Realistically these are all the options to remove the FBI viruses, copied and pasted from : http://botcrawl.com/how-to-remove-the-fbi-moneypak-ransomware-virus-fake-fbi-mal ware-removal/
- Malware Removal Software – Scan and remove malware
- Manual Removal – Remove associated files
- Restore – Restore PC to a date and time before infection (includes different options)
- Safe Mode With Networking – Remove files and/or Scan and remove malware
- Optical CD-R Option – Scan and remove malware
- Slave Hard Disk Drive Option – Scan and remove malware
It’s actually really easy to remove this virus in Windows without a restore (restore options below). Then again, if this option does not help you locate the malicious files, skip it. We are going to enter your computers App Data which is a hidden file. To learn how to show hidden files click here.
1. Open Windows Start Menu and type %appdata% into the search field, press Enter.
2. Navigate to: Microsoft\Windows\Start Menu\Programs\Startup
3. Remove ctfmon (ctfmon.lnk if in dos) – this is what’s calling the virus on start up. This is not ctfmon.exe.4. Open Windows Start Menu and type %userprofile% into the search field and press enter.
5. Navigate to: Appdata\Local\Temp
6. Remove rool0_pk.exe
7.Remove [random].mof file
8. Remove V.classThe virus can have names other than “rool0_pk.exe” but it should appear similar, there may also be 2 files, 1 being a .mof. Removing the .exe file will fix FBI Moneypak. The class file uses a java vulnerability to install the virus, removal of V.class is done for safe measure.
All FBI Moneypak Files:
The files listed above are what causes FBI Moneypak to function. To ensure FBI Moneypak is completely removed via manually, please delete all given files. Keep in mind, [random] can be any sequence of numbers or letters.
- %Documents and Settings%\[UserName]\Desktop\[random].lnk
- %Program Files%\FBI Moneypak Virus
- %Documents and Settings%\[UserName]\Application Data\[random].exe
- %UserProfile%\Desktop\FBI Moneypak Virus.lnk
- %Documents and Settings%\All Users\Application Data\FBI Moneypak Virus
- %CommonStartMenu%\Programs\FBI Moneypak Virus.lnk
Kill ROGUE_NAME Processes:
Access Windows Task Manager (Ctrl+Alt+Delete) and kill the rogue FBI Moneypak process. Please note the infection will have a random name for the process [random] which may contain a sequence of numbers and letters (ie: USYHEY347H372.exe).
Remove Registry Values
- HKEY_LOCAL_MACHINE\SOFTWARE\FBI Moneypak Virus
- HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Policies\System ‘DisableRegistryTools’ = 0
- HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system ‘EnableLUA’ = 0
- HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Internet Settings ‘WarnOnHTTPSToHTTPRedirect’ = 0
- HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Policies\System ‘DisableRegedit’= 0
- HKEY_CURRENT_USER\Software\FBI Moneypak Virus
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ‘Inspector’
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FBI Moneypak Virus
- HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Policies\System ‘DisableTaskMgr’ = 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protector.exe
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Inspector %AppData%\Protector-[rnd].exe
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\WarnOnHTTPSToHTTPRedirect 0
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\ID 4
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\UID [rnd]
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings\net [date of installation]
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\Con sentPromptBehaviorAdmin 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\Con sentPromptBehaviorUser 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\Ena bleLUA 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AAWTray.exe\Debugger svchost.exe
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCare.exe\Debugger svchost.exe
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVENGINE.EXE\Debugger svchost.exe
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorAdmin” = 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “ConsentPromptBehaviorUser” = 0
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system “EnableLUA” = 0
Safe mode with networking
For users needing access to the Internet or the network they’re connected to. This mode is helpful for when you need to be in Safe Mode to troubleshoot but also need access to the Internet for updates, drivers, removal software, or other files to help troubleshoot your issue.
- This mode will also bypass any issues where Antivirus or Anti Malare applications have been affected/malfunctioning because of the FBI Moneypak infection’s progression.
