Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Files encrypted. No system restore points available.


  • This topic is locked This topic is locked
1 reply to this topic

#1 vr6ownzu

vr6ownzu

  • Members
  • 29 posts
  • OFFLINE
  •  
  • Local time:09:41 PM

Posted 09 September 2015 - 12:18 AM

Help.  My files were somehow encrypted.  I ran malwarebytes and it cleaned up the system, but I am still unable to access my files.  I attempted to run a system restore, but it's saying no points are available.  What can I do? 

 

 

Computer Info:

 

Custom build running Windows 7 Ultimate, intel core i5-2500k @ 3.3Ghz and 8gb of ram. 

 

 

 

 

 

 

RESULTS OF 1st MALWAREBYTES SCAN:

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 9/8/2015
Scan Time: 7:36 PM
Logfile: scan log 1.txt
Administrator: Yes
 
Version: 2.1.8.1057
Malware Database: v2015.09.08.07
Rootkit Database: v2015.08.16.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7
CPU: x64
File System: NTFS
User: Julio
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 537835
Time Elapsed: 18 min, 41 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled
 
Processes: 3
Trojan.Miuref, C:\Users\Julio\AppData\Local\Temp\{A37B38CD-F133-4032-9C75-E87FC89570AE}\TMPA37F.tmp, 9984, Delete-on-Reboot, [35420924abe00135a1d4eb6f53b29769]
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Temp\{1B4F6A5F-0BF0-4B5F-8158-36F07896EA79}\TMPC3FE.exe, 18472, Delete-on-Reboot, [c5b23bf27b10fc3a7452a535cf320ef2]
Spyware.InfoStealer, C:\Users\Julio\AppData\Local\Temp\1476.tmp.exe, 17492, Delete-on-Reboot, [df9888a55635da5c23ba0bcfa55c15eb]
 
Modules: 6
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Unbmedia\pvczixkm.dll, Delete-on-Reboot, [d6a1bb72ef9c46f0c5d993e553aec838], 
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Unbmedia\pvczixkm.dll, Delete-on-Reboot, [d6a1bb72ef9c46f0c5d993e553aec838], 
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Unbmedia\pvczixkm.dll, Delete-on-Reboot, [d6a1bb72ef9c46f0c5d993e553aec838], 
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Unbmedia\pvczixkm.dll, Delete-on-Reboot, [d6a1bb72ef9c46f0c5d993e553aec838], 
Trojan.Miuref, C:\Users\Julio\AppData\Local\dwogakd.dll, Delete-on-Reboot, [a7d0e746e8a32511fd77aeacea1b956b], 
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Uvdvmedia\tqrmelsf.dll, Delete-on-Reboot, [8fe85bd218732f071886f8808b7619e7], 
 
Registry Keys: 6
Trojan.FakeMS, HKLM\SOFTWARE\CLASSES\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}, Delete-on-Reboot, [1c5b35f85c2fde58c2d1e8c7a85902fe], 
Trojan.FakeMS, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000_Classes\CLSID\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}, Delete-on-Reboot, [1c5b35f85c2fde58c2d1e8c7a85902fe], 
PUP.Optional.Spigot, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{350D51FE-0516-446C-A740-C5F9C7F0501E}, Quarantined, [730459d48902f83e9450971b7b8939c7], 
Hijack.Trojan.Siredef.C, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000_Classes\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}, Quarantined, [b4c35fcef39847ef8ba9bd44bb4540c0], 
Hijack.Trojan.Siredef.C, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}, Delete-on-Reboot, [b4c35fcef39847ef8ba9bd44bb4540c0], 
Trojan.ZAccess, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000_Classes\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32, Quarantined, [e1963df0bbd05fd7af586d568c788e72], 
 
