Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


I have a CTB locker infection please help

  • This topic is locked This topic is locked
1 reply to this topic

#1 stugrip


  • Members
  • 2 posts
  • Local time:01:08 PM

Posted 24 December 2014 - 03:43 AM

I came home from working away to find the family computer had lost its 3 user profiles. December 20th

I reinstalled windows and my old operating system was put into "windows old" folder.

I then discovered my file names had been extended with SYUPCBA, then found I had been infected 17 dec and many file names changed.

I have installed SpyBot S&D but I am unsure weather it has stopped further infection.


After reading the posts here on this forum it appears (if I am correct) unless I pay a ransom, if I don't have backups I am screwed!  on searching *SYUPCBA I find 20,000 files infected on my 4 drives.


What can I do?


Has spybot removed the trojan ie will it no longer infect more files?

If I don't pay the ransom have I lost my files?

should I take off or trash "windows old from my c drive?


please help

Edited by hamluis, 24 December 2014 - 07:40 AM.
Moved from Gen Security to Am I Infected - Hamluis

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,734 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:08 AM

Posted 24 December 2014 - 10:32 AM

A repository of all current knowledge regarding CTB Locker and Critroni Ransomware is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CTB Locker (Critroni) does and provide information for how to deal with it. Newer CTB Locker variants typically change the extension of encrypted files using a 6-7 length extension with random characters. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

More information in this article: New Critroni variant offers free test decryption and now uses CTB2 extension. Unfortunately, there is still no known method of decrypting your files without paying the ransom.

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users