in touch with them.<\/p>\n<p>The PicoVirus ransomware can also corrupt your backup files, especially if they are stored on your local drives. That\u2019s why it\u2019s crucial to use cloud-based backup systems to keep your data safe.<\/p>\n<h2>Should You Pay the Ransom?<\/h2>\n<p>While paying the ransom may seem like the most convenient thing to do, we strongly advise against it. The thing is, chances that the hackers will send you the decoding tool are slim, and even if they do, the restored data might still have traces of the infection, which will expose your system to future attacks. In any case, the supposed decryption software may harm your PC badly, making it unusable.<\/p>\n<p>Most victims of PicoVirus end up losing their data even after paying the ransom. Therefore, never entertain the thought of negotiating with cybercriminals as this will make you an easy target.<\/p>\n<h2>How Did the PicoVirus Ransomware Get Into Your Computer?<\/h2>\n<p>Ransomware can infiltrate victims\u2019 devices through various means. The most common ones are as follows:<\/p>\n<ul>\n<li>Clicking on malicious links while surfing the internet. Once clicked, these links open a back channel through which malicious extensions, add-ons or plugins get installed into your browsers without your permission.<\/li>\n<li>Spam emails containing malicious code. When such an email is opened, the malicious code injects itself into your system and executes the ransomware file.<\/li>\n<li>Software bundling. In most cases, free software is bundled with additional programs that supposedly improve certain features once installed. However, these programs might be malicious and intended to harm your PC.<\/li>\n<li>Fake software update tools. You may receive a notification prompting you to install software updates for certain applications. Once you click on these fake notifications, you end up installing malware rather than the actual software updates.<\/li>\n<li>Downloading software from unsafe sites, like peer-to-peer sharing networks. These sites might present what appears to be legitimate software to trick users into downloading and installing it. In the end, you infect your system with harmful viruses.<\/li>\n<li>Playing online games and visiting adult content sites. They are loaded with fake ads that are usually attached to malware.<\/li>\n<\/ul>\n<h2>How to Remove the PicoVirus Ransomware<\/h2>\n<p>You can manually remove the PicoVirus ransomware using the steps below. Although this might be a lengthy process, recovering your data will prevent financial losses and stop those behind the ransomware from exploiting you.<\/p>\n<h2>Step 1: Enable Safe Mode with Networking<\/h2>\n<p>When you start your computer in Safe Mode, it becomes easier to isolate the ransomware from your system. To enter Safe Mode with Networking, follow the guide below:<\/p>\n<ol>\n<li>On a Windows 10 machine, click \u201cStart\u201d or press the Windows logo and click the \u201cPower\u201d button.<\/li>\n<li>Hold down the \u201cShift\u201d key and click \u201cRestart\u201d.<\/li>\n<li>On the \u201cChoose an option\u201d screen, click Troubleshoot &gt; Advanced options &gt; Startup Settings, and then select \u201cRestart\u201d.<\/li>\n<li>Press the F5 key on your keyboard. This will restart your PC in Safe Mode with Networking. You\u2019ll see the words \u201cSafe Mode\u201d at the bottom of your computer screen.<\/li>\n<\/ol>\n<h2>Step 2: Kill PicoVirus-Related Processes in Task Manager<\/h2>\n<p>Now, in the safe mode environment, you can kill all processes related to the PicoVirus ransomware. Here is how to do this:<\/p>\n<ol>\n<li>Use the Ctrl + Shift + Esc keyboard shortcut to bring up &#8220;Task Manager\u201d.<\/li>\n<li>Locate all processes related to the PicoVirus ransomware, select them one by one, and click \u201cEnd task\u201d.<\/li>\n<\/ol>\n<h2>Step 3: Uninstall the PicoVirus Ransomware<\/h2>\n<p>You can also locate suspicious programs and features via Control Panel and uninstall them. Here\u2019s how:<\/p>\n<ol>\n<li>Press the Win + R shortcut and type <b>appwiz.cpl<\/b> into the \u201cRun\u201d box.<\/li>\n<li>Look for any suspicious programs that might be associated with the PicoVirus ransomware, right-click on each of them and select \u201cUninstall\u201d. Follow the on-screen prompts to completely remove the malicious applications from your computer.<\/li>\n<\/ol>\n<h2>Step 4: Remove the PicoVirus Ransomware from Your Browsers<\/h2>\n<h3>Remove Suspicious Extensions from Internet Explorer<\/h3>\n<ol>\n<li>Launch Internet Explorer and click on its menu, which is located in the top right corner of the browser.<\/li>\n<li>Open \u201cManage Add-ons\u201d from the menu.<\/li>\n<li>Select \u201cToolbar and Extensions\u201d from the left pane and click on the \u201cDisable\u201d button to remove all extensions from Internet Explorer.