FBI GreenDot MoneyPak virus removal instructions
These days a really serious threat attacks various PCs, primarily located in the United States of America and in Canada. Its name is FBI virus (as quoted by some users in their search queries). However, it has nothing to do with Federal Bureau of Investigation and the US Department of Justice (DOJ). You need to realize this fact very well. The very fact that you know about the program being a virus is the key to avoid unpleasant outcome connected with this malware. The virus belongs to the category classified by us as “ransomware”. This is a malicious software that hijacks the entire desktop of the infected PC with its special scary background, saying that you have supposedly committed various crimes via your computer, thus having violated all earthly and heavenly laws. In particular, the malware may accuse you of watching illegal information and media over the Internet, spreading illegal copies of video and audio recordings with violation of ownership rights, and committing many other fake crimes that you’ve never thought of doing. The malware then tells that this warning comes from FBI and that you should pay a special fine (penalty or forfeit) in order to have your system unlocked. This information must not be treated by you as serious.
GreenDot MoneyPak payment system is being actively used by hackers in order to collect money from users who were deceived by FBI GreenDot MoneyPak ransomware. In particular, users are asked by fraudsters to specify the voucher (PIN) code in the special box. In some cases the fraudsters instruct users to pay the fine by indicating the above-mentioned financial information via email specifically created by them, which is firstname.lastname@example.org . Of course, doing as instructed by the malware developers is a serious mistake. And if you do so the chances are that you will never get your money back. So, be extremely careful when this hoax actually attacks your workstation. Remember that this fake notice is nothing but the scareware that aims only to make you really scared for the destiny of your workstation, and on this basis to make you waste your funds for nothing good.
There are, in fact, various versions of FBI virus (ransomware). All of them are extremely dangerous and eventually ask you to effect the payment supposedly as the fine (that varies from USD 100 to USD 300). However, instead of performing the malicious instructions of the fraudsters you should immediately seek for assistance from the reliable security software. We recommend you to follow this specific removal guide that is meant to assist you the best we can. So, be patient enough and try to follow the below-mentioned guidelines elaborated by us. This is how you will manage to get rid of FBI GreenDot MoneyPak malware.
Ransomware removal solutions
Solution 1 (automatic)
NB! This solution is applicable for all GreenDot MoneyPak, Ukash and Paysafecard ransomwares.
- Reboot your system and press F8 repeatedly while it is restarting.
- Select Safe Mode with Networking.
- Click Start and in the open space type Run, or press [Win]+R on keyboard.
- Type msconfig and press “OK“.
- Disable startup items rundll32 turning on any application from Application Data.
- Reboot your computer once again.
- Scan your system with GridinSoft Trojan Killer to identify the infected file and delete it.
NB! Some versions of these viruses disable all safe modes, but give a short gap that you can use to run anti-malware tools. Then act as follows:
- Reboot normally.
- Click Start and in the open space type Run.
- Enter the text http://trojan-killer.net/download.php in the open field.
- If the malware is loaded, just press Alt+Tab once and keep entering the string blindly then press Enter. Press Alt+tab and then R (letter) a couple of times. The process of ransomware virus should be killed after you succeed to download, install our recommended software and scan your system with it.
Solution 2 (automatic)
- Go to your friend, relative or anybody else who has computer with Internet connection.
- Take your USB flash drive / Memory Stick with you.
- Download GridinSoft Trojan Killer installation file from this site http://trojan-killer.net/download.php and save it to your USB flash drive / Memory Stick.
- Get back to your infected PC and insert the USB Drive / Memory Stick into the respective USB slot.
- Perform hard reset (press reset button on your computer) if your infected PC has been on with ransomware’s background. If not, then simply turn your PC on.
- Before the very boot process begins keep repeatedly hitting “F8” button on your keyboard.
- In the window that appeared select “Safe Mode with Command Prompt” option and press Enter.
- Choose your operating system and user account which was infected with ransomware virus.
- In the cmd.exe window type “explorer” and press “Enter” button on your keyboard.
- Select “My Computer” and choose your USB flash drive / Memory Stick.
- Run the installation file of GridinSoft Trojan Killer. Install the program and run scan with it. (update of the program will not work for “Safe mode with command prompt” option)
- When the hijackers are successfully disabled (fixed) by GridinSoft Trojan Killer you may close GridinSoft Trojan Killer application.
- In the cmd.exe window type “shutdown /r /t 0” and press “Enter” button on your keyboard.
- Upon system reboot your PC will be unlocked and you will be able to use it just as before the infection took pace.
- However, it is recommended that you now update GridinSoft Trojan Killer and run the scan with it again to remove the source of the infections causing ransomware virus to infect your PC.
Similar automatic removal video
Solution 3 (manual)
- Restart your system into “Safe Mode with Command Prompt“. While the PC is booting press the “F8 key” continuously, which should present the “Windows Advanced Options Menu” (for Windows XP) or “Advanced Boot Options” (for Windows 7 and Vista) as presented in the image below. Apply the arrow keys in order to move to “Safe Mode with Command Prompt” and hit Enter key of your keyboard. Login as the same user you were previously logged in under the normal Windows mode.
- Once Windows boots successfully, the Windows command prompt would appear as described at the screenshot below. At the command prompt, type-in the word “explorer.exe“, and press Enter. Windows Explorer should open. Please do not yet close it. You can minimize it for a while.
- Afterwards open the Registry editor by applying the same Windows command prompt. Type-in the word “regedit.exe” and hit Enter button of your keyboard. The Registry Editor should open.
- Find the following registry entry:
- In the right-side panel select the registry entry named Shell. Right click on this registry key and select “Modify” option. Its default value should be “Explorer.exe“. However, ransomware virus did its job, and so after you click “Modify” you would see totally different value of this registry entry.
- Copy the location of the modified value of the above-mentioned registry entry to the piece of paper or memorize its location. It shows where exactly the main executable of ransomware virus is located.
- Modify the value of the registry entry back to “explorer.exe” and save the settings of the Registry Editor.
- Go to the location indicated in the value of modified registry entry. Remove the malicous file. Use the file location you copied into the piece of paper or otherwise noted in step in previous step.
- Get back to “Normal Mode“. In order to reboot your system, when at the command prompt, type-in the following phrase “shutdown /r /t 0” (without the quotation marks) and hit Enter button.
- The virus should be gone. However, in order to clean your PC from other possible virus threats and malware remnants, make sure to download and run GridinSoft Trojan Killer.