If your computer is infected with Trojan.Gpcoder.G, you may follow the procedure on this page to contain this threat. Remove the Trojan at once before it can further harm the system.
Trojan.Gpcoder.G is a harmful computer threat that will encrypt media and MS Office file on the infected system. Then, the Trojan will attempt to extort $120 in order for victims to obtain decryption method. This threat displays a bitmap file that will be set as the default desktop wallpaper. It contains the first part of the ransom message. Additional message and instructions on how to contact the invader is drop on Desktop in a text file.
When this Trojan is executed, it will search the infected computer for files that will match it list. Then it will it will encrypt all files it may found and rename it. It will add .ENCODED as the second extension. If you have a file mybio.doc, Trojan will change it to mybio.doc.ENCODED.
After that, Trojan.Gpcoder.G will replace the existing desktop wallpaper with its own that contains a ransom message. The new desktop wallpaper will contain the following text:
ALL YOUR PERSONAL FILES WERE ENCRYPTED WITH A STRONG ALGORTHYM RSA-1024 AND YOU CAN’T GET ACCESS TO THEM WITHOUT MAKING OF WHAT WE NEED!
READ ‘HOW TO DECRYPT’ TXT-FILE ON YOUR DESKTOP FOR DETAILS
JUST DO IT AS FAST AS YOU CAN!
REMEMBER: DON’T TRY TO TELL SOMEONE ABOUT THIS MESSAGE IF YOU WANT TO GET YOUR FILES BACK! JUST DO ALL WE TOLD.
The threat will also drop another file “HOW TO DECRYPT FILES.txt” on desktop of the infected computer. It contains a much detailed information how victims may contact the attacker in order to recover affected files.
Here is the screenshot image of the ransom message set by the Trojan as the new wallpaper.
Alias: Troj/Ransom-U, GPcoder.j
Damage Level: Low
Systems Affected: Windows 9x, 2000, XP, Vista, Windows 7
How to Remove Trojan.Gpcoder.G
Step 1 : Run a scan with your antivirus program
1. Temporarily Disable System Restore if your system is running on Windows Me/XP. [how to]
2. Start Windows in Safe Mode with Networking.
- From a power-off state, turn on the computer and press F8 on your keyboard repeatedly.
- Your computer will display Windows Advanced Boot Options menu. Select Safe Mode with Networking.
- Windows will boot loading only necessary drivers and system files. Expect that it will run with minimal features and low-resolution display.
3. Open your antivirus program and download the most recent update. This method ensures that your antivirus program can detect even newer variants of Trojan.Gpcoder.G.
Updating your antivirus software is a one-click process. Please refer to your software manual for complete instructions.
4. Once updating is finished, run a full system scan. After the scan, delete all infected items. If unable to clean or delete, better place the threat in quarantine.
Step 2: Run another test with Norton Power Eraser
1. Click on the button below to download Norton Power Eraser from official web site. Save it to your desktop or any location of your choice.
4. Once the file is downloaded, navigate its location and double-click on the icon (NPE.exe) to launch the program.
5. Norton Power Eraser will run. If it prompts for End User License Agreement, please click on Accept.
6. On NPE main window, click on Advanced. We will attempt to remove Trojan.Gpcoder.G components without restarting the computer.
9. On next window, select System Scan and click on Scan now to perform standard scan on your computer.
10. NPE will proceed with the scan. It will search for Trojans, viruses, and malware like Trojan.Gpcoder.G. This may take some time, depending on the number of files currently stored on the computer.
11. When scan is complete. All detected risks are listed. Remove them and restart Windows if necessary.
Alternative Removal Methods for Trojan.Gpcoder.G
Option 1 : Use Windows System Restore to return Windows to previous state
If Trojan.Gpcoder.G enters the computer, there is a big chance that Windows files, registry entries and other essential components are also infected. System Restore can reinstate clean system files by restoring the configuration to an earlier date. The method also replaces compromised files with a clean version. If you have a saved restore point before Trojan.Gpcoder.G infiltrates the PC, we highly encourage you to execute this procedure if none of the above works.
To verify if System Restore is active on your computer, you can type system restore into the Start menu search box. Typing rstrui on the same box and pressing Enter also opens this function.
If previous restore point is saved, you may proceed with Windows System Restore. Click here to see the full procedure.
Ways to Prevent Trojan.Gpcoder.G Infection
Take the following steps to protect the computer from threats. Suggested tools and security setup within installed software helps prevent the same attack on your PC.