<\/li>\n<\/ol>\n<p>Reset Internet Explorer:<\/p>\n<ol>\n<li>Run Internet Explorer and bring up its menu.<\/li>\n<li>Choose \u201cInternet Options\u201d and go to the \u201cAdvanced\u201d tab.<\/li>\n<li>Click on \u201cReset\u201d.<\/li>\n<li>Enable the \u201cDelete personal settings\u201d option, and select \u201cReset\u201d.<\/li>\n<\/ol>\n<h3>Remove Malicious Extensions from Microsoft Edge<\/h3>\n<ol>\n<li>Launch Edge and bring up its menu by clicking the three dots in the top right corner of the browser.<\/li>\n<li>Go to \u201cExtensions\u201d, locate any suspicious extensions and remove them.<\/li>\n<\/ol>\n<p>Reset Microsoft Edge:<\/p>\n<ol>\n<li>Run the Edge browser and click on the \u201cSettings and more\u201d menu icon.<\/li>\n<li>Open Settings &gt; Privacy &amp; Security and select \u201cChoose what to clear\u201d.<\/li>\n<li>Check all options and select \u201cClear\u201d.<\/li>\n<\/ol>\n<h3>Remove Malicious Extensions from Chrome<\/h3>\n<ol>\n<li>Run the Chrome browser and click on the menu icon located in the top right corner of the browser.<\/li>\n<li>Go to More Tools &gt; Extensions, search for any suspicious extensions and remove them from Chrome.<\/li>\n<\/ol>\n<p>Reset Chrome:<\/p>\n<ol>\n<li>Launch Chrome and bring up its menu.<\/li>\n<li>Go to \u201cSettings\u201d, scroll down and click \u201cAdvanced\u201d to display other options.<\/li>\n<li>Open the \u201cRestore settings to their original defaults\u201d option under \u201cReset and clean up\u201d.<\/li>\n<li>Select \u201cReset settings\u201d.<\/li>\n<\/ol>\n<h3>Remove Malicious Extensions from Mozilla Firefox<\/h3>\n<ol>\n<li>Run Mozilla Firefox and click on its menu located in the top right corner of the browser.<\/li>\n<li>Open \u201cAdd-ons\u201d from the menu and go to \u201cExtensions\u201d.<\/li>\n<li>Locate any suspicious extensions that might be associated with the PicoVirus ransomware and remove them.<\/li>\n<\/ol>\n<p>Reset Firefox:<\/p>\n<ol>\n<li>Open Firefox and bring up its menu.<\/li>\n<li>Select \u201cHelp\u201d and click on \u201cTroubleshooting Information\u201d.<\/li>\n<li>Choose the \u201cRefresh Firefox\u201d option and select \u201cRefresh Firefox\u201d.<\/li>\n<\/ol>\n<h2>Step 5: Scan Your System Using an Anti-Malware Tool<\/h2>\n<p>Uninstalling or deleting the PicoVirus ransomware from your machine or browsers doesn\u2019t necessarily mean that you\u2019ve removed all traces of it. You need to go a step further and use an aggressive malware removal tool like <a href=\"https:\/\/www.auslogics.com\/en\/software\/anti-malware\/\">Auslogics Anti-Malware<\/a>. This program carries out a deep scan of your folders, files, and applications to detect any malicious entities that could be running without your knowledge.<\/p>\n<p>Auslogics Anti-Malware is designed to catch malware that your ordinary antivirus program might fail to detect. The security tool scans, among other areas, registry entries, auto-start items, browser extensions, system memory, and anything you download from the internet. The tool is capable of stopping malware from sneaking into your PC and, as a result, can prevent damage.<\/p>\n<p>Auslogics Anti-Malware provides real-time protection, which means that it&#8217;s actively monitoring your PC whenever it is running.<\/p>\n<h2>Step 6: Deleting the PicoVirus Ransomware Using System Restore<\/h2>\n<p>If for any reason you&#8217;re not able to start your PC in Safe Mode with Networking, try restoring your system to a state before the malware infection. The System Restore feature makes the process easy, and here\u2019s the step-by-step guide:<\/p>\n<ol>\n<li>Press the \u201cPower\u201d button to turn on your PC. Immediately after your PC\u2019s brand logo appears, hold down the \u201cPower\u201d button to turn off the computer.<\/li>\n<li>Repeat step 1 twice and then allow your device to fully restart at the third attempt. This operation takes you to the Windows Recovery Environment (WinRE).<\/li>\n<li>Select \u201cSee advanced repair options\u201d.<\/li>\n<li>From the \u201cChoose an option\u201d screen, select Troubleshoot &gt; Advanced options &gt; System Restore.<\/li>\n<li>On the \u201cSystem Restore\u201d screen, select your account and enter your user credentials. Click \u201cContinue\u201d to open the \u201cSystem Restore\u201d window.<\/li>\n<li>Click \u201cNext\u201d to display a list of restore points. If it&#8217;s your first time using System Restore, select the \u201cChoose a different restore point\u201d option and click \u201cNext\u201d.<\/li>\n<li>Now select a relevant restore point and click \u201cNext\u201d. It&#8217;s important that you remember when your PC was infected by the PicoVirus ransomware as this could help you choose the correct restore point.<\/li>\n<li>Click \u201cFinish\u201d and select \u201cYes\u201d to proceed.<\/li>\n<li>Allow the process to run uninterrupted. Once your system has been restored successfully, click \u201cRestart\u201d.