Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 92790 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

Help please - infected with Cryptolocker virus or copycat (Australia)

cryptolocker virus help

  • This topic is locked This topic is locked
3 replies to this topic

#1 Ash43

Ash43

    New Member

  • New Member
  • Pip
  • 1 posts

Posted 11 November 2014 - 11:58 AM

Hello,

My laptop has for just been infected and nearly all files are encrypted (12 November 2014).

I have gone to the website - https://www.decryptcryptolocker.com - but it says not encrypted, maybe because this is a copycat virus.

 

I want access to the files badly.  I am under pressure to get these files - as I have a lot of work not saved elsewhere, including some tenders I am submitting and working on to try to win work.  Yes, I will do regular back-ups from now on...

 

Is it safe for me to download the few 'untouched files' onto memory stick and use in another computer - or will virus carry over to that computer?

 

I can upload encrypted files.  What is best file to upload (small/large?).

 

Can you please help.

 

I have been trying to upload a picture of the virus as it presents on my computer which asks for money (I did a screen shot onto a word doc), but I'm not allowed to upload this on this website.  Sorry, I am not sure why.

 

Best,

Ash


Edited by Ash43, 11 November 2014 - 12:09 PM.

    Advertisements

Register to Remove


#2 LiquidTension

LiquidTension

    SuperMember

  • Retired Classroom Teacher
  • 2,566 posts

Posted 16 November 2014 - 06:44 AM

Hello Ash43, welcome to WhatTheTech's Malware Removal forum!
 
My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.
If you would allow me to call you by your first name I would prefer that.  :)
 
======================================================
 
Please read through the points below to ensure this process moves as quickly and efficiently as possible.

  • Please ensure you read through my instructions thoroughly, and carry out each step in the order specified.
  • Please do not post logs using the CODEQUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.
  • Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation and providing the best set of instructions for you.
  • Please backup important files before proceeding with my instructions. Malware removal can be unpredictable.  
  • If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.
  • Topics are locked if no response is made after 4 days. Please inform me if you require additional time to complete my instructions.
  • Ensure you are following this topic. Click etYzdbu.png at the top of the page. 
     

======================================================
 
Depending on the ransomware present, recovery of your files without paying the ransom may not be possible I'm afraid. 
Please run the following scan so I can ascertain the state of your machine, and determine the ransomware present. 
 
STEP 1

xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan

  • Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.
  • Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.
  • Right-Click FRST.exe / FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Click Yes to the disclaimer.
  • Ensure the Addition.txt box is checked.
  • Click the Scan button and let the programme run.
  • Upon completion, click OK, then OK on the Addition.txt pop up screen.
  • Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. 
     

======================================================
 
STEP 2
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

  • FRST.txt
  • Addition.txt

50QfLth.png

 

Would you like to help others with malware removal? Join our Classroom and learn how!


#3 LiquidTension

LiquidTension

    SuperMember

  • Retired Classroom Teacher
  • 2,566 posts

Posted 18 November 2014 - 06:42 PM

Hello,

Do you still require assistance?

50QfLth.png

 

Would you like to help others with malware removal? Join our Classroom and learn how!


#4 LiquidTension

LiquidTension

    SuperMember

  • Retired Classroom Teacher
  • 2,566 posts

Posted 19 November 2014 - 07:55 AM

Due to inactivity this topic will be closed.
If you need help please start a new thread.

New members follow the instructions here http://forums.whatth...ed_t106388.html and start a new topic

50QfLth.png

 

Would you like to help others with malware removal? Join our Classroom and learn how!

Related Topics




Also tagged with one or more of these keywords: cryptolocker virus, help

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users