In this article, I am going to explain how the Lockscreen trojan infused into your personal computer, as well as how to get rid of Lockscreen trojan virus.
What is Lockscreen trojan?
Name | Lockscreen |
Infection Type | Trojan |
Symptoms |
|
Similar behavior | Lodap, FraudPack, Korplug, Proseus, KillDisk, Itagomoko |
Fix Tool | See If Your System Has Been Affected by Lockscreen trojan |
Trojan viruses are one of the leading malware types by its injection rate for quite a long time. And now, during the pandemic, when malware got tremendously active, trojan viruses boosted their activity, too. You can see lots of messages on various resources, where users are complaining concerning the Lockscreen trojan virus in their computer systems, as well as requesting assisting with Lockscreen trojan virus clearing.
Trojan Lockscreen is a sort of virus that infiltrates into your personal computer, and then performs various harmful functions. These functions depend on a type of Lockscreen trojan: it can act as a downloader for other malware or as a launcher for an additional destructive program which is downloaded in addition to the Lockscreen trojan virus. Throughout the last 2 years, trojans are likewise dispersed through e-mail add-ons, and in the majority of instances used for phishing or ransomware injection.
Lockscreen2 also known as
K7AntiVirus | Trojan ( 004e2d221 ) |
Elastic | malicious (high confidence) |
DrWeb | Trojan.KillProc.38402 |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.LockScreen.A3 |
ALYac | Gen:Variant.MSILPerseus.26238 |
Cylance | Unsafe |
Zillya | Trojan.Blocker.Win32.33995 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_70% (D) |
K7GW | Trojan ( 004e2d221 ) |
Cybereason | malicious.bb3316 |
Cyren | W32/S-c17d2fee!Eldorado |
Symantec | Ransom.BrLock |
ESET-NOD32 | a variant of MSIL/LockScreen.PG |
APEX | Malicious |
Avast | Win32:Malware-gen |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Gen:Variant.MSILPerseus.26238 |
NANO-Antivirus | Trojan.Win32.LockScreen.ebpfmi |
MicroWorld-eScan | Gen:Variant.MSILPerseus.26238 |
Ad-Aware | Gen:Variant.MSILPerseus.26238 |
Sophos | Mal/Generic-S + Mal/BrLock-A |
BitDefenderTheta | Gen:NN.ZemsilF.34738.gm0@au5Fpdp |
VIPRE | Trojan.Win32.Generic!BT |
TrendMicro | Ransom_BRLOCK.SM |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Generic.mg.9b2ba31bb3316288 |
Emsisoft | Gen:Variant.MSILPerseus.26238 (B) |
SentinelOne | Static AI – Malicious PE |
Jiangmin | Trojan.Blocker.chj |
Webroot | W32.Malware.Gen |
Avira | HEUR/AGEN.1127555 |
eGambit | Unsafe.AI_Score_99% |
Antiy-AVL | Trojan/Generic.ASMalwS.180DADA |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Microsoft | Trojan:MSIL/Lockscreen.C!bit |
AegisLab | Trojan.Win32.Blocker.j!c |
GData | MSIL.Trojan-Ransom.BrLock.A |
AhnLab-V3 | Trojan/Win32.Dynamer.R181171 |
McAfee | Artemis!9B2BA31BB331 |
MAX | malware (ai score=97) |
Malwarebytes | Ransom.BrowserModifier |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | Ransom_BRLOCK.SM |
Ikarus | Trojan.MSIL.LockScreen |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | MSIL/LockScreen.PG!tr |
AVG | Win32:Malware-gen |
Paloalto | generic.ml |
Domains that associated with Lockscreen:
0 | domashniypomidor.ru |
1 | redirector.gvt1.com |
2 | r8—sn-bpb5oxu-3c2r.gvt1.com |
3 | update.googleapis.com |
What are the symptoms of Lockscreen trojan?
- Executable code extraction;
- Creates RWX memory;
- A process created a hidden window;
- HTTP traffic contains suspicious features which may be indicative of malware related traffic;
- Performs some HTTP requests;
- Uses Windows utilities for basic functionality;
- Attempts to restart the guest VM;
- Modifies boot configuration settings;
- Installs itself for autorun at Windows startup;
- Creates a copy of itself;
- Uses suspicious command line tools or Windows utilities;
The common symptom of the Lockscreen trojan virus is a gradual entrance of different malware – adware, browser hijackers, et cetera. Because of the activity of these harmful programs, your computer ends up being extremely slow: malware consumes big quantities of RAM and CPU capabilities.
Another visible impact of the Lockscreen trojan virus presence is unknown programs displayed in task manager. Frequently, these processes may try to mimic system processes, but you can understand that they are not legit by taking a look at the origin of these processes. Quasi system applications and Lockscreen trojan’s processes are always listed as a user’s processes, not as a system’s.
How to remove Lockscreen trojan virus?
- Download and install Loaris Trojan Remover.
- Open Loaris and perform a “Standard scan“.
- “Move to quarantine” all items.
- Open “Tools” tab – Press “Reset Browser Settings“.
- Approve the reset pressing “Yes” button in the appeared window.
- Restart your computer.
To erase Lockscreen trojan and be sure that all additional malware, downloaded with the help of this trojan, will certainly be eliminated, as well, I’d suggest you to use Loaris Trojan Remover.
Lockscreen removal guide
To spot and eliminate all malicious items on your personal computer using Loaris Trojan Remover, it’s better to utilize Standard or Full scan. Removable scan, as well as Custom, will check only specified locations, so these types of scans cannot provide the full information.
You can see the detects during the scan process lasts. Nonetheless, to perform any actions against spotted viruses, you need to wait until the scan is finished, or to interrupt the scanning process.
To choose the special action for each detected malware, choose the knob in front of the detection name of detected malicious programs. By default, all viruses will be moved to quarantine.
How to remove Lockscreen Trojan?
Name: Lockscreen
Description: Trojan Lockscreen is a kind of virus that infiltrates into your computer, and after that performs different destructive functions. These features depend upon a type of Lockscreen trojan: it can act as a downloader for many other malware or as a launcher for another destructive program which is downloaded in addition to the Lockscreen trojan. During the last two years, trojans are also dispersed via e-mail attachments, and most of situations utilized for phishing or ransomware infiltration.
Operating System: Windows
Application Category: Trojan
User Review
( votes)- What is Trojan Horse: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
- Lockscreen VirusTotal Report: