DotFab Blog » Malware Removal»Remove Your personal files are encrypted Virus (Cryptolocker Ransomware Removal Guide)

Remove Your personal files are encrypted Virus (Cryptolocker Ransomware Removal Guide)

A red warning saying “Your personal files are encrypted” and you need to pay to decrypt your files? Don’t be tricked by this ransomware scam and read more here to be aware and get rid of this ransomware infection as instructed.

 

Your personal files are encrypted virus, also called cryptolocker virus, is categorized as ransomware that can take the attacked computer system for hostage to swindle money from innocent victim users. This kind of computer virus has been spreading rampant for long time and everyone should be alerted since it is really scary, dangerous and destructive.

 

The screenshot of Your personal files are encrypted virus lock screen

Cryptolocker_virus

Part of fraud text message it takes as:

Your personal files are encrypted!
Your important files encryption produced on this computer: photos, videos, document, etc. Here is a complete list of encrypted files, and you can personally verify this…
To obtain the private key for this computer, which will automatically decrypt files, you need to pay 100 USD / 100EUR / similar amount in another currency. 

Any attempt to remove or damage this software will lead to immediate destruction of the private key server.

No matter what the bogus alert says, do not pay for the private key. It is just a scam designed by cybercriminals to steal your money.

 

Distribution

 

Typically, a computer would get infected with this rasnomware when you are browsing web sites that have been hacked to contain exploit kits which will then use vulnerabilities found on your computer to install the infection without your permission or knowledge. Once installed, the Homeland Security Ransomware will start automatically when you login to your computer and will then display the above screen locker so that you are unable to access your system.

 

Besides, this ransomware can also be distributed through spam email with embedded malicious links or attachments, as well as on infected peer-to-peer shared files.

 

Precaution: 

 

> 1. Timely update the system with the latest patches released by Microsoft.
> 2. Update all installed software to latest version for security consideration.
> 3. Use caution when surfing online. Basically you are supposed to ensure turn on the security features of your web browser. See detailed instructions to turn on Security Features of IE, firefox and Chrome.
> 4. Take care when opening a link or an attachment in an email from unknown people.
> 5. Regardless of all, the best bet to protect computer is still security programs like Antivirus and antimalware. Please note that no security program can be against 100% threats and thus you may need a supplement one if you already have a trusted antivirus. Here we recommend you the antimalware Anvi Smart Defender for that security purpose. Check it out for more by downloading and using:
www.dotfab.com/download_asd.html

 

Most-spread Ransomware Infections 2013:

FBI Moneypak virusDepartment of Justice Moneypak virusFBI CyberCrime Division virusYour Computer Has Been Blocked virusRelodit virusICE Cyber Crime Center Moneypak virusUnited States Courts virusFBI “System Failure” virusInternational Cyber Security Protection Alliance virusSpamhaus Moneypak virusJoint Chiefs of Staff Moneypak virusMoneygram virusComputer Crime and Intellectual Property Section CCIPS virusU.S. Department of Homeland Security Moneypak virusFBI Cybercrime Division ICSPA virusUnited States Cyber Security virusFBI Department of Defense virusMandiant U.S.A. Cyber Security virusInternational Police Association ( I.P.A ) virusMinistry of Public Safety Canada virus (a.k.a. Canadian Association of Chiefs of Police virus)Royal Canadian Mounted Police virusMinistry of Public Safety Canada virusAFP Ukash virusAMCA, ACC ransomwareInternet Police Department virusPCeU virusCheschire Police Authority virusEuropol Interpol virusUnited Kingdom Police virusSerious (Serios) Organised Crime Agency virus,Guardians of the Peace of Ireland Garda virus,  Centre for Critical Infrastructure Protection (CCIP) virusNew Zealand e-Crime lab virusArma dei Carabinieri virusPolícia de Segurança Publica Portuguese VirusNSA Internet Surveillance Program PRISM virusInterpol Department of Cybercrime virusFBI Anti-Piracy Warning Moneypak virusChild Pornography computer blocked virusPRISM Your Computer Has Been Locked virusMetropolitan British Police Interpol virus, etc.

 

Deny Flash

Most ransomware exploits Java or Flash vulnerabilities to load the malicious code. In some cases denying or disabling flash on your system may suspend some of the ransomware and enable the user to navigate through the infected system.

If this not a necessity for removal, skip to the removal options below these steps. To disable (deny) flash

1.Visit:http://www.macromedia.com/support/documentation/en/flashplayer/help/help09.html

Deny-Flash

 

2. Select the “Deny” radio option

3. Proceed to a removal option (detailed below).

 

_______________________

How to Remove Your personal files has been encrypted virus (Cryptolocker Ransomware Removal Guide)

 

This tutorial suits the removal of Ukash, PaysafeCard, MoneyPak and CashU ransomware.