<\/li>\n<\/ol>\n<p>System Restore leaves your files intact but removes all installed programs and applications. This should remove the PicoVirus ransomware from your Windows device. After successfully restoring your system, you can restore each file individually. To do this, right-click the needed file, open its \u201cProperties\u201d, go to the \u201cPrevious Versions\u201d tab, and select \u201cRestore\u201d. Click \u201cOK\u201d to save the changes.<\/p>\n<h2>How to Stay Protected from PicoVirus<\/h2>\n<p>In most cases, computers are infected due to careless behavior or a lack of knowledge on the user\u2019s end. However, this can also happen unintentionally because of the stealth nature of some types of computer malware.<\/p>\n<h3>All in all, there are a few measures that you can take to stay protected from future malware attacks:<\/h3>\n<ul>\n<li>Be extra cautious when surfing the internet and be on the lookout for any suspicious links. Likewise, avoid clicking on pop-up ads and alerts since most of them are fake and malicious.<\/li>\n<li>Avoid downloading software or files from unreliable sources. Third-party downloaders usually include adware, spyware or other types of malware in their apps or programs. Genuine software can only be downloaded from official sources.<\/li>\n<li>Avoid clicking on fake software update notifications. The best way to avoid this is by visiting the official developers\u2019 websites and getting updates from there. Keeping all your programs and applications updated ensures that they are not vulnerable to malware attacks.<\/li>\n<li>Install a powerful anti-malware program to protect your system and data from malware infections. Remember to always keep your security tool updated to guarantee the safety of your data.<\/li>\n<li>When installing software, watch each step carefully and uncheck any unwanted programs in the \u201cCustom\u201d or \u201cAdvanced\u201d settings.<\/li>\n<li>Don\u2019t open email attachments whose sources you don\u2019t trust. If you detect any suspicious emails, especially from an unrecognized email address, delete them.<\/li>\n<li>Keep Windows updated.<\/li>\n<li>Keep your browsers updated to block any exploitation attempts.<\/li>\n<li>Turn on your Windows Firewall to protect your system from malware.<\/li>\n<li>Back up your data to an external storage device or a cloud server.<\/li>\n<\/ul>\n<p>For suggestions, queries or additional information about the PicoVirus ransomware, please leave a comment below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PicoVirus is a ransomware threat wreaking havoc over the internet. Originally known as Pico Ransomware v1.0, PicoVirus is one of the most lethal and dreaded malware entities capable of damaging your computer system to a point where it\u2019s completely useless. This file-encoding malware sneaks into your computer without your knowledge, locking all your crucial files, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[132],"tags":[66,64],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to remove PicoVirus ransomware and to fix the harm it has done? - The Official FileInspect Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ivan.diskin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#organization\",\"name\":\"Outbyte Computing Pty Ltd\",\"url\":\"https:\/\/www.fileinspect.com\/blog\/\",\"sameAs\":[\"https:\/\/www.youtube.com\/channel\/UCI6brHKmaiiUCcseAlcV3tQ\",\"https:\/\/www.facebook.com\/outbyte\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fileinspect.com\/blog\/wp-content\/uploads\/2021\/05\/1200x630-3.jpg\",\"contentUrl\":\"https:\/\/www.fileinspect.com\/blog\/wp-content\/uploads\/2021\/05\/1200x630-3.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Outbyte Computing Pty Ltd\"},\"image\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#website\",\"url\":\"https:\/\/www.fileinspect.com\/blog\/\",\"name\":\"The Official FileInspect Blog\",\"description\":\"News and Perspectives from IT Experts\",\"publisher\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fileinspect.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\",\"url\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\",\"name\":\"How to remove PicoVirus ransomware and to fix the harm it has done? - The Official FileInspect Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#website\"},\"datePublished\":\"2020-09-02T14:27:38+00:00\",\"dateModified\":\"2020-09-02T14:27:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fileinspect.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Security\",\"item\":\"https:\/\/www.fileinspect.com\/blog\/privacy-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to remove PicoVirus ransomware and to fix the harm it has done?