Ukash Virus

Ukash Virus Description

Ukash Virus Image 1The so-called Ukash Virus is a ransomware Trojan that receives its name because Ukash Virus requires that its victims use Ukash (a legitimate money transfer service) to transfer the ransom funds. This dangerous Trojan infection is composed of a Winlocker component that basically blocks access to the infected computer system, disabling access to the infected computer system's desktop, Task Manager, command line, Registry Editor and other services and applications. There are countless variants of the Ukash Virus, designed to target various different countries in Europe and North America. ESG malware analysts strongly advise against paying the ransom that this malware infection tries to extort from its victims. Instead, variants of the Ukash Virus should be removed with the help of a reliable anti-malware application.

The Ukash Virus is characterized by its use of official police logos and threatening language in order to convince its victims that Ukash Virus is in fact a message displayed by the targeted country's police force. Although the Ukash Virus appears to have originated in the Russian Federation, its main targets are the various European countries. There are dozens of variants of the Ukash Virus, each targeting a specific country. Some examples of country-specific variants of the Ukash Virus include the Scotland Yards Ukash Virus, the Metropolitan Police Ukash Virus and the Strathclyde Police Ukash Virus (all three targeting computer systems in the United Kingdom), or the Fake Federal German Police (BKA) Notice and the 'Die offizielle Mitteilung des Bundeskriminalamtes' fake message infection (both targeting computer systems in Germany). Variants of the Ukash Virus have been spotted for most countries in Europe, including Spain, Italy, France, The Netherlands and Belgium.

Once the Ukash Virus infects the victim's computer, Ukash Virus will block access to the infected computer's files and applications, and instead displaying a large message that fills up the victim's screen. This message will be written in the language of the targeted computer system (whose location is probably detected through its IP address) and contain logos of a law enforcement agency belonging to the targeted computer system's country. For example, variants of the Ukash Virus targeting computer systems in the United States will display fake warning messages from the FBI. This message will claim that the victim's computer system was involved in illegal activities, such as downloading child pornography. In this message, Ukash Virus variants will threaten the victim with deletion of their data and prosecution unless they pay a fine using either the Ukash or the PaySafeCard money transfer service.
Aliases: TR/Rogue.951266 [AntiVir], Trojan.PWS.Multi.1119 [DrWeb], Mal/EncPk-AKA [Sophos], PE:Trojan.Win32.Generic.147C83D1!343704529 [Rising], Trojan.Win32.A.NSAnti.223744.C [ViRobot], Trojan.Win32.Generic.bonflz [NANO-Antivirus], Win32:Kryptik-LLC [Trj] [Avast], TSPY_NEUREVT.AF [TrendMicro-HouseCall], Win32/Tnega.ASAV [TotalDefense], Troj_Generic.KJLDT [Norman], Trojan.Zbot!gen44 [Symantec], Trojan.Win32.Reveton.a!ag (v) [VIPRE], HEUR/Malware.QVM10.Gen [Qihoo-360], Trojan.GenericKD.951266 (B) [Emsisoft] and Trojan.Win32.Yakes.azG [Baidu-International].

Infected with Ukash Virus? Scan Your PC for Free

Download SpyHunter’s Spyware Scanner
to Detect Ukash Virus

Security Doesn't Let You Download SpyHunter or Access the Internet?


Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
  • Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
  • Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
  • Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in 'Safe Mode with Networking' and install SpyHunter in Safe Mode.
  • IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.

If you still can't install SpyHunter? View other possible causes of installation issues.

Technical Information

Infection Statistics


Our MalwareTracker shows malware activity across the world. Explore real-time data of Ukash Virus outbreaks and other threats from global to local level.

File System Details

Ukash Virus creates the following file(s):
# File Name Size MD5 Detection Count
1 %TEMP%\tmpb3759d3e\setex.exe 38,759 01da942199a8e606a09889a23f7d27b5 38
2 %APPDATA%\Task Scheduler\Task Scheduler.exe 122,368 b923b9094635464cb81a245716d2d932 30
3 %APPDATA%\Microsoft\Windows\Templates\securitywindrv.exe 34,816 0da8705f12382804c87d20ee58a4674c 24
4 %LOCALAPPDATA%\HP\Google\yaiiwockc.dll 483,328 9460de1c3485d5f3cc9f5fa1d4a09708 24
5 %PROGRAMFILES%\scvhost.exe 231,936 2dc8b92985e96aabc9ab0937f1018ff7 23
6 %APPDATA%\ifgxpers.exe 331,648 4765da2ba43a0ce9206d29c4c7aa76b6 22
7 %LOCALAPPDATA%\comeo\comeo.exe 3,581,440 17b063d029da62b8afc715880c0ae047 19
8 %WINDIR%\system32\DLL321.dll 191,712 bd6c2627b0f2e007d371f71edc0762a4 18
9 %APPDATA%\p1.exe 95,244 5494478b81b9617fe10bbe5d12adb22d 18
10 %APPDATA%\zqmkrehUkpoKfsafsaZg.exe 33,012 461caa595d898e273656853c337d81c4 18
11 %SystemDrive%\Users\johnston\AppData\Roaming\Microsoft\Windows\msshell.exe 18,432 0e9e0b2092e1c643f103d93f4a04b82a 16
12 %SystemDrive%\RECYCLER\S-1-5-21-772653845-498285915-614280462-1005\$50e163e9a5bf15d7149f645cb0bc368b\n. 46,080 c8dfe609bd3f46f2f19e9513b9f22c36 15
13 %APPDATA%\taskhost.exe.exe 15,872 8cdc3a6a50af07cbdc4a1193e45f8721 14
14 %APPDATA%\Other.res 70,656 2122654109b372638bca24f780ea1921 9
15 %LOCALAPPDATA%\Microsoft\Windows\3966\systemcpl.exe 100,352 de7c781205d31f58a04d5acd13ff977d 8
16 %AppData%\[RANDOM CHARACTERS].exe N/A
17 %Temp%\[RANDOM CHARACTERS].exe N/A

More files

Registry Details

Ukash Virus creates the following registry entry or registry entries:
HKEY..\..\..\..{RegistryKeys}
Software\Classes\*\ShellExt\ContextMenuHandlers\ExplorerWAS
*\shellex\ContextMenuHandlers\ExplorerWAS
Software\Classes\*\ShellExt\ContextMenuHandlers\secure_del
*\shellex\ContextMenuHandlers\secure_del
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}
Sysyem Cleaner
The following CLSID's were found:
HKEY..\..\{CLSID Path}
{51164744-9696-9919-9702-756205740524}

Site Disclaimer

Leave a Reply

IMPORTANT! To be able to proceed, you need to solve the following simple math.
Please leave these two fields as-is:
What is 11 + 15 ?