You are on page 1of 23

Welcome stranger!

You are currently viewing our blogs! We hope you'll nd all the information that you need to
solve your computer issues.
We offer free malware removal support in our Malware Removal Assistance forum.

BLOGS FORUMS NEWS TUTORIALS MALWARE HELP REVIEWS GIVEAWAYS MALWARE HUB MEDIA

ROGUE SOFTWARE RANSOMWARE TROJANS ADWARE BROWSER HIJACKERS OTHER MALWARE MISCELLANEOUS SEARCH GUIDES...

GOOD TO KNOW

Remove “Your personal les are encrypted” All our malware removal guides and programs are
completely free, and will remove all the malware

virus (Guide) from your computer.


Please be aware that removing malware is a
potentially hazardous undertaking. We advise you
If your pictures, videos and documents are encrypted and a “Your personal les are encrypted”
to backup your personal les and folders before
windows is asking for money (Bitcoins BTC)  to recover the les, then your computer has been you start the malware removal process.
infected with the le-encrypting ransomware.
These le-encrypting ransomware programs are malware, which will encrypt the personal
STAY IN TOUCH WITH US!
documents found on victim’s computer using RSA-2048 key (AES CBC 256-bit encryption
Follow MalwareTips on Facebook, Twitter and
algorithm). Then displays a message which offers to decrypt the data if a payment (with Bitcoins) Google+, and always be up-to-date with the latest
is made within 96 hours, otherwise the data will be destroyed. online threats.
The most known version of “Your personal les are encrypted” ransomware are: CryptoLocker,
Crypt0l0cker, Alpha Crypt, TeslaCrypt, CoinVault, Bit Crypt, CTB-Locker or TorrentLocker.
THE DAILY TIP
Stay safe online. - Keep your software up-to-date.
This is especially true for things like your
operating system, security software and Web
browser, but also holds true for just about any
program that you frequently use. Viruses often
take advantages of bugs or exploits in the code of
these programs to propagate to new machines,
and while the companies that make the programs
are usually quick to x the holes, those xes only
work if they have been downloaded to your
computer.

It's also important to avoid taking actions that


could put your computer at risk. These include
opening unsolicited email attachments, visiting
unknown websites or downloading software from
untrustworthy websites or peer-to-peer le
transfer networks.

To ensure that the entire family understands the


risks, these procedures should be taught to
everyone, and children should have their Internet
use monitored to ensure they aren't visiting
suspect websites or downloading random
programs or les.

TIPS & GUIDES


How to x “No Internet After Malware Removal”
(Free Guide)

How to remove Adware and Pop-up Ads from


STEAM (Guide)

How to remove Any Browser Redirect virus


(Removal Guide)

Remove “Your personal les are encrypted” virus


(Guide)

Remove ANY TOOLBAR from Internet Explorer,


Firefox and Chrome

Remove fake update Flash Player or Java pop-up


virus

Remove pop-up ads and adware from Windows


10 (Guide)
Remove Pop-up Ads from Internet Explorer,
Firefox and Chrome

Remove pop-up ads from Microsoft Edge


browser (Guide)

Remove Tech Support Scam pop-up (Call For


Support Scam)

Remove virus from Android phone (Pop-up Ads


and Adware)

Remove virus from Apple Mac OS X (Pop-up Ads


and Adware)

How to easily avoid PC infections

From where did my PC got infected?

How to easily clean an infected computer


(Malware Removal Guide)

Remove stubborn malware

3 Easy ways to remove any Police Ransom


Trojan

How to x a computer that won’t boot


We cannot help your recover your les, apart from suggesting to use ShadowExplorer or
(free) File Recovery Software. This guide was written to help you remove the infection itself, Remove Potentially Unwanted Programs (PUP
and if a 100% proven method to recover the encrypted les is found, we will update this Removal)

guide.
RESET BROWSER TO DEFAULT SETTINGS
1. How did the Your personal les are encrypted virus got on my computer? Reset Google Chrome to default settings
2. What is Your personal les are encrypted Ransomware? (GUIDE)

