Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Win7 Start menu /icons not working

  • Please log in to reply
2 replies to this topic

#1 Sandor Borbas

Sandor Borbas

  • Members
  • 23 posts
  • Local time:11:28 AM

Posted 06 September 2016 - 05:00 PM



My sons Pc is all screwed up. All his files end in .LOCK  and his start menu and all his ICONs won't work.  I think it's some Ransomware at that was cleared out before I got it.  Ran Malwarebytes, Nortons, Eset, Sophos, and many more.  Check it for a root kit. nothing found


Tried to do a win7 in place upgrade but copying files sits at 0% so I think the permission are all screwed up. How do I reset all the folder permissions to default?


Win7 PC



Thanks in advance



Edited by hamluis, 06 September 2016 - 06:06 PM.
Moved from Win 7 to Ransomware - Hamluis.

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,927 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:10:28 AM

Posted 07 September 2016 - 05:51 AM

Any files that are encrypted with Brazillian Ransomware will have the .lock extension appended to the end of the encrypted data filename and leave files (ransom notes) named MENSAGEM.txt.

Did you find any ransom notes? These infections are created to alert victims that their data has been encrypted and demand a ransom payment. Check your documents folder for an image the malware typically uses for the background note. Check the C:\ProgramData (or C:\Documents and Settings\All Users\Application Data) for a randomly named .html, .txt, .png, .bmp, .url file. Most ransomware will also drop a ransom note in every directory/affected folder where data was encrypted.

You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. If ID Ransomware cannot identify the infection, you can post the case SHA1 it gives you in your next reply for Demonslay335 to manually inspect the files.

You can also submit samples of encrypted files, ransom notes, email or/and website address you see in the RANSOM DEMAND to No More Ransom Crypto Sheriff for assistance with identification and possible decrypting solutions. If you are provided any information it would be helpful to post it here for Demonslay335 to review.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 chalup


  • Members
  • 191 posts
  • Local time:10:28 AM

Posted 07 September 2016 - 12:41 PM

Doesn't sound from the OP he wants help unlocking the folders rather than doing a clean install of windows, might should be moved back. OP state if you want help with the ransomware or help getting windows back to a working condition.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users