Trojan.Ransomlock.G
Posted: November 12, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 49 |
First Seen: | November 12, 2012 |
---|---|
Last Seen: | February 26, 2021 |
OS(es) Affected: | Windows |
Trojan.Ransomlock.G is a technical name for a variant of a Reveton Trojan – the family of ransomware Trojans that are responsible for countless attacks against first-world countries and, in particular, Europe. Trojan.Ransomlock.G, like all Reveton-based ransomware Trojans, displays a pop-up that claims to be from a law enforcement agency and then demands that you pay a legal fee before Trojan.Ransomlock.G unlocks your machine. SpywareRemove.com security analysts alert that there are several reasons why you wouldn't want to pay Trojan.Ransomlock.G's fine – most importantly, the fact that Trojan.Ransomlock.G is illegal software that's unable to respond to any unlock codes or detect any criminal actions on your part. Disabling and removing Trojan.Ransomlock.G with appropriate anti-malware products should be done whenever you see Trojan.Ransomlock.G or any other member of the Reveton family invading your computer.
Why Trojan.Ransomlock.G's 'FBI' May As Well Mean 'For Breaking In'
Reveton-based ransomware Trojans like Trojan.Ransomlock.G Trojans are a staggeringly prolific group of PC threats that have been found to have a high degree of cross-national compatibility. Trojan.Ransomlock.G attacks appear to be specific to the United States, but SpywareRemove.com malware researchers also are very familiar with similar attacks against Canada, most of Europe and parts of the Middle East, as can be exemplified in ransomware Trojans like Guardia di Finanza Ransomware, Poliisi, Tietoverkkorikos Tutkinnan Yksikkö Ransomware, Bundespolizei National Cyber Crimes Unit Ransomware, the Cuerpo Nacional de Policia Virus and the Polícia de Segurança Pública Portuguese Virus.
After Trojan.Ransomlock.G launches (without your permission), Trojan.Ransomlock.G blocks your screen with a borderless web page. This HTML pop-up is designed to look like a warning from the United States FBI and warns you that your PC has been blocked because it has been associated to online crimes – such as visiting illegal sites or downloading pirated files. To enhance the appearance of legal surveillance, Trojan.Ransomlock.G also may display your webcam feed as a way to trick you into thinking that the authorities are watching you.
The bottom line to Trojan.Ransomlock.G's attack is that Trojan.Ransomlock.G insists on the victim transferring money via MoneyPak. SpywareRemove.com malware researchers have found MoneyPak to be one of the favored transaction methods for ransomware Trojans, much like Ukash and Paysafecard for Europe; as such, its inclusion can be considered an easy tip-off to Trojan.Ransomlock.G's nature as illegal and malicious software.
Breaking Trojan.Ransomlock.G's Lock with the Full Support of the Law
Since Trojan.Ransomlock.G isn't associated with the real FBI and is installed without any attempt to detect any criminal activity on the part of its victims, you shouldn't have anything to fear from removing Trojan.Ransomlock.G and ignoring all its fake legal alerts. However, like most ransomware Trojans, Trojan.Ransomlock.G can be difficult to remove by casual means – since Trojan.Ransomlock.G will block you from using other programs or, indeed, even most of your Windows interface.
SpywareRemove.com malware researchers can recommend a way around this problem: booting your computer from a USB device or from Safe Mode. Either solution should be sufficient for disabling Trojan.Ransomlock.G and letting you access any anti-malware programs that Trojan.Ransomlock.G may have blocked. Since Trojan.Ransomlock.G also may make negative changes to your browser's security settings, you should be careful to scan your entire PC when removing a Trojan.Ransomlock.G infection – this will ensure that, hopefully, all of Trojan.Ransomlock.G's changes and hidden components will be deleted.
Aliases
More aliases (76)
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to Trojan.Ransomlock.G may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
* See Free Trial offer below. EULA and Privacy/Cookie Policy.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%SystemDrive%\Documents and Settings\vcrittenden\Local Settings\Temp\csrss.dll
File name: csrss.dllSize: 274.43 KB (274432 bytes)
MD5: 4436e342dfd499331a2b883f903584c2
Detection count: 52
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Documents and Settings\vcrittenden\Local Settings\Temp
Group: Malware file
Last Updated: November 19, 2012
%SystemDrive%\Users\<username>\AppData\Local\Temp\3f62edfe.dll
File name: 3f62edfe.dllSize: 174.08 KB (174080 bytes)
MD5: 48c1195feeefc0ea61db3e4960b55700
Detection count: 23
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: January 8, 2013
%TEMP%\icq.dll
File name: icq.dllSize: 176.12 KB (176128 bytes)
MD5: 01752ce0be21fda7103c357c63c63d10
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %TEMP%
Group: Malware file
Last Updated: January 5, 2013
%ALLUSERSPROFILE%\4t9t.dat
File name: 4t9t.datSize: 126.97 KB (126976 bytes)
MD5: 2351741fb135a3c92951b12172f9b2ab
Detection count: 7
File type: Data file
Mime Type: unknown/dat
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: May 22, 2014
%SystemDrive%\Documents and Settings\kghale\Local Settings\Temp\wpbt0.dll
File name: wpbt0.dllSize: 194.94 KB (194944 bytes)
MD5: 86d6eca1b5db9fb0fa554cc5cb26ec58
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Documents and Settings\kghale\Local Settings\Temp
Group: Malware file
Last Updated: December 17, 2012
%UserProfile%\Application Data\nur-xcp-sabb.pad
File name: %UserProfile%\Application Data\nur-xcp-sabb.padMime Type: unknown/pad
Group: Malware file
%UserProfile%\Start Menu\Programs\Startup\ctfmon.lnk
File name: %UserProfile%\Start Menu\Programs\Startup\ctfmon.lnkFile type: Shortcut
Mime Type: unknown/lnk
Group: Malware file
Registry Modifications
HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\"NoProtectedModeBanner" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\"1609" = "0"
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.