 

Removal Option 1-Safe Mode with Command Prompt Restore

 

Step 1> Launch your PC into Safe Mode with Command Prompt.

 

Remove all floppy disks, CDs and DVDs from your computer, and restart. During the start, keep pressing F8 key till the Advanced Windows Options Menu shows up and then use the arrow key on the keyboard to highlight the Safe Mode with Command Prompt option and then press EnterSee detailed instructions on how to boot Windows to Safe Mode

 

1

 

Note: make sure you login your computer with administrative privileges. (login as admin)

 

Step 2> Type explorer to access

 

Once the Command Prompt window appears you only have few seconds to type “explorer” and hit Enter. If you fail to do so within 2-3 seconds, the ransomware virus will not allow you to type anymore.

 

Command Prompt window

 

 

Step >3 Once Windows Explorer shows up browse to:

  • Win XP: C:\windows\system32\restore\rstrui.exe and press Enter
  • Win Vista/7/8: C:\windows\system32\rstrui.exe and press Enter

3

 

Step 4> Restore

 

Follow all steps to restore or recover your computer system to an earlier time and date (restore point), before infection.

4

 

Please note that chances are this virus may delete all of your stored restore points and then you may need to switch to option 2 to try the troubleshoot now.

 

Step 5> Scan bad leftovers and restart

 

Download, install, update and run the antimalware Anvi Smart Defender (direct download: www.dotfab.com/download_asd.html) to scan out and remove the bad leftovers in case it turns back. And then restart the computer to ensure the computer is all right.

 

16

 

BTW: after the virus removal, you are highly recommended to maintain/optimize your computer system using a tool like Cloud System Booster Cloud System Booster (download:www.dotfab.com/download_csb.html). It is a computer system cleaner/optimizer which can basically maintain your system performance. If you want a deep optimization, hard disk defragment would be a good idea. You may try the Anvi Ultimate Defrag (downoad:www.dotfab.com/download_aud.html) for efficiency defragment if the need arises.

 

___________________________________________________________________

Removal Option 2-Remove the Ransomware using Anvi Rescue Disk

 

In most cases of computer infected by ransomware,  your PC would be totally blocked from any operation, including safe mode runing. Then, you can use the Anvi Rescue Disk to fix the issue together with the antimalware Anvi Smart Defender.  Some patience and time is needed for this removal emthod. If any question in the process, please feel free to send your email below to our online Technical Support for timely help.

 

Below is a video of ransomware removal using Anvi Rescue Disk for your reference.

 

Step 1> Download the Anvi Rescue Disk iso image file

 

Download the Anvi Rescue Disk iso image file Rescue.iso and the USB disk production tool BootUsb.exe from Anvisoft official site. (Both are packaged in the file offered to download below.)

Direct download link: http://www.anvisoft.com/software/rsd/

Please kindly note that Rescue.iso is a large file to download; please be patient while it downloads.

 

Step 2> Record the Anvi Rescue Disk iso image to USB drive.

 

You can also record the iso image to a CD/DVD. We will introduce the steps to record iso image to a CD/DVD in following guide.

 

To record the Anvi Rescue Disk iso image to USB drive:

1. Firstly find a clean computer with correct internet connection and then connect your USB driver to the clean computer. You’d better backup your important data and format your USB drive before using it to record the iso image.

2. Locate your download folder and double-click on BootUsb.exe to start it. And then click “Choose File” button to browser into your download folder and select Rescue.iso file as your source file.

USB burning

 

3. Select the path of USB drive, such as Drive H:

4. Click “Start Burning” to start the burn of USB Rescue Disk boot drive.

5.Please close BootUsb.exe tool after you successfully burn the file to the USB drive when you get the following message.

2

 

Now, you have bootable Anvi Rescue Disk to repair your computer.

 

——Alternative Option

 

You can also record Anvi Rescue Disk iso image to a DV/DVD. Any CD/DVD record software is fine for burn iso image. If you don’t have any, you can download and install Nero Burning ROM and ImgBurn. Here we will use Nero Burning ROM for demonstration purpose.

Please open and start Nero Burning ROM and select Burn Image from the drop-down menu of the Recorder.

CD/DVD recorder

 

1. Locate your download folder and select Rescue.iso file as your source file and then click Open button.

9

 

 

2. Click Burn button to start record the iso image. After a few minutes, you will have a bootable Anvi Rescue Disk to repair your computer.

