Home Malware Programs Trojans Trojan.Ransomlock.G

Trojan.Ransomlock.G

Posted: November 12, 2012

Threat Metric

Threat Level: 10/10
Infected PCs: 49
First Seen: November 12, 2012
Last Seen: February 26, 2021
OS(es) Affected: Windows

Trojan.Ransomlock.G is a technical name for a variant of a Reveton Trojan – the family of ransomware Trojans that are responsible for countless attacks against first-world countries and, in particular, Europe. Trojan.Ransomlock.G, like all Reveton-based ransomware Trojans, displays a pop-up that claims to be from a law enforcement agency and then demands that you pay a legal fee before Trojan.Ransomlock.G unlocks your machine. SpywareRemove.com security analysts alert that there are several reasons why you wouldn't want to pay Trojan.Ransomlock.G's fine – most importantly, the fact that Trojan.Ransomlock.G is illegal software that's unable to respond to any unlock codes or detect any criminal actions on your part. Disabling and removing Trojan.Ransomlock.G with appropriate anti-malware products should be done whenever you see Trojan.Ransomlock.G or any other member of the Reveton family invading your computer.

Why Trojan.Ransomlock.G's 'FBI' May As Well Mean 'For Breaking In'

Reveton-based ransomware Trojans like Trojan.Ransomlock.G Trojans are a staggeringly prolific group of PC threats that have been found to have a high degree of cross-national compatibility. Trojan.Ransomlock.G attacks appear to be specific to the United States, but SpywareRemove.com malware researchers also are very familiar with similar attacks against Canada, most of Europe and parts of the Middle East, as can be exemplified in ransomware Trojans like Guardia di Finanza Ransomware, Poliisi, Tietoverkkorikos Tutkinnan Yksikkö Ransomware, Bundespolizei National Cyber Crimes Unit Ransomware, the Cuerpo Nacional de Policia Virus and the Polícia de Segurança Pública Portuguese Virus.

After Trojan.Ransomlock.G launches (without your permission), Trojan.Ransomlock.G blocks your screen with a borderless web page. This HTML pop-up is designed to look like a warning from the United States FBI and warns you that your PC has been blocked because it has been associated to online crimes – such as visiting illegal sites or downloading pirated files. To enhance the appearance of legal surveillance, Trojan.Ransomlock.G also may display your webcam feed as a way to trick you into thinking that the authorities are watching you.

The bottom line to Trojan.Ransomlock.G's attack is that Trojan.Ransomlock.G insists on the victim transferring money via MoneyPak. SpywareRemove.com malware researchers have found MoneyPak to be one of the favored transaction methods for ransomware Trojans, much like Ukash and Paysafecard for Europe; as such, its inclusion can be considered an easy tip-off to Trojan.Ransomlock.G's nature as illegal and malicious software.

Breaking Trojan.Ransomlock.G's Lock with the Full Support of the Law

Since Trojan.Ransomlock.G isn't associated with the real FBI and is installed without any attempt to detect any criminal activity on the part of its victims, you shouldn't have anything to fear from removing Trojan.Ransomlock.G and ignoring all its fake legal alerts. However, like most ransomware Trojans, Trojan.Ransomlock.G can be difficult to remove by casual means – since Trojan.Ransomlock.G will block you from using other programs or, indeed, even most of your Windows interface.

SpywareRemove.com malware researchers can recommend a way around this problem: booting your computer from a USB device or from Safe Mode. Either solution should be sufficient for disabling Trojan.Ransomlock.G and letting you access any anti-malware programs that Trojan.Ransomlock.G may have blocked. Since Trojan.Ransomlock.G also may make negative changes to your browser's security settings, you should be careful to scan your entire PC when removing a Trojan.Ransomlock.G infection – this will ensure that, hopefully, all of Trojan.Ransomlock.G's changes and hidden components will be deleted.

Aliases

W32/Foreign.CEVI!tr [Fortinet]Mal/Generic-S [Sophos]TR/Ransom.Foreign.cevi [AntiVir]Trojan-Ransom.Win32.Foreign.cevi [Kaspersky]Win32:Reveton-QK [Trj] [Avast]Generic Trojan [Panda]Ransomer.AOD [AVG]W32/Reveton.H [Fortinet]Trojan-Ransomer.AOD [Ikarus]TR/Agent.174080.21 [AntiVir]Mal/EncPk-AHC [Sophos]Gen:Trojan.Heur.LP.kq4@a4@xK4o [BitDefender]HEUR:Trojan.Win32.Generic [Kaspersky]Win32:Malware-gen [Avast]Riskware [K7AntiVirus]
More aliases (76)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Trojan.Ransomlock.G may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%SystemDrive%\Documents and Settings\vcrittenden\Local Settings\Temp\csrss.dll File name: csrss.dll
Size: 274.43 KB (274432 bytes)
MD5: 4436e342dfd499331a2b883f903584c2
Detection count: 52
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Documents and Settings\vcrittenden\Local Settings\Temp
Group: Malware file
Last Updated: November 19, 2012
%SystemDrive%\Users\<username>\AppData\Local\Temp\3f62edfe.dll File name: 3f62edfe.dll
Size: 174.08 KB (174080 bytes)
MD5: 48c1195feeefc0ea61db3e4960b55700
Detection count: 23
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Users\<username>\AppData\Local\Temp
Group: Malware file
Last Updated: January 8, 2013
%TEMP%\icq.dll File name: icq.dll
Size: 176.12 KB (176128 bytes)
MD5: 01752ce0be21fda7103c357c63c63d10
Detection count: 7
File type: Dynamic link library
Mime Type: unknown/dll
Path: %TEMP%
Group: Malware file
Last Updated: January 5, 2013
%ALLUSERSPROFILE%\4t9t.dat File name: 4t9t.dat
Size: 126.97 KB (126976 bytes)
MD5: 2351741fb135a3c92951b12172f9b2ab
Detection count: 7
File type: Data file
Mime Type: unknown/dat
Path: %ALLUSERSPROFILE%
Group: Malware file
Last Updated: May 22, 2014
%SystemDrive%\Documents and Settings\kghale\Local Settings\Temp\wpbt0.dll File name: wpbt0.dll
Size: 194.94 KB (194944 bytes)
MD5: 86d6eca1b5db9fb0fa554cc5cb26ec58
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %SystemDrive%\Documents and Settings\kghale\Local Settings\Temp
Group: Malware file
Last Updated: December 17, 2012
%UserProfile%\Application Data\nur-xcp-sabb.pad File name: %UserProfile%\Application Data\nur-xcp-sabb.pad
Mime Type: unknown/pad
Group: Malware file
%UserProfile%\Start Menu\Programs\Startup\ctfmon.lnk File name: %UserProfile%\Start Menu\Programs\Startup\ctfmon.lnk
File type: Shortcut
Mime Type: unknown/lnk
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\"NoProtectedModeBanner" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\"2500" = "3"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\"1609" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\"1609" = "0"
Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.