Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

High CPU Usage. No system restore. Wallpaper Changed.


  • Please log in to reply
1 reply to this topic

#1 snapjaw

snapjaw

  • Members
  • 72 posts
  • OFFLINE
  •  

Posted 29 December 2014 - 08:25 PM

Hi, the background on my brother's laptop was changed to some statement about a virus and a need to pay to fix it. Here is the pic of the wallpaper.

 

 

300h2lf.png

 

 

 

Also the CPU usage is almost always at 100% so everything goes super slow. I am not able to do a system restore and Malwarebytes protection monitoring can not be turned on. Not even Malwarebytes chameleon works. Any help would be greatly appreciated.

 

System Specs:

Toshiba Satellite L505

Windows 7 Home Premium Service Pack 1

64- bit operating system



BC AdBot (Login to Remove)

 


m

#2 Condobloke

Condobloke

    Outback Aussie @ 54.2101 N, 0.2906 W


  • Members
  • 5,582 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:05 AM

Posted 29 December 2014 - 08:56 PM

A repository of all current knowledge regarding CTB Locker and Critroni Ransomware is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CTB Locker (Critroni) does and provide information for how to deal with it. Newer CTB Locker variants typically change the extension of encrypted files using a 6-7 length extension with random characters. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

More information in this article: New Critroni variant offers free test decryption and now uses CTB2 extension. Unfortunately, there is still no known method of decrypting your files without paying the ransom.

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

Credit: quietman7, Global Moderator


Condobloke

Outback Australian  

 

fed up with Windows antics...??

 

LINUX IS THE ANSWER

 

I USE LINUX MINT EXCLUSIVELY... NO DUAL BOOT, NO VIRTUAL MACHINE

 

 

 Failure is not an option. It comes bundled with your Microsoft product.

 

 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users