Threat Database Trojans Trojan.Win32.LockScreen

Trojan.Win32.LockScreen

By Sumo3000 in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 716
First Seen: March 19, 2012
Last Seen: March 1, 2023
OS(es) Affected: Windows

The Lockscreen family of malware or Trojan.Lockscreen, responsible for the International Police Association (IPA) Ransomware, FBI Moneypak ransomware and 'Votre ordinateur est bloque en raison du delit de la loi de la France’ Ransomware' infection is comprised of various Trojans designed to threaten computer users so that they will pay a ransom. Malware in the Lockscreen family is known to target computer systems in the European Union with highly genuine-looking ransomware messages. These are designed to scare inexperienced computer users into thinking that their machine has been locked by their country's main law enforcement agency or by the IPA. The Lockscreen family of malware is not particularly sophisticated or difficult to remove, but poses a significant threat to inexperienced computer users unaccustomed to dealing with ransomware attacks. If you find that a threatening message is displayed on your screen when you start up Windows, and you cannot access your Desktop or files, you may have become infected with a ransomware Trojan in the Lockscreen family. ESG security analysts recommend the use of a strong, updated anti-malware program to remove this threat permanently.

An Overview of the Scam that Malware in the Lockscreen Family Uses to Steal Your Money

Basically, malware in the Lockscreen family is designed to enter a computer, detect the infected computer's IP, and then make the necessary system settings modifications to carry out its scam. This includes making changes to the Windows Registry that allow Lockscreen malware to start up automatically when the victim launches Windows as well as blocking access to Windows components such as the Task Manager or the Windows Registry Editor. Then, Trojan.Lockscreen connects to a remote server in order to download the text and graphics for a ransom message directed towards the infected computer's country, which is deduced from its IP address. The message will try to dupe the victim into paying a fine ranging from fifty to one-hundred Euros if they wish to regain control of their computer system. The message will also threaten the victim with prosecution if this fine is not paid.

Although there are many highly-sophisticated ransomware infections that have the ability to encrypt the victim's files or cause lasting damage to the infected operating system, malware in the Lockscreen family is relatively benign. The main obstacle when removing a Lockscreen family infection is actually gaining access to the infected computer's anti-malware software. To do this, you can bypass the Lockscreen family threatening message by using an alternative boot method to start up Windows.

SpyHunter Detects & Remove Trojan.Win32.LockScreen

File System Details

Trojan.Win32.LockScreen may create the following file(s):
# File Name MD5 Detections
1. tmp.exe cc38bd5181872b54c10bf1c3317fb2a2 689
2. 1.exe 403767a08cc494ea623bd407ac2b55da 12
3. 1.exe 9b079876e1077eb7e74c56e8814c41a0 7
4. Combat.exe 6d7fcc24f48c0ddafe8e9c337dbca1da 1
5. %AppData%\Yniq\demuy.exe
6. %Temp%\tmp54873343.bat
7. %AppData%\Wigouq\anyrg.tmp
8. %AppData%\Wigouq\anyrg.unw
9. file.exe 6D8DB0D28948A4D91A30E51C6901BBA0 0

Registry Details

Trojan.Win32.LockScreen may create the following registry entry or registry entries:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
1609 =
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2]
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
1406 =
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4]

Trending

Most Viewed

Loading...