Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


All of my files have been renamed

  • This topic is locked This topic is locked
1 reply to this topic

#1 MikeM44


  • Members
  • 2 posts
  • Local time:08:40 AM

Posted 14 July 2015 - 10:14 AM

Mod Edit:Moved to General Security from Win7 ~~ boopme



I think I may have a virus of some sort, because all of my files have been renamed with the following extension after all of them: .nowodfk


All word, excel, access, photos and pdf files extensions have this extension after them.  Is there a way to reverse this?  Any way to detect the virus, if any exist.  I have McAfee installed and even for a time I could not open it or Internet Explorer.

Edited by boopme, 14 July 2015 - 10:40 AM.

BC AdBot (Login to Remove)


#2 Sintharius


    Bleepin' Sniper

  • Members
  • 5,639 posts
  • Gender:Female
  • Location:The Netherlands
  • Local time:01:40 PM

Posted 14 July 2015 - 10:17 AM


It looks like you are infected with CTB-Locker. Please read the information for this ransomware below.

The newest variants of CTB-Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. Compounding matters, the newer CTB-Locker infection has been seen in combination with KEYHolderTorrentLocker (fake Cryptolocker) or CryptoWall ransomware. Unfortunately, there is still no known method of decrypting your files without paying the ransom and with dual infections, that means paying both ransoms.

A repository of all current knowledge regarding this infection is provided by Grinler (aka Lawrence Abrams), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ

There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion.

If you have any questions it is best to post them in the discussion topic.

To avoid confusion I have asked a Moderator to close this topic.


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users