How To Remove The International Police Association (IPA) Ransomware Virus

The International Police Association (I.P.A.) Virus

Recent ransomware titled The International Police Association malware has been infecting computers in computers in Austria, Belgium, Switzerland, Germany, Spain, France, Greece, Italy, Finland, Nederland, Poland, Portugal and Sweden. If the infection happened in Spain, this IPA virus will load a Spanish alert message and download Spain’s flag from a remote server (as well for any other country). The IPA virus has recently made it’s appearance in North American countries Canada and the United States, among others, which is when we were alerted of it.

What is The International Police Association Virus?

Alike most other ransomware the IPA virus locks computers or “holds them hostage” by pretending to be the International Police Association and claims the computer user has been associating in cybercrime, child pornography, or zoofilia. To unlock and use the infected computer again the IPA virus demands a fine usually around $50 or $100 to be paid by online credit such as a UKash voucher in European countries. Keep in mind UKash is a legitimate institution and is in no way connected with this malware similar and that other credit systems may be in place due to geographic location of the infected computer.

  • Other aliases/families: Win32/LockScreen.CI.Ransomware, Win32/Trojan, Fake Police Malware
  • Similar Ransomware: Citadel Reveton, FBI Moneypak

International Police Association Virus Removal

International Police Association (I.P.A.) Symptoms

■ Once the Trojan is executed, it determines the infected computer’s IP address, changes different system settings on the infected computer, creates a full screen window, loads fake alert messages, and continues to download all the necessary graphics from a remote server which are will be used per geographic location as discussed before.

■ The International Police Association (I.P.A.) prevents victims from accessing their computer Desktop and displays a fake warning claiming that the operating system is locked by I.P.A because the computer user was involved with cybercrime which may include watching and/or distributing illegal content such as child pornography or zoofilia related content.

International Police Association (I.P.A.) virus warnings from different countries:

■ Ihr Computer wurde gesperrt
Ihr Computer wurde durch das System der automatischen Informationskontrolle gesperrt

IPA Virus Austria Alert

■ Votre ordinateur est bloqué
Votre ordinateur a été bloqué par le système de contrôle automatique informationnel

IPA Virus Belgium Alert

■ El ordenador suyo esta bloqueado
El ordenador suyo fue bloqueado por el sistema del control informativo automatizado

IPA Virus Spain Alert

■ O υπολογιστής σας έχει μπλοκαριστεί

IPA Virus Greece Alert

■ Il suo computer è stato bloccato
il suo computer è stato bloccato da sistema di controllo d’informazione automatico

■ Tietokoneenne lukkiutui

■ Uw computer is geblokkeerd
Uw computer is geblokkeerd door het systeem van een automatische informatiecontrole

■ Ten komputer został zablokowany
Ten komputer został zablokowany przez system automatycznej kontroli informacyjnej

■ O seu computador foi bloqueado
O seu computador foi bloqueado pelo sistema do controlo automatico de informação

■ Datorn har blockerats
Datorn har blockerats av ett system för avtomatisk information kontroll

How to remove the International Police Association Virus

The International Police Association (I.P.A.) virus has not been reported to be aggressive but may progress or become bundled with other malware, as well as the possibility of redistribution.
Some users are still able to access the internet correctly, if this is the case please download the free version of Malwarebytes and proceed to scan and remove the IPA infection. But most of the time, unlike other ransomware the IPA virus allows infected computers to reboot in Safe Mode with Networking to download anti-malware software which his then used to scan and remove IPA malware. Another simple solution is to restore your computer to a date and time before your computer became infected with the International Police Virus.

IPA ransomware removal options:

Different victims, depending on location and progression of the infection will require different removal options. Anti-Malware software and restore are the outlined solutions but may require different steps to achieve the initial process.

  1. Anti-Malware Software – Scan and remove malware
    1. Regular Installation
    2. Install using Command Prompt with Networking
  2. System restore
    1. Start Menu Restore
    2. Safe Mode with Command Prompt
  3. Manual Removal

1. Anti-Malware

The best solution to remove malware including ransomware is Malwarebytes. Malwarebytes provides a free and paid version for continued security. Try Malwarebytes, the Leader in Malware Removal.
[Small_Button class=”lightblue”] Remove Malware [/Small_Button]  
Safe Mode With Networking

For users needing access to the Internet or the network they’re connected to. This mode is helpful for when you need to be in Safe Mode to troubleshoot but also need access to the Internet for updates, drivers, removal software, or other files to help troubleshoot your issue.

  • This mode will also bypass any issues where Antivirus or Anti Malare applications have been affected/malfunctioning because of the FBI Moneypak infection’s progression.

The plan with this option is to enter your computer in “safe mode with network” and install anti-malware software. Proceed to scan, and remove  malicious files.

