What is Cryptolocker?
The Malwarebytes research team has determined that Cryptolocker is Ransomware. This type of malware denies the user access to his files or the normal use of his computer. They demand payment to restore the computer to the state it was in before the infection.
This particular one looks for files with certain extensions and encrypts them. The targeted files have the extensions:
3fr, accdb, ai, arw, bay, cdr, cer, cr2, crt, crw, dbf, dcr, der, dng, doc, docm, docx, dwg, dxf, dxg, eps, erf, indd, jpe, jpg, kdc, mdb, mdf, mef, mrw, nef, nrw, odb, odm, odp, ods, odt, orf, p12, p7b, p7c, pdd, pef, pem, pfx, ppt, pptm, pptx, psd, pst, ptx, r3d, raf, raw, rtf, rw2, rwl, srf, srw, wb2, wpd, wps, xlk, xls, xlsb, xlsm, xlsx
How do I know if I am infected with Cryptolocker?
You will see this warning when the ransomware is ready encrypting the targeted files:

How did Cryptolocker get on my computer?
Ransomware uses different methods for spreading themselves. This particular one was sent as an attachment in a fake email from a courier-service. The infection is also spread by websites.
How do I remove Cryptolocker?
Our program Malwarebytes' Anti-Malware can detect and remove this ramsomware.
- Please download Malwarebytes' Anti-Malware to your desktop.
- Double-click mbam-setup.exe and follow the prompts to install the program.
- At the end, be sure a check-mark is placed next to the following:
- Update Malwarebytes' Anti-Malware
- Launch Malwarebytes' Anti-Malware
- Then click Finish.
- If an update is found, it will download and install the latest version.
- Once the program has loaded, select Perform quick scan, then click Scan.
- When the scan is complete, click OK, then Show Results to view the results.
- Be sure that everything is checked, and click Remove Selected. Reboot your computer if prompted.
- When completed, a log will open in Notepad. The rogue application should now be gone.
Is there anything else I need to do to get rid of Cryptolocker?
Malwarebytes' Anti-Malware removes Cryptolocker completely, but it can not undo the encryption.
There are a few things you can try. Read this post at Bleeping Computer where "Grinler" describes a method using Shadow Volume Copies.
Basically you will need to have some form of backup to retrieve the files.
How would the full version of Malwarebytes' Anti-Malware help protect me?
As you can see below the full version of Malwarebytes' Anti-Malware would have protected you against Cryptolocker. It would have warned you before the ransomware could install itself, giving you a chance to stop it before it became too late.
Signs in a HijackThis log:
O4 - HKCU\..\Run: [CryptoLocker] C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe
Note: the CLSID in the filename is semi-random
Alterations made by the installer:
File system details --------------------------------------------- In the existing folder C:\Users\{username}\AppData\Roaming Adds the file {112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe"="10/4/2013 5:59 AM, 346112 bytes, HS Registry details ------------------------------------------ [HKEY_CURENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] "CryptoLocker"="REG_SZ, "C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe" [HKEY_CURRENT_USER\Software\CryptoLocker] "VersionInfo"=hex:c2,32,9c,81,20,12,cc,d3,cf,54,c9,d3,f4,4a,fe,ec,ca,42,ef,e9,\ da,51,fd,f3,de,45,e4,f9,80,5d,f9,f5,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\ 33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,b0,eb,0b,f6,f3,e5,5b,\ d4,b8,e8,01,de,e4,d6,7d,af,b6,c3,46,f4,b7,c9,42,ed,e9,f7,79,c8,d2,e3,72,de,\ eb,c0,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\ 33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\ 9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\ 81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\ 33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,\ 9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,\ 81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,\ ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,\ 33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81,ae,33,9c,81 "PublicKey"=hex:06,02,00,00,00,a4,00,00,52,53,41,31,00,08,00,00,01,00,01,00,ef,\ 07,0f,67,68,f6,9c,fa,f9,ef,fa,05,b9,d0,de,59,29,61,1d,35,a7,c6,b3,31,1c,07,\ 05,80,67,8f,fc,20,dc,8c,54,c8,73,78,86,97,db,8d,a0,f9,b4,2e,a6,33,b7,fa,8c,\ 5f,50,be,cf,72,f4,d3,d4,f1,25,1d,3c,f5,9e,ee,bd,38,c6,07,97,23,aa,8d,51,df,\ 31,2a,86,14,a8,92,a7,af,64,23,7b,cb,81,98,40,eb,51,6d,63,3a,e7,f8,25,f4,30,\ 5a,e2,e3,26,c5,21,0a,0b,05,6c,34,be,0c,78,de,a7,82,4d,96,48,5e,ab,cf,b9,ae,\ 82,eb,e5,25,86,b4,24,a8,90,8e,d4,84,00,f2,bc,b5,40,6c,48,e0,dd,3e,ac,95,58,\ d0,71,90,1b,50,50,97,a2,e1,5c,33,c0,b5,5b,ee,7a,55,81,9d,1e,94,14,13,47,e0,\ 54,28,b7,7d,42,a2,8f,40,3a,53,be,99,dc,7a,c3,82,a7,d4,ea,ba,be,b2,55,16,5d,\ ec,5d,c2,8b,31,e9,66,b4,d2,89,b4,eb,5c,59,db,f5,92,b6,b9,d6,93,78,c2,ce,ae,\ 70,ba,50,63,ed,d3,fc,5a,68,07,6c,eb,86,1c,6c,c1,a2,74,2a,e0,fd,12,da,cb,2f,\ f1,74,2e,96,e4 [HKEY_CURRENT_USER\Software\CryptoLocker\Files] "C:?Documents and Settings?Default User?Templates?excel.xls"=dword:0078ce76
Malwarebytes' Anti-Malware log:
Malwarebytes Anti-Malware (PRO) 1.75.0.1300 www.malwarebytes.org Database version: v2013.10.05.02 Windows 8 x64 NTFS Internet Explorer 10.0.9200.16660 {username} :: MBAM-VM [administrator] Protection: Disabled 10/4/2013 10:43:54 PM mbam-log-2013-10-04 (22-43-54).txt Scan type: Quick scan Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 192164 Time elapsed: 1 minute(s), 9 second(s) Memory Processes Detected: 2 C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 1364 -> Delete on reboot. C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> 2028 -> Delete on reboot. Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 1 HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|CryptoLocker (Trojan.Ransom) -> Data: C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe -> Quarantined and deleted successfully. Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 1 C:\Users\{username}\AppData\Roaming\{112C4A02-1112-2F13-0E3F-08081D0B15DF}.exe (Trojan.Ransom) -> Delete on reboot. (end)
As mentioned before the full version of Malwarebytes' Anti-Malware could have protected your computer against this threat.
We use different ways of protecting your computer(s):
- Dynamically Blocks Malware Sites & Servers
- Malware Execution Prevention