Oh dear - I am sorry to hear that. Those are all good programs to run (although I would use
SuperAntiSpyware Free over Spybot). I assume now you have only ONE active anti-virus running on the machine?
You might want to add these:
RKILL
TDSSKiller (Kaspersky-onetime run for rootkits)
Make sure to tick all the boxes and let the computer reboot so it can run the scan fully.
RKILL (again) Because everything RKILL does is undone by a reboot.
ADWCleaner (will reboot to clean)
Feel free to post the log after you run it and I'll have a looksee for what's leftover. Usually these crypto malware are easy to clean or even remove themselves after they've delivered their payload.
RKILL again
JRTt
Note: RKILL will put a log on your desktop called rkill.txt, and will overwrite it each time you run the scan, so if you want to keep them, rename them rkill01.txt, rkill02.txt, etc.
For future protection against these encryption nasties (and a lot of others), I would make the following recommendations:
One good active anti-virus (ESET is excellent, if you can afford it - usually on sale at Newegg on a regular basis)
MBAM (free or pro)
MBAE (free)
CryptoPrevent Free
SuperAntiSpyware Free
A file backup system which uses "versioning".
Alternating backups: 2 drives, one disconnected at all times, and rotate them on a regular basis.
Note: MBAM have an anti-encryption BETA right now, which will eventually be rolled into their paid version of MBAM Pro.
Of course, nothing beats common sense.

But, if you were using, say, gmail, and collecting your emails online using your browser (and not an email client), a lot of this stuff would never even reach your inbox, and if it did, it would likely be flagged. (Not to plug gmail, but they have pretty aggressive email scanning, and ferret out quite a bit, and warn you with other stuff.)
Depending on the infection you had (if you know the name, or can provide all scan logs), I could research it to see if it warrants a clean install.