Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Locky virus

  • This topic is locked This topic is locked
2 replies to this topic

#1 alexkennedy


  • Members
  • 1 posts
  • Local time:12:39 AM

Posted 08 May 2016 - 08:13 AM

I have just cleaned out my PC after a LOCKY attack.  I had to dump 240,000 files, some of which are impossible to replace.


I cannot find out how to remove the front screen text that that they implant.  Any suggestion would be appreciated.


How did this virus come through Malwarebytes professional and two other paid for protection programs?


I receive many inquiries from clients with equipment lists attached; what protection should I be using?


All suggestions welcome.



Edited by hamluis, 08 May 2016 - 10:35 AM.
Moved from Win 10 Discuss to Ransomeware - Hamluis.

BC AdBot (Login to Remove)


#2 rpbtf


  • Members
  • 26 posts
  • Gender:Male
  • Location:Germany
  • Local time:01:39 AM

Posted 08 May 2016 - 11:15 AM


you could try Emsisoft Emergency Kit (http://www.bleepingcomputer.com/download/emsisoft-emergency-kit/) to remove the message screen.

What anti-virus program do you use? Make sure, you use only one real-time scanner. Malwarebytes Anti-Malware is not an anti-virus program.


Choosing an Anti-Virus Program
Supplementing your Anti-Virus Program with Anti-Malware Tools

#3 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,751 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:07:39 PM

Posted 11 May 2016 - 06:41 AM

Please read section :step2: in this topic which explains the most common methods Crypto malware and other forms of ransomware is typically delivered and spread.

For the best defensive strategy to protect yourself from malware and ransomware infection, see my comments (Post #2) in this topic.

Crypto malware ransomware is typically programmed to automatically remove itself...the malicious files responsible for the infection...after the encrypting is done since they are no longer needed. Unfortunately, most victims do not realize they have been infected until the ransomware displays the ransom note and the files have already been encrypted. As such, they don't know how long the malware was on the system before being alerted or if other malware was installed along with the ransomware. If other malware was involved it could still be present so be sure to perform full scans with your anti-virus.

If your antivirus did not detect and remove anything, additional scans should be performed with other security programs like Malwarebytes Anti-Malware and Emsisoft Anti-Malware. You can also supplement your anti-virus or get a second opinion by performing an Online Virus Scan...ESET is one of the more effective online scanners.

If you need individual assistance only with removing the malware infection, follow the instructions in the Malware Removal and Log Section Preparation Guide...all other questions or comments should be posted in the support topics. When you have done that, start a new topic and post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

There is an ongoing discussion in this topic where you can ask questions and seek further assistance.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion, this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users