Solved

Removal of Trojan.Ransomlock.G

Posted on 2015-01-28
2
39 Views
Last Modified: 2015-04-29
Norton is not removing.  It blocks the attack that is coming from my own computer.
0
Comment
Question by:Dennis Wise
2 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 500 total points
ID: 40576092
Find your backups. Your files are irrecoverably encrypted.
0
 
LVL 18

Expert Comment

by:web_tracker
ID: 40576746
Use the Norton power eraser tool to remove this virus. https://security.symantec.com/nbrt/npe.aspx?lcid=1033

If that does not work use the tool on this page to remove the virus
http://www.remove-pcvirus.com/remove-trojan-ransomlock-g/

If you do not want to use these tools to remove the virus you can remove the registry keys manually (when editing the registry..... USE THE REGISTRY EDITOR AT YOUR OWN RISK...... editing the wrong registry keys can cause more problems or even corrupt the whole operating system, so use with caution), This website will tell you which registry keys to remove.
http://www.virusresearch.org/remove-trojan-ransomlock-g-complete-removal/
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question