Registry Values: 11
Trojan.Miuref, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|dwogakd, rundll32 "C:\Users\Julio\AppData\Local\dwogakd.dll",dwogakd, Quarantined, [a7d0e746e8a32511fd77aeacea1b956b]
Spyware.InfoStealer, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|NetworkInformer, C:\Users\Julio\AppData\Local\Temp\1476.tmp.exe, Quarantined, [df9888a55635da5c23ba0bcfa55c15eb]
Trojan.CryptoLocker, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|4bd0fbc, C:\4bd0fbc6\4bd0fbc6.exe, Quarantined, [84f3ca63d3b83402bec24d0d8382da26]
Trojan.CryptoLocker, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|*bd0fbc, C:\4bd0fbc6\4bd0fbc6.exe, Quarantined, [84f3ca63d3b83402bec24d0d8382da26]
Trojan.CryptoLocker, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|4bd0fbc6, C:\Users\Julio\AppData\Roaming\4bd0fbc6.exe, Quarantined, [88ef0c21e1aaf93d8bf52634d82d56aa]
Trojan.CryptoLocker, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|*bd0fbc6, C:\Users\Julio\AppData\Roaming\4bd0fbc6.exe, Quarantined, [88ef0c21e1aaf93d8bf52634d82d56aa]
Trojan.MalPack.VB, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Uvdvmedia, C:\Users\Julio\AppData\Local\Uvdvmedia\TMPC3FE.exe, Quarantined, [7dfa57d61d6e3cfa07bf5b7fbb46738d]
PUP.Optional.Spigot, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{350D51FE-0516-446C-A740-C5F9C7F0501E}|URL, http://search.yahoo.com/search?fr=chr-greentree_ie&ei=utf-8&ilc=12&type=714647&p={searchTerms}, Quarantined, [730459d48902f83e9450971b7b8939c7]
Trojan.Ransom.CryptoWall, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|CryptoUpdate, C:\Windows\system32\regsvr32.exe /s "C:\Users\Julio\AppData\Roaming\Microsoft\Crypto\RSA\cert_v175_0.tpl", Quarantined, [dd9a1716385367cf1a629ed1dc287090]
Trojan.Ransom.CryptoWall, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|CryptoUpdate, C:\Windows\system32\regsvr32.exe /s "C:\Users\Julio\AppData\Roaming\Microsoft\Crypto\RSA\cert_v175_0.tpl", Quarantined, [dd9a1716385367cf1a629ed1dc287090]
Trojan.ZAccess, HKU\S-1-5-21-4205528207-3805044749-2378282846-1000_Classes\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32, C:\$Recycle.Bin\S-1-5-21-4205528207-3805044749-2378282846-1000\$48ea0d5914e594151d933543e2876001\n., Quarantined, [e1963df0bbd05fd7af586d568c788e72]
 
Registry Data: 0
(No malicious items detected)
 
Folders: 1
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}, Delete-on-Reboot, [a8cfc766e4a7ef47b8c11ed9f60c46ba], 
 
