Donut Ransomware Removal (+ .Donut File Recovery)

Donut Ransomware Removal (+ .Donut File Recovery)Donut Ransomware Removal (+ .Donut File Recovery)Donut Ransomware Removal (+ .Donut File Recovery)


This page aims to help you remove Donut Ransomware for free. Our instructions also cover how any .Donut file can be recovered.

Donut is a type of a Ransomware threat, which can secretly infect you and encrypt the files, found on your computer. This threat is developed by anonymous cyber criminals, who use it for blackmailing purposes. Donut applies a special encryption to each and every file that belongs to some commonly used files types (documents, images, archives, etc.) in order to render them inaccessible to you. If you want to release them and regain your access, you will have to pay ransom. This is a popular criminal strategy, which is rapidly taking over the Internet. A number of people have already contacted our “How to remove” team with a call for help on how to deal with Donut and its nasty attack. Sadly, we cannot guarantee a 100% recovery from this infection, but on this page, we will try to do our best to give you alternative solutions to the ransom payment. If you stay with us, you will find useful information about the nature of Ransomware and its infection methods as well as a detailed removal guide, which may help you remove Donut from your system.

Donut Ransomware Removal (+ .Donut File Recovery)

Donut Ransomware File

The Donut Ransomware File Encryption

Ransomware is a big malicious group, which contains many malicious programs, all of which aim to block the access to your computer or to your data and blackmail you afterwards. Some of the viruses in this category tend to place a huge ransom-demanding banner on the entire screen of the infected machine, this way blocking the victim’s access to the menu and the icons. Others use a completely different method to blackmail you. They usually use a very complex encryption, which they apply on the files, found on the infected computer. The idea of that encryption is to prevent the victims from opening or using its data until they agree to pay the ransom. These viruses are the so-called cryptoviruses, and Donut is one of them. The cryptoviruses are considered very difficult to deal with, because the malicious encryption they apply may not always be successfully removed. The elimination and the detection of the malware itself is also a challenging task. That’s why dealing with such an infection requires specialized anti-malware tools (such as the professional malware removal tool on this page) or some detailed removal instructions (such as the ones available below).

Donut Ransomware Removal


Donut Ransomware Removal (+ .Donut File Recovery)

Some of the steps will likely require you to exit the page. Bookmark it for later reference.

Reboot in Safe Mode (use this guide if you don’t know how to do it).

Donut Ransomware Removal (+ .Donut File Recovery)


Press CTRL + SHIFT + ESC at the same time and go to the Processes Tab. Try to determine which processes are dangerous. 

Donut Ransomware Removal (+ .Donut File Recovery)

Right click on each of them and select Open File Location. Then scan the files with our free online virus scanner:

Donut Ransomware Removal (+ .Donut File Recovery)
Drag and Drop Files Here to Scan
Maximum file size: 128MB.

This scanner is free and will always remain free for our website's users. You can find its full-page version at:

Scan Results

Virus Scanner Result
Donut Ransomware Removal (+ .Donut File Recovery)ClamAV
Donut Ransomware Removal (+ .Donut File Recovery)AVG AV
Donut Ransomware Removal (+ .Donut File Recovery)Maldet

After you open their folder, end the processes that are infected, then delete their folders. 

After you open their folder, end the processes that are infected, then delete their folders. 

Note: If you are sure something is part of the infection – delete it, even if the scanner doesn’t flag it. No anti-virus program can detect all infections.

Donut Ransomware Removal (+ .Donut File Recovery)

Hold the Start Key and R –  copy + paste the following and click OK:

notepad %windir%/system32/Drivers/etc/hosts

A new file will open. If you are hacked, there will be a bunch of other IPs connected to you at the bottom. Look at the image below:

Donut Ransomware Removal (+ .Donut File Recovery)

If there are suspicious IPs below “Localhost” – write to us in the comments.

Type msconfig in the search field and hit enter. A window will pop-up:

Donut Ransomware Removal (+ .Donut File Recovery)

Go in Startup —> Uncheck entries that have “Unknown” as Manufacturer.

  • Please note that ransomware may even include a fake Manufacturer name to its process. Make sure you check out every process here is legitimate.

Donut Ransomware Removal (+ .Donut File Recovery)

Type Regedit in the windows search field and press EnterOnce inside, press CTRL and F together and type the virus’s Name. 

Search for the ransomware  in your registries and delete the entries. Be extremely careful –  you can damage your system if you delete entries not related to the ransomware.

Type each of the following in the Windows Search Field:

  1. %AppData%
  2. %LocalAppData%
  3. %ProgramData%
  4. %WinDir%
  5. %Temp%

Delete everything in Temp. The rest just check out for anything recently added. Remember to leave us a comment if you run into any trouble!

Donut Ransomware Removal (+ .Donut File Recovery) 

How to Decrypt Donut files

We have a comprehensive (and daily updated) guide on how to decrypt your files. Check it out here.

How can Donut Ransomware infect you?

Ransomware infections are famous for their trickiness and the numerous malicious transmitters they use in order to infect their victims. Usually, threats like Donut are commonly distributed via spam messages, fake ads, infected web pages or malicious email attachments, but it is also impossible that they sneak inside your system with the help of a Trojan horse functioning as a backdoor. Sadly, such infections show hardly any symptoms and if your antivirus software is outdated or not reliable enough, it may fail to detect the threat and remove it before the encryption of the files has been completed.

What can you do to clean your PC from Donut and save your files?

Removing Donut from your computer is highly recommended if you want to make your PC safe for further use and prevent additional encryption to more files. Eliminating the Ransomware is difficult but, fortunately, not impossible. However, you have to be very careful when detecting the malicious files and make sure that you are deleting the right ones and not some vital system data, the removal of which may cause malfunction to your PC. To help you with the process, we have prepared a detailed Removal Guide below, but if you are not confident enough to deal with Donut manually, we recommend you use the professional anti-malware tool suggested below and scan your PC with it.

As far as the recovery of your files is concerned, do not get shocked if after the removal of the infection the files affected by it are still inaccessible. Sadly, this is a common consequence of the Ransomware attack, which could lead to severe loss of valuable data. However, the data loss could eventually be counteracted or at least minimized to some extent with some additional actions. The first thing we will suggest you do after you remove Donut is seek data backups. If you have copies of your files on external drives, clouds or some other devices, you can easily recover them without paying the ransom. If you don’t have backups, though, you are probably faced with a difficult choice – to pay the ransom, demanded by the hackers or to seek for alternatives. Our most sincere advice in this situation is to first give a try to every possible alternative solution you could find. You could give a try to the file-restoration instructions in the Removal Guide below, check out our free decryptor list or contact a specialist of your choice for additional assistance. Paying the ransom is the least favorable course of action because not only is there absolutely no guarantee that after you pay the hackers will really recover your data, but also by giving them your money you are directly sponsoring their blackmailing scheme and encouraging them to continue harassing more users in future.


Name Donut
Type Ransomware
Danger Level High (Ransomware is by far the worst threat you can encounter)
Symptoms Very few and unnoticeable ones before the ransom notification comes up.
Distribution Method From fake ads and fake system requests to spam emails and contagious web pages.
Data Recovery Tool [banner_table_recovery]
Detection Tool

If the guide doesn’t help, download the anti-virus program we recommended or try our free online virus scanner. Also, you can always ask us in the comments for help!


About the author


Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

Leave a Comment