valdama 0 Posted May 31, 2016 Report Share Posted May 31, 2016 Hello everyone, We are a company and our system now it's decrypted with .locky files. I have tried to follo yur instruction but i have noticed that Emisoft Emergency Kit doesn't work with windows xp. How i can do? Thanks a lot Best Regards Link to post Share on other sites
Kevin Zoll 309 Posted May 31, 2016 Report Share Posted May 31, 2016 Skip using EEK, and follow the rest of the instructions. Link to post Share on other sites
valdama 0 Posted June 1, 2016 Author Report Share Posted June 1, 2016 Dear Kevin, Thanks a lot for yoiur quick reply Please find attached the requested logs. I have updated also our profile because we don't work with win Xp but with win 2003 server edition Your quick reply is much appreciated Thanks in advance for your help from you and your team Best Regards (sorry for our english) Addition_01-06-2016_08-38-14.txt FRST_01-06-2016_08-38-14.txt Link to post Share on other sites
Kevin Zoll 309 Posted June 1, 2016 Report Share Posted June 1, 2016 Do the following: Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer. Download Junkware Removal Tool and save it on your desktop.Run the tool by double-clicking it. The tool will open and start scanning your system. Please be patient as this can take a while to complete depending on your system's specifications. On completion, a log is saved to your desktop and will automatically open. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply. Copy the below code to Notepad; Save As fixlist.txt to your Desktop.HKLM\...\Policies\Explorer: [ShowSuperHidden] 1 HKLM\...\Command Processor: <======= ATTENTION Winsock: Catalog5 03 C:\WINDOWS\system32\mswsock.dll [258048 2008-06-20] (Microsoft Corporation) ATTENTION: LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" C:\Documents and Settings\Administrator\Impostazioni locali\Temp\ose00000.exe HKLM\...\batfile\DefaultIcon: %SystemRoot%\System32\shell32.dll,-153 <===== ATTENTION HKLM\...\cmdfile\DefaultIcon: %SystemRoot%\System32\shell32.dll,-153 <===== ATTENTIONClose Notepad.NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version. Link to post Share on other sites
valdama 0 Posted June 6, 2016 Author Report Share Posted June 6, 2016 Dear Mr. Kevin, thanks for your reply. The action proposed by you will decrypt the files locked? Or only remove the Virus? If the action proposed doesn't decrypt the files there is a way to do that? Thanks a lot Best Regards Link to post Share on other sites
Kevin Zoll 309 Posted June 6, 2016 Report Share Posted June 6, 2016 The instructions I posted are for removing the infection only. It may not be possible to decrypt the files, depends on whether they are AutoLocky or Locky. If it is Locky then the files cannot be decrypted. Link to post Share on other sites
valdama 0 Posted June 7, 2016 Author Report Share Posted June 7, 2016 Dear Kevin, Thanks for you info, how i can know if i was infected by locky or Autolocky? Thanks Best Regards Link to post Share on other sites
Kevin Zoll 309 Posted June 7, 2016 Report Share Posted June 7, 2016 Looking back over you logs, the ransomware infection is Locky. Unfortunately, there is no method available that can decrypt files encrypted by Locky. Link to post Share on other sites
Recommended Posts