 

burn compiliation

 

Step 3> Configure your infected computer to boot from the USB drive/DV/DVD

 

Restart your infected computer and configure it to boot from USB drive/DV/DVD that recorded Anvi Rescue Disk.

Basically , you can use F8 to load USB boot menu.

For different motherboard, you may need to use the Delete or F2, F11 keys, to load the BIOS menu. Normally, the information on how to enter the BIOS menu is displayed on the screen at the start of the OS boot.

boot menu instruction

 

The keys F1, F8, F10, F12 might be used for some motherboards, as well as the following key combinations:

  • • Ctrl+Esc
  • • Ctrl+Ins
  • • Ctrl+Alt
  • • Ctrl+Alt+Esc
  • • Ctrl+Alt+Enter
  • • Ctrl+Alt+Del
  • • Ctrl+Alt+Ins
  • • Ctrl+Alt+S

If you can enter Boot Menu directly then simply select your CD/DVD-ROM as your 1st boot device.

If you can’t enter Boot Menu directly then simply use Delete key to enter BIOS menu. Select Boot from the main BIOS menu and then select Boot Device Priority. After that, set USB drive or CD/DVD-ROM as your 1st Boot Device. Save changes and exist BIOS menu.

 

Step> 4 Boot your computer from Anvi Rescue Disk.

 

After that let’s boot your computer from Anvi Rescue Disk.

1. Restart your computer. After restart, a message will appear on the screen: press any key to enter the menu. So, press Enter or any other key to load the Anvi Rescue Disk

2. please selected your preferred language and press Enter to continue.

Anvi Rescue disk language setting

 

Step> 5 Run the Anvi Rescue Disk to scan and repair.

 

1. Now you are in the mini Operating system, please double-click Rescue tool to start Anvi Rescue disk.

Anvi Rescue Disk
Important note: make sure that your computer is connected to network connection before you run a scan on your computer. If you fail to connect your computer to Internet, please check the tutorial on network configuration in this article: Network Troubleshooting Tips for Ransomware Removal Using Anvi Rescue Disk

Connection established

 

2. Please run a full scan by clicking the “Scan Computer” button in the middle of the program to detect and kill the PC lockup virus.

 

Anvi Rescue disk scan

 

3. Clicking “Fix Now” to Remove the detected threats detected by Anvi Rescue Disk.

Anvi Rescue disk fix now

 

4. Switch to Repair tab. Scan and fix the registry error with the “Repair” module of Anvi Rescue Disk.

 

Anvi Rescue disk repair

 

Important Notice: You must repair the registry error after kill the virus. Otherwise, you would be disabled to boot your Windows without fixing registry damaged by the virus.

 

Step>6 Download Anvi Smart Defender antimalware to ensure a clean computer.

 

After the repair, your computer should be clean and resuced from the evil claw of the ransomware infection. However, many professionally crafted ransomware variants have evolved to be very persistant, that is to say, harder to remove, so you are highly recommended to download the antimalware Anvi Smart Defender by clicking Yes button on the prompted window to fulfill the download.

 

Download ASD in Rescue Disk

 

After the download, please restart your computer to normal Windows mode and then go to the folder: C:\Users\[username]\Downloads

Find the downloaded file asdsetup.exe and double click its file to install it and then start it to perform a full scan on your computer sytem, in order to ensure the computer is clean from any associated infections or leftovers.

After the scan, remove any detected infections and then you can have a clean computer now.

 

BTW: after the virus removal, you are highly recommended to maintain/optimize your computer system using a tool like Cloud System Booster Cloud System Booster (download:www.dotfab.com/download_csb.html). It is a computer system cleaner/optimizer which can basically maintain your system performance. If you want a deep optimization, hard disk defragment would be a good idea. You may try the Anvi Ultimate Defrag (downoad: www.dotfab.com/download_aud.html) for efficiency defragment if the need arises.

  • Bill Stead

    I’m having trouble getting rid of this encryptio scam message, will it just go away when the yime limit runs down.

    • http://www.dotfab.com Alan Foss

      Hello,

      Can you detail your trouble during getting rid of this cryptolocker infection? Then, we will find more helpful solution for you. However, we recommend you try the method above detailed all the way if you have not.

      For any further question or information about your trouble with this infection, just let us know.

  • Kayla Bean

    Will this work on windows server 2008r2 as well? my network file servers are infected

    • http://www.dotfab.com Alan Foss

      Hello,

      To troubleshoot this, you can try disconnecting to the Internet and then reboot your infected system to safe mode with command prompt to restore. Well, our rescue disk can also work with the Windows 2008 and you can now make full use of it. If any further question in the usage, feel free to get in touch.

      Regards,