Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Help_Your_Files Crypto type virus

  • This topic is locked This topic is locked
1 reply to this topic

#1 Goldfish101


  • Members
  • 10 posts
  • Local time:08:39 AM

Posted 21 January 2016 - 02:06 PM

My first post so many thanks to those that listen and help regularly.
Hope someone can help. Home PC got infected with a virus. Got the virus removed and all the virus files deleted. Scanned since a number of times and now nothing. However it has left a sorry mess. I know a very limited amount about PC And not enough to deal with this. Brought it to a local PC store and he felt it was just encryption with little hope.
For what it is worth this is what I know has happened
Virus has made changes to the registry and seems to have done the following?
It partitioned Drives- hidden External verbatim hard drive partition as well. Seems like some type of USB connection added which makes the verbatim drive not seen unless the driver is accessed on this PC
May have also changed the boot sequence of drives
Posted some I would say 10,000 BMP files, the help your file statement on all folders that had word, music files
Deleted restore points so that restore did not work.
Set up a Guest Account and also changed user permissions on some commands that seem to be hard to undo. Now seem to have got permissions changed yet that may change once scheduler kicks in again. Scheduler says corrupted for many task
Also seem to be Trusted Installer users set up
Set up a Homegroup. May have to do with Windows encryption 128 bit on groups? Wild guess
Set up a WMPnetwork Svc user with read only permission on files.
Set up what seems to be a mirror library with a download folder with programmes such as Google Chrome, Dropbox
Changed Security Settings and changed permission to Accounts Everyone. Will not allow Permissions to be changed on some Users although that seems to have changed perhaps because the PC was powered off for a period
Set up new drives and populated two Drives Y&E with files which look bootable as they have those type of files in them. E now has the files missing since brought to local PC store to gave a look at it. When it is open it now seems to load from library.
Changed all file settings to open with Windows Shell Common. Tried to open some on another PC says file not supported and when you go to change the file name to say JPEG say is need permission of Everyone to make a change to file name.
Think that GWX.exe seems compromised as it was working heavily in services and
Task manager has been corrupted with multiple errors and new daily tasks are set (not mine) which cant be undone from Windows. Did not try in safe mode.
Windows Internet Explorer now hanging regularly. Google Chrome not hanging.
Verbatim Hard Drive when connected constantly working
When PC opens a D Hello icons shows obviously connected to the D boot. D is called factory image That has stopped since the trip to the PC shop.
Anyway I said I would have one more go at this and if it is a lost cause then so be it. I'll just wipe it and go back to a back up that I have separate. Unfortunately it is not up to date and there are some recent files I would like to get back such as recent photos of family.
Anyway that's my tale of woe. Thanks for reading and if someone can help it would be much appreciated.

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,954 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:39 AM

Posted 21 January 2016 - 07:37 PM

CryptoWall 4.0 leaves files (ransom notes) with names like HELP_YOUR_FILES.TXT, HELP_YOUR_FILES.HTML and HELP_YOUR_FILES.PNG and will encrypt the actual filename of an encrypted file as well as well as the data contained in it. Each encrypted file will have a unique name with random characters (0ausbffwh.p5, 72lcvn.iv6nn, x83o8x.ux7, etc). CryptoWall 4.0 uses a .JS file to download and execute a file from the %temp% folder. The initial installer injects the program that actually encrypts data into explorer.exe/svchost.exe. More information in this BC news article...encrypted-files.jpg

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0, CryptoWall 3.0 & CryptoWall 4.0 is provided by Grinler (aka Lawrence Abrams), in this topic: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

As with most ransomware infections...the best solution for dealing with encrypted data is to restore from backups. If that is not a viable option, the only other alternative is to save your data as is and wait for a possible breakthrough...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a possible solution so save the encrypted data and wait until that time.

There is an ongoing discussion in this topic where you can ask questions and seek further assistance.Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.

The BC Staff

Note: If further investigation discloses you are not dealing with CryptoWall, send me a PM and I will reopen this topic.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users