3. Is my computer infected with Your personal les are encrypted virus? Reset Internet Explorer to default settings
4. Is it possible to decrypt les encrypted by Your personal les are encrypted? (GUIDE)
5. How to remove the Your personal les are encrypted ransomware (Virus Removal Guide) Reset Mozilla Firefox to default settings (GUIDE)

1. How did the Your personal les are MALWARE 101

encryptedvirus got on my computer?


encryptedvirus got on my computer?
Malware - short for malicious software - is an
umbrella term that refers to any software program
deliberately created to perform an unauthorized
The Your personal les are encrypted ransomware is distributed through several means. and often harmful action.
Malicious websites, or legitimate websites that have been hacked, can infect your machine Viruses, backdoors, keyloggers, spyware ,adware,
through exploit kits that use vulnerabilities on your computer to install this Trojan without your rootkits, and trojans are just a few examples of
what is considered malware.
permission of knowledge.
A few years ago,it was once suf cient to call
something a 'virus' or 'trojan horse', however
Another method used to propagate this type of malware is spam email containing infected today's infection methods and vectors evolved and
attachments or links to malicious websites. Cyber-criminals spam out an email, with forged the terms 'virus and trojan' no longer provided a
header information, tricking you into believing that it is from a shipping company like DHL or satisfactory de nition for all the types of rogue
programs that exist.
FedEx. The email tells you that they tried to deliver a package to you, but failed for some reason.
Sometimes the emails claim to be noti cations of a shipment you have made. Either way, you
can’t resist being curious as to what the email is referring to – and open the attached le (or RECENT POSTS
click on a link embedded inside the email). And with that, your computer is infected with the Remove Tensoftwers.com pop-up ads (Virus
Your personal les are encrypted ransowmare Removal Guide)

Remove Screenmessage.in pop-up virus


The threat may also be downloaded manually by tricking the user into thinking they are (Support Scam)

installing a useful piece of software, for instance a bogus update for Adobe Flash Player or Remove Securitywinit.info pop-up virus (Support
another piece of software. Scam)

Remove Breaking-newsusa.com pop-up virus


(Support Scam)
2. What is Your personal les are encrypted Remove Get247help.in pop-up virus (Support

Ransomware? Scam)

Remove Ppcplanet4u.com pop-up virus (Support


The Your personal les are encrypted is a ransomware program which targets all versions of Scam)
Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. This infection is Remove Onlinesupport4computer.org pop-up
notable due to how it encrypts the user’s les – namely, it uses AES-265 and RSA encryption virus (Guide)
method – in order to ensure that the affected user has no choice but to purchase the private key.

When Your personal les are encrypted ransomware is rst installed on your computer it will
create a random named executable in the %AppData% or %LocalAppData% folder. This
executable will be launched and begin to scan all the drive letters on your computer for data les
to encrypt.
Your personal les are encrypted ransomware searches for les with certain le extensions to
encrypt. The les it encrypts include important productivity documents and les such as .doc,
.docx, .xls, .pdf, among others. When these les are detected, this infection will append a new
 extension (.ezz, .exx, .7z.encrypted) to the le name.
Files targeted are those commonly found on most PCs today; a list of le extensions for targeted
les include:

.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum,
.ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn,
.sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho,
.cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu,
.layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor,
.psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2,
.mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi,
.litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a,
.pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png,
.jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx,
.r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2,
.crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf,
.pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb,
.pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb,
.odc, .odm, .odp, .ods, .odt

While encrypting your les, this ransomware may create a text le ransom note in each folder
that a le has been encrypted and on the Windows desktop. The ransomware ,may also change
your Windows desktop wallpaper. Both the wallpaper and the text ransom note will contain the
same information on how to access the payment site and get your les back.

The Your personal les are encrypted ransomware will also hijack your .EXE extensions so that
when you launch an executable it will attempt to delete the Shadow Volume Copies that are on
the affected computer. It does this because you can use shadow volume copies to restore your
encrypted les. Once the infection has successfully deleted your shadow volume copies, it will
restore your exe extensions back to the Windows defaults.

When it has nished encrypting your data les it will then show the Your personal les are
encrypted at the end of your personal documents, and a screen demanding a ransom in order to
decrypt your les. It also states that you must pay this ransom within 96 hours or the private
encryption key will be destroyed on the developer’s servers.