1. Reboot your computer in “Safe Mode with Networking”.  As the computer is booting tap the “F8 key” continuously to reach the correct menu.Use your keyboard to navigate to “Safe Mode with Networking” and press Enter. Shown below.

Safe mode with networking
2. If you can easily access the internet to install removal software do so, otherwise launch Internet Explorer. In Internet Explorer go to: Tools->Internet Options->Connections tab.
Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK.

LAN Tab

3. It is now recommended to download Malwarebytes and run a full system scan to remove Antivirus Live malware from your computer if you do not have this application on your system.

2.System Restore

Depending on the progression of the International Police Association ransomware virus, different steps may be needed to simply restore your computer depending on restrictions implied by the IPA infection. Outlined bellow are two different solutions. If you can not perform a start menu restore, proceed to the Safe Mode with Command Prompt restore instructions.

Start Menu Restore

Start Menu System RestoreStandard directions to quickly access Window’s System Restore Wizard.

1. Access windows Start menu and click All Programs.
2. Click and open Accessories, click System Tools, and then click System Restore.‌
If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
3. Restore your computer to a date and time before infection.

Safe Mode With Command Prompt Restore

If you can not access your operating system, this is the suggested step.
1. Restart/reboot your computer system. Unplug if necessary.
2. Enter your computer in “safe mode with command prompt”. To properly enter safe mode,repeatedly press F8 upon the opening of the boot menu.

Safe mode with command prompt

3. Once the Command Prompt appears you only have few seconds to type “explorer” and hit Enter. If you fail to do so within 2-3 seconds, the FBI MoneyPak ransomware virus will not allow you to type anymore.

Comand Prompt Type Explorer

4. Once Windows Explorer shows up browse to:

  • Win XP: C:\windows\system32\restore\rstrui.exe and press Enter
  • Win Vista/Seven: C:\windows\system32\rstrui.exe and press Enter

System32 rstrui
5. Follow all steps to restore or recover your computer system to an earlier time and date, before infection to complete.
Restore system files and settings
More information on Window’s system restore: http://windows.microsoft.com/en-US/windows-vista/System-Restore-frequently-asked-questions

Safe Mode With Networking

For users needing access to the Internet or the network they’re connected to. This mode is helpful for when you need to be in Safe Mode to troubleshoot but also need access to the Internet for updates, drivers, removal software, or other files to help troubleshoot your issue.

  • This mode will also bypass any issues where Antivirus or Anti Malare applications have been affected/malfunctioning because of the International Police Association infection’s progression.

The plan with this option is to enter your computer in “safe mode with network” and install anti-malware software. Proceed to scan, and remove  malicious files.

1. Reboot your computer in “Safe Mode with Networking”.  As the computer is booting tap the “F8 key” continuously to reach the correct menu.Use your keyboard to navigate to “Safe Mode with Networking” and press Enter. Shown below.

Safe mode with networking
2. If you can easily access the internet to install removal software do so, otherwise launch Internet Explorer. In Internet Explorer go to: Tools->Internet Options->Connections tab.
Click Lan Settings button and uncheck the checkbox labeled Use a proxy server for your LAN. Click OK.

LAN Tab

3. It is now recommended to download Malwarebytes and run a full system scan to remove the IPA malware from your computer if you do not have this application on your system.

3. Manual Removal

Outlined below are instructions to kill the fake IPA malware process, remove associated files, and delete registry values associated with the ransomware.

1.Restart your computer. As your computer reboots but before the desktop launches, press “F8″ key constantly. Use the arrow keys to highlight the “Safe Mode with Networking” option, and then press ENTER.

2. Stop the possess of International Police Association. Go to Window’s Task Manager (Alt+Ctrl+Delete) and stop the IPA ransomware process detailed below.

Windows Task manager

Process name: Protector-[rnd].exe

3. Search for and delete related files from your infected computer.

File to search for and remove: %AppData%\Protector-[rnd].exe

4. Remove the registry entries associated as below in Registry Editor. Type Regedit in the Window’s Start menu and press Enter to bring up the registry editor.

Delete IPA malware registry entries:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ERROR_PAGE_BYPASS_ZONE_CHECK_FOR_HTTPS_KB954312
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings “WarnOnHTTPSToHTTPRedirect” = 0
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegedit” = 0
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableRegistryTools” = 0
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = 0
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Inspector”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “ID” = 0
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net” = “2012-2-17_2”
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “UID” = “rudbxijemb”
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpcc.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashDisp.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mostat.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\platin.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tapinstall.exe
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File

Sean Doyle

http://Botcrawl.com

Sean Doyle is an engineer from Los Angeles, California. Sean's primary focuses include Internet Security, Web Spam, and Online Marketing.

Comment ( 1 )

  1. Replygag
    oh thank you so much it is really helpful. it did work for me. the stupidest thing when i call for 1888...nuber they asked me $146 to remove it. the explorere system work good thanks hoooo