Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

FBI Cybercrime Division Ransomware


  • Please log in to reply
1 reply to this topic

#1 slarabee

slarabee

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:09:47 AM

Posted 21 May 2013 - 01:28 PM

Hello,

A couple of weeks ago my system got hit with the above stated ransomware.

I was able to get it booted up in safe mode and as I had many maleware tools already loaded on my system I was able to clean the infection (or so I thought).

I had combofix, malewarebytes etc...

However I am getting .tmp files daily that are found by Symantec as a virus:

 

The temp files are always located located in the C;\Users\MyUserName\AppData\Local\temp

 

They have the following format:

 

DWHxxxx.tmp where x = random string of 4 letters and numbers.

 

As Symantec quarentines the files more are created.

 

I ran Norton power ereaser and it found nothing.

 

I ran HitmanPro and came up clean.

 

I ran rkill and it did find anything.

 

Not sure what to do now.

 

Thanks in advance for any help.

 

Sean



BC AdBot (Login to Remove)

 


#2 slarabee

slarabee
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:09:47 AM

Posted 21 May 2013 - 01:56 PM

Please disregard this question I found the answer. This post can be deleted. Sorry for the inconvenience.

 

Sean






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users