3. Is my computer infected with Your personal


les are encrypted virus?
If your computer is infected with this type of ransomware, your desktop wallpaper will be
changed and a “Your personal les are encrypted” window with a countdown timer wil be
displayed.
The messages displayed by this ransomware infection can be localized depending on the user’s
location, with text written in the appropriate language. This is the usual message that the Your
personal les are encrypted virus may display:

Your personal files are encrypted!
Your files have been safely encrypted on this PC: photos, videos, documents,
etc. Click “Show encrypted files” Button to view a complete list of encrypted
files, and you can personally verify this. Encryption was produced using a
unique public key RSA­2048 generated for this computer. To decrypt files
you need to obtain the private key. The only copy of the private key, which
allow you to decrypt your files, is located on a secret server in the Internet;
the server will eliminate the key after a time period specified in this
window.
 
Once this has been done, nobody will ever be able to recover.

4. Is it possible to decrypt les encrypted by


Your personal les are encrypted ransomware?
No, at this time it’s not possible.

The Your personal les are encrypted ransomware is notable due to how it encrypts the user’s
les – namely, it uses AES-265 and RSA encryption method – in order to ensure that the affected
user has no choice but to purchase the private key. The RSA public key can only be decrypted
with its corresponding private key. Since the AES key is hidden using RSA encryption and the RSA
private key is not available, decrypting the les is not feasible as of this writing.
Brute forcing the decryption key is not realistic due to the length of time required to break an
AES encryption key.

Unfortunately, once the Your personal les are encrypted encryption of the data is
complete, decryption is not feasible without paying the ransom.

Because the needed private key to unlock the encrypted le is only available through the cyber
criminals, victims may be tempted to purchase it and pay the exorbitant fee. However, doing so
may encourage these bad guys to continue and even expand their operations. We strongly
suggest that you do not send any money to these cyber criminals, and instead adress to the law
enforcement agency in your country to report this attack.

5. How to remove the Your personal les are


encrypted ransomware (Virus Removal Guide)
encrypted ransomware (Virus Removal Guide)
If you DO NOT  plan on paying the ransom and want to try to restore your les, you can
follow the below guide. It’s important to understand that by starting the removal process,
you risk of losing your les, as we cannot guarantee that you will be able to recover them.
Furthermore, your les may be permanently compromised when trying to remove this
infection or trying to recover the encrypted documents.

This page is a comprehensive guide, which will remove the Your personal les are encrypted
infection from your computer, however we cannot guarantee that your personal les will be
recovered. We cannot be held responsible for losing the documents during this removal process.

A. Remove Your personal les are encrypted ransomware from


your computer
Malwarebytes and HitmanPro can detect and remove this infection, but these programs cannot
recover your encrypted les due to the nature of asymmetric encryption, which requires a private
key to decrypt les encrypted with the public key.

STEP 1: Remove Your personal les are encrypted virus with


Malwarebytes Anti-Malware Free
Malwarebytes Anti-Malware Free uses industry-leading technology to detect and remove all
traces of malware, including worms, Trojans, rootkits, rogues, dialers, spyware, and more.
It is important to note that Malwarebytes Anti-Malware works well and should run alongside
antivirus software without con icts.

1. You can download download Malwarebytes Anti-Malware from the below link.


MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a new web page
from where you can download “Malwarebytes Anti-Malware Free”)
2. Once downloaded, close all programs, then double-click on the icon on your desktop named
“mbam-setup” to start the installation of Malwarebytes Anti-Malware.

You may be presented with a User Account Control dialog asking you if you want to run
this le. If this happens, you should click “Yes” to continue with the installation.
3. When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard
which will guide you through the installation process.