The plan with this option is to enter your computer in “safe mode with network” and install anti-malware software. Proceed to scan, and remove malicious files.1. Reboot your computer in “Safe Mode with Networking”. As the computer is booting (when it reaches the manufacture’s logo) tap and hold the “F8 key” continuously to reach the correct menu. On the Advanced Boot Options screen, use your keyboard to navigate to “Safe Mode with Networking” and press Enter. Shown below.
- Make sure to log into an account with administrator rights.
- Pull-up the Start menu, enter All Programs and access the StartUp folder.
- Remove “ctfmon” link (or similar).
This seems to be an easy step in removing the FBI virus for many users. If you are interested in learning about ctfmon.exe please click here.Now, move on to the next steps (which is not a necessity if you removed the file above but provides separate options for troubleshooting).3. If you still can’t access the Internet after restarting in safe mode, try resetting your Internet Explorer proxy settings. These 2 separate options and following steps will reset the proxy settings in the Windows registry so that you can access the Internet again.
How To Reset Internet Explorer Proxy Settings
In Windows 7, click the Start button . In the search box, type run, and then, in the list of results, click Run.
In Windows Vista, click the Start button , and then click Run.
In Windows XP, click Start, and then click Run.Copy and paste or type the following text in the Open box in the Run dialog box and click OK:In Windows 7, click the Start button . In the search box, type run, and then, in the list of results, click Run.
In Windows Vista, click the Start button , and then click Run.
In Windows XP, click Start, and then click Run.Copy and paste or type the following text in the Open box in the Run dialog box and click OK:
Restart Internet Explorer and then follow the steps listed previously to run the scannerOption 2
Launch Internet Explorer. In Internet Explorer go to: Tools->Internet Options->Connections tab.
Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK.4. It is now recommended to download Malwarebytes (free or paid version) and run a full system scan to remove FBI Moneypak malware from your computer if you do not have this application on your system.
Thanks balcava, excellent insturctions and what a great website to share. Highly appreciated.
Literally took me 3 minutes to fix with your help.
I think McAfee does cover FBI viruses, they're usually on top of fixing this stuff faster than most.
The FBI are suddenly very interested in this variant of the ransomware/scareware scam that's been plaguing European users for at least a couple of years. This is probably because large numbers of people hit by this scam have contacted the FBI to complain about it.
Brian Krebs has belatedly turned his attention to this ongoing operation, and has written an informative piece about the organisation of this criminal operation. There's a useful little diagram cribbed from 'botnets.fr' which identifies most of the elements of the operation as being based in Russia and Ukraine (oh, what a surprise), but shows that parts of it rely on a US and UK presence. The US-based botnets that run the Blackhole Exploit kit (by which most users become infected) gives the FBI a legal basis for pursuing a robust international investigation. The results of that investigation will probably lead to arrests in a year or two.
This scam persuades only a small percentage of those infected and seeing the threatening message to pay up, but that small percentage still generates an income of about $40,000 to $50,000 a day. No wonder the new variants keep being rolled out.
Most BlackHole exploits succeed because they find a PC has an outdated version of Java installed, as can be seen from this section of a screenshot of a BlackHole exploit control panel, obtained by Kafeine, of botnets.fr :
The full sceenshot can be seen at http://krebsonsecurity.com/wp-content/uploads/2012/08/revetonBHEKit.png
The advice about Java is worth repeating : if you need it, keep it updated. Updates to Java fix known security weaknesses, and are frequent. If you don't need it, uninstall it (I removed it, and haven't needed it since I did so).
Two very important things to realise about this seemingly-straightforward ransom demand :
... the latest Reveton versions will steal all passwords stored on the victim’s PC. What’s more, the FBI’s report indicates Reveton is being bundled with Citadel, which is an extremely powerful and advanced family of malware that can be quite difficult to remove.
(From Brian Krebs' article)
Citadel is the successor to Zeus, and is designed to steal online banking credentials. So an infected system is hit with three related attacks - the initial (and profitable) ransom demand, theft of passwords, and installation of malware to compromise online banking.
The Citadel malware is a close cousin of the Zeus crimeware kit and typically is used as a banker Trojan, stealing users' online banking credentials and allowing attackers to drain victims' bank accounts.
For more information about the Police Trojan scam and its latest US incarnation :