There is a hidden, and I mean well hidden, My Documents folder in the root and then there is the available Users folder. It sounds like the same one. I have only been able to see the My Documents folder using a Linux distro and that is where previously I was able to pull copies for the user (not my wife). I only found it then because I was doing a scan using the Linux distro to look for bugs. The user did not have any copies of some of the software on the system so a rebuild was not possible. Jon From: [email protected] To: [email protected] Subject: RE: [NTSysADM] Security question from a non-security person Date: Sun, 2 Nov 2014 03:23:00 +0000
Out of curiosity, what is the path you’re referring to as a second profile? The only thing I can think of that looks anything like a second copy is the “Documents and Settings” junction point on Windows Vista+ Matthew Topper From: [email protected] [mailto:[email protected]] On Behalf Of Jon Harris Sent: Sunday, November 02, 2014 12:15 AM To: [email protected] Subject: RE: [NTSysADM] Security question from a non-security person Windows 7 Pro x64, no domain, and I don't think the shadow copies are on. I looked but did not see a restore from shadow copy available. I will look again. Jon From: [email protected] To: [email protected] Subject: RE: [NTSysADM] Security question from a non-security person Date: Sun, 2 Nov 2014 03:04:49 +0000 The only method anyone has had success with aside from paying the ransom or restoring from backup is pulling the data from a shadow copy. Shadow Explorer seems to work well for browsing them, though newer instances of the crypto viruses are clearing restore points as part of infection. Matthew Topper From: [email protected] [mailto:[email protected]] On Behalf Of Jon Harris Sent: Sunday, November 02, 2014 12:01 AM To: [email protected] Subject: [NTSysADM] Security question from a non-security person I am really hoping someone has an idea of how to go about this. Before I start let me say I have only gotten started on this but it is outside my normal area of expertise so I will be looking on the web. Issue Wife (yes my wife) ignored me about doing backups, not blocking updates, and being more careful about her browsing habits. She managed to get bit by a crypto virus which I can get the name of if necessary. All of her files have been encrypted including a 5.3 GB PST. Her email is Gmail and I set her up to use POP, more than that is just too hard for her. She is not dumb by any stretch just very stubborn, and in some computer areas extremely smart. Security is just not one of those areas. While I know enough to be able to do some simple security work I don't pretend to be a Security person. Anyway I have removed the bugs, all were specific to her profile only (thank God she is only a user). I have used a Linux distro to archive the two copies of her profile, you do know there are two copies right? Well anyway on a previous virus infection I got luck (to bad not this time) and only one of the copies was damaged. I am still doing some clean-up but at the moment it appears both copies were encrypted. Normally I would just tell the user, so sorry/to bad and blow the machine away and start over. That will not be possible as this is my wife and for those with a SO and like to keep peace in the house you would know that is not happening unless there is no other way. Question Has anyone found a way OTHER than paying these creeps off to get these files de-encrypted? Like I said I am still in the cleanup and getting the machine ready for use again and have not yet done any web searches. Oh and paying them off is not even is the room with the table! Side note Why is it the IT person is the one blamed when a user ignores what we tell them and gets bit by a bug? Thanks for any ideas or suggestions, Jon