To install Malwarebytes Anti-Malware on your machine, keep following the prompts by


clicking the “Next” button.
4. Once installed, Malwarebytes Anti-Malware will automatically start and you will see a
message stating that you should update the program, and that a scan has never been run on
your system. To start a system scan you can click on the “Scan Now” button.
5. Malwarebytes Anti-Malware will now start scanning your computer for the Your personal
les are encrypted virus. When Malwarebytes Anti-Malware is scanning it will look like the
image below.
6. When the scan has completed, you will now be presented with a screen showing you the
malware infections that Malwarebytes Anti-Malware has detected. To remove the malicious
programs that Malwarebytes Anti-malware has found, click on the “Remove Seletected”
button.
Please note that the infections found may be different than what is shown in the image.
7. Malwarebytes Anti-Malware will now quarantine all the malicious les and registry keys
that it has found. When removing the les, Malwarebytes Anti-Malware may require a
reboot in order to remove some of them. If it displays a message stating that it needs to
reboot your computer, please allow it to do so.
After your computer will restart, you should open Malwarebytes Anti-Malware and perform
another “Threat Scan” scan to verify that there are no remaining threats

STEP 2: Double-check for the Your personal les are encrypted


malware infection with HitmanPro
HitmanPro is a second opinion scanner, designed to rescue your computer from malware (viruses,
trojans, rootkits, etc.) that have infected your computer despite all the security measures you
have taken (such as anti-virus software, rewalls, etc.). HitmanPro is designed to work alongside
existing security programs without any con icts. It scans the computer quickly (less than 5
minutes) and does not slow down the computer.

1. You can download HitmanPro from the below link:


HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can
download “HitmanPro”)
2. Double-click on the le named “HitmanPro.exe” (for 32-bit versions of Windows) or
“HitmanPro_x64.exe” (for 64-bit versions of Windows). When the program starts you will be
presented with the start screen as shown below.

Click on the “Next” button, to install HitmanPro on your computer.


3. HitmanPro will now begin to scan your computer for Your personal les are encrypted
malicious les.
4. When it has nished it will display a list of all the malware that the program found as
Translate
shown in the image below. Click on the “Next” button, to remove Your personal les are
encrypted virus.
5. Click on the “Activate free license” button to begin the free 30 days trial, and remove all the
malicious les from your computer.
In some cases you may need to change your wallpaper, and delete the harmless Save_Files,
HELP_TO_SAVE_FILES.txt and HELP_TO_SAVE_FILES.bmp les.

B. How to restore your les encrypted by Your personal les are


encrypted ransomware
In some cases, it may be possible to recover previous versions of the encrypted les using System
Restore or other recovery software used to obtain “shadow copies” of les.

Option 1: Restore your les encrypted by Your personal les are


Option 1: Restore your les encrypted by Your personal les are
encrypted ransomware with ShadowExplorer
The Your personal les are encrypted ransomware will attempt to delete all shadow copies when
you rst start any executable on your computer after becoming infected. Thankfully, the infection
is not always able to remove the shadow copies, so you should continue to try restoring your les
using this method.

1. You can download ShadowExplorer from the below link:


SHADOW EXPLORER DOWNLOAD LINK (This link will open a new web page from where you
can download “ShadowExplorer”)
2. Once you have downloaded and installed ShadowExplorer, you can follow the below video
guide on how to restore your les while using this program.

Shadow Explorer

Alternatively, you can use the System Restore to try to recover the encrypted documents.

Option 2: Restore your les encrypted by Your personal les are


encrypted ransomware with File Recovery Software
When Your personal les are encrypted malware encrypts a le it rst makes a copy of it,
encrypts the copy, and then deletes the original. Due to this you can use le recovery software
such as:

Recuva
You can follow the below guide on how to use Recuva:

Recover & Restore Deleted Files With Recuva

EaseUS Data Recovery Wizard Free

R-Studio

Your computer should now be free of the Your personal les are encrypted ransomware.
If you are still experiencing problems while trying to remove a ransomware from your
machine, please do one of the following:

Run a system scan with Emsisoft Emergency Kit.

Start a new thread in our Malware Removal Assistance forum.


RETURN TO TOP OF PAGE MALWARETIPS.COM IS AN INDEPENDENT WEBSITE. ALL TRADEMARKS MENTIONED ON THIS PAGE ARE THE PROPERTY OF THEIR
RESPECTIVE OWNERS.WE CAN NOT BE HELD RESPONSIBLE FOR ANY ISSUES THAT MAY OCCUR BY USING THIS INFORMATION.

You might also like