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\"},\"author\":{\"name\":\"ivan.diskin\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/adc3a27e72a3c0dc7f88886068ae7a1e\"},\"headline\":\"How to remove PicoVirus ransomware and to fix the harm it has done?\",\"datePublished\":\"2020-09-02T14:27:38+00:00\",\"dateModified\":\"2020-09-02T14:27:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/\"},\"wordCount\":2221,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#organization\"},\"keywords\":[\"antimalware protection\",\"security\"],\"articleSection\":[\"Privacy &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/adc3a27e72a3c0dc7f88886068ae7a1e\",\"name\":\"ivan.diskin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54b9e8452b4d854a9ae7270f2a131047?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54b9e8452b4d854a9ae7270f2a131047?s=96&r=g\",\"caption\":\"ivan.diskin\"},\"sameAs\":[\"https:\/\/www.fileinspect.com\/blog\/author\/ivan.diskin\/\"],\"url\":\"https:\/\/www.fileinspect.com\/blog\/author\/ivan-diskin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to remove PicoVirus ransomware and to fix the harm it has done? - The Official FileInspect Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/","twitter_misc":{"Written by":"ivan.diskin","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.fileinspect.com\/blog\/#organization","name":"Outbyte Computing Pty Ltd","url":"https:\/\/www.fileinspect.com\/blog\/","sameAs":["https:\/\/www.youtube.com\/channel\/UCI6brHKmaiiUCcseAlcV3tQ","https:\/\/www.facebook.com\/outbyte"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fileinspect.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.fileinspect.com\/blog\/wp-content\/uploads\/2021\/05\/1200x630-3.jpg","contentUrl":"https:\/\/www.fileinspect.com\/blog\/wp-content\/uploads\/2021\/05\/1200x630-3.jpg","width":1200,"height":630,"caption":"Outbyte Computing Pty Ltd"},"image":{"@id":"https:\/\/www.fileinspect.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.fileinspect.com\/blog\/#website","url":"https:\/\/www.fileinspect.com\/blog\/","name":"The Official FileInspect Blog","description":"News and Perspectives from IT Experts","publisher":{"@id":"https:\/\/www.fileinspect.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fileinspect.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/","url":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/","name":"How to remove PicoVirus ransomware and to fix the harm it has done? - The Official FileInspect Blog","isPartOf":{"@id":"https:\/\/www.fileinspect.com\/blog\/#website"},"datePublished":"2020-09-02T14:27:38+00:00","dateModified":"2020-09-02T14:27:38+00:00","breadcrumb":{"@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fileinspect.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Security","item":"https:\/\/www.fileinspect.com\/blog\/privacy-security\/"},{"@type":"ListItem","position":3,"name":"How to remove PicoVirus ransomware and to fix the harm it has done?"}]},{"@type":"Article","@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/"},"author":{"name":"ivan.diskin","@id":"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/adc3a27e72a3c0dc7f88886068ae7a1e"},"headline":"How to remove PicoVirus ransomware and to fix the harm it has done?","datePublished":"2020-09-02T14:27:38+00:00","dateModified":"2020-09-02T14:27:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/"},"wordCount":2221,"commentCount":0,"publisher":{"@id":"https:\/\/www.fileinspect.com\/blog\/#organization"},"keywords":["antimalware protection","security"],"articleSection":["Privacy &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fileinspect.com\/blog\/remove-picovirus-ransomware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/adc3a27e72a3c0dc7f88886068ae7a1e","name":"ivan.diskin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fileinspect.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/54b9e8452b4d854a9ae7270f2a131047?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54b9e8452b4d854a9ae7270f2a131047?s=96&r=g","caption":"ivan.diskin"},"sameAs":["https:\/\/www.fileinspect.com\/blog\/author\/ivan.diskin\/"],"url":"https:\/\/www.fileinspect.com\/blog\/author\/ivan-diskin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/posts\/5868"}],"collection":[{"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/comments?post=5868"}],"version-history":[{"count":1,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/posts\/5868\/revisions"}],"predecessor-version":[{"id":5870,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/posts\/5868\/revisions\/5870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/media\/5869"}],"wp:attachment":[{"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/media?parent=5868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/categories?post=5868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fileinspect.com\/blog\/wp-json\/wp\/v2\/tags?post=5868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}