Files: 24
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Unbmedia\pvczixkm.dll, Delete-on-Reboot, [d6a1bb72ef9c46f0c5d993e553aec838], 
Trojan.Miuref, C:\Users\Julio\AppData\Local\Temp\{A37B38CD-F133-4032-9C75-E87FC89570AE}\TMPA37F.tmp, Delete-on-Reboot, [35420924abe00135a1d4eb6f53b29769], 
Trojan.Miuref, C:\Users\Julio\AppData\Local\dwogakd.dll, Delete-on-Reboot, [a7d0e746e8a32511fd77aeacea1b956b], 
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Temp\{1B4F6A5F-0BF0-4B5F-8158-36F07896EA79}\TMPC3FE.exe, Delete-on-Reboot, [c5b23bf27b10fc3a7452a535cf320ef2], 
Trojan.Miuref.THD, C:\Users\Julio\AppData\Local\Uvdvmedia\tqrmelsf.dll, Delete-on-Reboot, [8fe85bd218732f071886f8808b7619e7], 
Spyware.InfoStealer, C:\Users\Julio\AppData\Local\Temp\1476.tmp.exe, Delete-on-Reboot, [df9888a55635da5c23ba0bcfa55c15eb], 
Trojan.CryptoLocker, C:\4bd0fbc6\4bd0fbc6.exe, Quarantined, [84f3ca63d3b83402bec24d0d8382da26], 
Trojan.CryptoLocker, C:\Users\Julio\AppData\Roaming\4bd0fbc6.exe, Quarantined, [88ef0c21e1aaf93d8bf52634d82d56aa], 
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Uvdvmedia\TMPC3FE.exe, Quarantined, [7dfa57d61d6e3cfa07bf5b7fbb46738d], 
Trojan.FakeMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\wer.dll, Delete-on-Reboot, [1c5b35f85c2fde58c2d1e8c7a85902fe], 
Trojan.Zbot.RV, C:\Users\Julio\AppData\Roaming\vcwedw.exe, Quarantined, [eb8cd6577b1069cde113cb95a75921df], 
Trojan.Zbot.RV, C:\Users\Julio\AppData\Roaming\vcwgbo.exe, Quarantined, [20576bc20883999d0aea134d8977966a], 
Trojan.CryptoLocker, C:\Users\Julio\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4bd0fbc6.exe, Quarantined, [0d6a97969deeb3839de39cbe00059070], 
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Temp\7D3A.tmp, Quarantined, [492e86a7395225112eb795cbc838ac54], 
Trojan.Miuref, C:\Users\Julio\AppData\Local\Temp\revisal.dll, Quarantined, [0c6bba739cefbb7b5e17a4b6b550d42c], 
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Temp\{6C71EF3D-FB50-46C0-B754-9FE81C10C33B}\TMPF5AF.exe, Quarantined, [c7b056d7b3d8bc7a2a9cfae023de31cf], 
Trojan.MalPack.VB, C:\Users\Julio\AppData\Local\Temp\{C217DFBD-5785-4F9C-A67F-9DAE3DB3EE9B}\TMPDCEF.exe, Quarantined, [b8bf909d2b6087af6a5ca733e02143bd], 
Trojan.Ransom.CryptoWall, C:\Windows\Tasks\CryptoUpdate.job, Quarantined, [2057fc31127965d1f8830b6428dc669a], 
Trojan.FileCryptor.Trace, C:\Users\Julio\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_dpcxe.html, Quarantined, [2453111caae19a9cc8fdcfa67193f907], 
Trojan.FileCryptor.Trace, C:\Users\Julio\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\restore_files_dpcxe.txt, Quarantined, [661170bd7417ea4cf2d4195c32d260a0], 
Trojan.Ransom.CryptoWall, C:\Users\Julio\AppData\Roaming\Microsoft\Crypto\RSA\cert_v175_0.tpl, Delete-on-Reboot, [dd9a1716385367cf1a629ed1dc287090], 
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\8afc49b02429a, Delete-on-Reboot, [a8cfc766e4a7ef47b8c11ed9f60c46ba], 
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\restore_files_dpcxe.html, Quarantined, [a8cfc766e4a7ef47b8c11ed9f60c46ba], 
Trojan.Clicker.FMS, C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\restore_files_dpcxe.txt, Quarantined, [a8cfc766e4a7ef47b8c11ed9f60c46ba], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
 
 
 
RESULTS OF 2ND SCAN
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 9/8/2015
Scan Time: 8:01 PM
Logfile: scan log 2.txt
Administrator: Yes
 
Version: 2.1.8.1057
Malware Database: v2015.09.08.07
Rootkit Database: v2015.08.16.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7
CPU: x64
File System: NTFS
User: Julio
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 536160
Time Elapsed: 20 min, 22 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 


BC AdBot (Login to Remove)

 


m

#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 50,606 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:41 PM

Posted 09 September 2015 - 11:50 AM

You already have an open topic here and are receiving assistance. Please do not start new threads or duplicate topics as this causes confusion and makes it more difficult to get the help you need to resolve your issues when asking for and receiving assistance elsewhere. Further, it necessitates staff spending time with housecleaning to remove or close those duplicate postings...time which could have been provided to others needing assistance.

Please continue in your other topic. To avoid confusion this thread is closed.

The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users