Jump to content

Help, my PC is infeccted!


Recommended Posts

Hello everyone,

 

We are a company and our system now it's decrypted with .locky files.

 

I have tried to follo yur instruction but i have noticed that Emisoft Emergency Kit doesn't work with windows xp.

 

How i can do?

 

Thanks a lot

 

Best Regards

 

 

Link to post
Share on other sites

Dear Kevin,

 

Thanks a lot for yoiur quick reply

 

Please find attached the requested logs.

 

I have updated also our profile because we don't work with win Xp but with win 2003 server edition

 

Your quick reply is much appreciated

 

Thanks in advance for your help from you and your team

 

Best Regards

 

(sorry for our english)

 

 

Addition_01-06-2016_08-38-14.txt

FRST_01-06-2016_08-38-14.txt

Link to post
Share on other sites

Do the following:

Download AdwCleaner and save it on your desktop.

  • Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  • Double click on adwcleaner.exe to run the tool.
  • Click on the Scan button.
  • After the scan has finished, click on the Clean button.
  • Confirm each time with OK.
  • You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  • Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.

    NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.

Download Junkware Removal Tool and save it on your desktop.
  • Run the tool by double-clicking it.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log is saved to your desktop and will automatically open.
  • Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
Copy the below code to Notepad; Save As fixlist.txt to your Desktop.
HKLM\...\Policies\Explorer: [ShowSuperHidden] 1
HKLM\...\Command Processor:  <======= ATTENTION
Winsock: Catalog5 03 C:\WINDOWS\system32\mswsock.dll [258048 2008-06-20] (Microsoft Corporation) ATTENTION: LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
C:\Documents and Settings\Administrator\Impostazioni locali\Temp\ose00000.exe
HKLM\...\batfile\DefaultIcon: %SystemRoot%\System32\shell32.dll,-153 <===== ATTENTION
HKLM\...\cmdfile\DefaultIcon: %SystemRoot%\System32\shell32.dll,-153 <===== ATTENTION
Close Notepad.

NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

Link to post
Share on other sites

Dear Mr. Kevin,

 

thanks for your reply.

 

 

The action proposed by you will decrypt the files locked? Or only remove the Virus?

 

If the action proposed doesn't decrypt the files there is a way to do that?

 

Thanks a lot

 

Best Regards

Link to post
Share on other sites

The instructions I posted are for removing the infection only. It may not be possible to decrypt the files, depends on whether they are AutoLocky or Locky. If it is Locky then the files cannot be decrypted.

Link to post
Share on other sites
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...