Jump to content

Removal instructions for CryptoLocker

Recommended Posts

  • Staff

What is Cryptolocker?

The Malwarebytes research team has determined that Cryptolocker is Ransomware. This type of malware denies the user access to his files or the normal use of his computer. They demand payment to restore the computer to the state it was in before the infection.
This particular one looks for files with certain extensions and encrypts them. The targeted files have the extensions:
3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, jpe, jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, srf, srw, wb2, wpd, wps, xlk, xls, xlsb, xlsm, xlsx

How do I know if I am infected with Cryptolocker?

You will see this warning when the ransomware is ready encrypting the targeted files:


How did Cryptolocker get on my computer?

Ransomware uses different methods for spreading themselves. This particular one was sent as an attachment in a fake email from a courier-service. The infection is also spread by websites.

How do I remove Cryptolocker?

Our program Malwarebytes' Anti-Malware can detect and remove this ramsomware.

  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a check-mark is placed next to the following:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.
  • When completed, a log will open in Notepad. The rogue application should now be gone.

Is there anything else I need to do to get rid of Cryptolocker?

Malwarebytes' Anti-Malware removes Cryptolocker completely, but it can not undo the encryption.
There are a few things you can try. Read this post at Bleeping Computer where "Grinler" describes a method using Shadow Volume Copies.
Basically you will need to have some form of backup to retrieve the files.

How would the full version of Malwarebytes' Anti-Malware help protect me?

As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against Cryptolocker. It would have warned you before the ransomware could install itself, giving you a chance to stop it before it became too late.


Technical details for experts

Signs in a HijackThis log:

O4 - HKCU\..\Run: [CryptoLocker] C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe

Note: the CLSID in the filename is semi-random

Alterations made by the installer:

File system details---------------------------------------------In the existing folder C:\Users\{username}\AppData\RoamingAdds the file {112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe"="10/4/2013 5:59 AM, 346112 bytes, HSRegistry details------------------------------------------[HKEY_CURENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]"CryptoLocker"="REG_SZ, "C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe"[HKEY_CURRENT_USER\Software\CryptoLocker]"VersionInfo"=hex:c2,32,9c,81,20,12,cc,d3,cf,54,c9,d3,f4,4a,fe,ec,ca,42,ef,e9,\da,51,fd,f3,de,45,e4,f9,80,5d,f9,f5,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,b0,eb,0b,f6,f3,e5,5b,\d4,b8,e8,01,de,e4,d6,7d,af,b6,c3,46,f4,b7,c9,42,ed,e9,f7,79,c8,d2,e3,72,de,\eb,c0,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81"PublicKey"=hex:06,02,00,00,00,a4,00,00,52,53,41,31,00,08,00,00,01,00,01,00,ef,\07,0f,67,68,f6,9c,fa,f9,ef,fa,05,b9,d0,de,59,29,61,1d,35,a7,c6,b3,31,1c,07,\05,80,67,8f,fc,20,dc,8c,54,c8,73,78,86,97,db,8d,a0,f9,b4,2e,a6,33,b7,fa,8c,\5f,50,be,cf,72,f4,d3,d4,f1,25,1d,3c,f5,9e,ee,bd,38,c6,07,97,23,aa,8d,51,df,\31,2a,86,14,a8,92,a7,af,64,23,7b,cb,81,98,40,eb,51,6d,63,3a,e7,f8,25,f4,30,\5a,e2,e3,26,c5,21,0a,0b,05,6c,34,be,0c,78,de,a7,82,4d,96,48,5e,ab,cf,b9,ae,\82,eb,e5,25,86,b4,24,a8,90,8e,d4,84,00,f2,bc,b5,40,6c,48,e0,dd,3e,ac,95,58,\d0,71,90,1b,50,50,97,a2,e1,5c,33,c0,b5,5b,ee,7a,55,81,9d,1e,94,14,13,47,e0,\54,28,b7,7d,42,a2,8f,40,3a,53,be,99,dc,7a,c3,82,a7,d4,ea,ba,be,b2,55,16,5d,\ec,5d,c2,8b,31,e9,66,b4,d2,89,b4,eb,5c,59,db,f5,92,b6,b9,d6,93,78,c2,ce,ae,\70,ba,50,63,ed,d3,fc,5a,68,07,6c,eb,86,1c,6c,c1,a2,74,2a,e0,fd,12,da,cb,2f,\f1,74,2e,96,e4[HKEY_CURRENT_USER\Software\CryptoLocker\Files]"C:?Documents and Settings?Default User?Templates?excel.xls"=dword:0078ce76

Malwarebytes' Anti-Malware log:

Malwarebytes Anti-Malware (PRO) version: v2013.10.05.02Windows 8 x64 NTFSInternet Explorer 10.0.9200.16660{username} :: MBAM-VM [administrator]Protection: Disabled10/4/2013 10:43:54 PMmbam-log-2013-10-04 (22-43-54).txtScan type: Quick scanScan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUMScan options disabled: P2PObjects scanned: 192164Time elapsed: 1 minute(s), 9 second(s)Memory Processes Detected: 2C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 1364 -> Delete on reboot.C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 2028 -> Delete on reboot.Memory Modules Detected: 0(No malicious items detected)Registry Keys Detected: 0(No malicious items detected)Registry Values Detected: 1HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|CryptoLocker (Trojan.Ransom) -> Data: C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe-> Quarantined and deleted successfully.Registry Data Items Detected: 0(No malicious items detected)Folders Detected: 0(No malicious items detected)Files Detected: 1C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> Delete on reboot.(end)

As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):

  • Dynamically Blocks Malware Sites & Servers
  • Malware Execution Prevention

Save yourself the hassle and get protected.

Link to post
Share on other sites

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.