Virus Profile: Generic.grp!jx

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 10/1/2012
Date Added: 10/1/2012
Origin: Unknown
Length: Varies
Type: Trojan
Subtype: Generic
DAT Required: 6524
Removal Instructions


This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Aliases –

Avast  - Win32:Ransom-TY [Trj]
Microsoft - Trojan:Win32/Weelsof.C
Symantec - Trojan.Ransomlock.X
Kaspersky - Trojan.Win32.Weelsof.po
Nod32  - Win32/Weelsof.B trojan

Indication of Infection

Presence of above mentioned activities.

Methods of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

Virus Characteristics

"Generic.grp!jx" is a Trojan that gains control of the affected computer by locking the screen and preventing the user from accessing the desktop as well as Task manager.

Upon execution the system gets locked and does not allow the user to login even in safe mode
Upon execution, it tries to copy itself to the following location

  •  %Allusersprofile%\Application Data\vewcjctfjfymifd
  •  %windir%\system32\runas.exe 
  •  %Temp%\~DF647E.tmp
  •  %Appdata%\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
  •  %Appdata%\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

Upon execution, it tries to below IP address through remote port 80

  •  lovelove.rea[Removed]
  •  201.155.[Removed].5
  •  89.226. [Removed].125
  •  re454[Removed]
  •  5.63. [Removed].201:443

The below are the registry values has been added to the system

  • HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0483ED3399AC3608058722EDBC5E4600E3BEF9D7\Blob: [Binary Data]
  • HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\00EA522C8A9C06AA3ECCE0B4FA6CDC21D92E8099\Blob: [Binary Data]
  • HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\049811056AFE9FD0F5BE01685AACE6A5D1C4454C\Blob: [Binary Data]
  • HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0B77BEBBCB7AA24705DECC0FBD6A02FC7ABD9B52\Blob: [Binary Data]

This Trojan creates the following Mutex in the infected machines:



All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!