Win32/LockScreen [Threat Name] go to Threat

Win32/LockScreen.AKE [Threat Variant Name]

Category trojan
Size 85544 B
Aliases Trojan.Win32.Buzus.laiw (Kaspersky)
  Trojan:Win32/Ransom.GZ (Microsoft)
Short description

Win32/LockScreen.AKE is a trojan that blocks access to the Windows operating system.

Installation

The trojan does not create any copies of itself.


In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "(Default)" = "%malwarefilepath%"

The trojan may delete the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Control\­SafeBoot\­Minimal]
  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Control\­SafeBoot\­Network]

The following programs are terminated:

  • taskmgr.exe
  • msconfig.exe
  • regedit.exe
  • cmd.exe

The trojan terminates any program that creates a window containing any of the following strings in its name:

  • Program Manager
Other information

Win32/LockScreen.AKE is a trojan that blocks access to the Windows operating system.


The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (4) URLs. The HTTP protocol is used.


The trojan displays the following dialog box:

To regain access to the operating system the user is asked to send a certain amount of money to a specific bank account in exchange for the password.


When the correct password is entered the trojan is deactivated.

Please enable Javascript to ensure correct displaying of this content and refresh this page.