All Activity

This stream auto-updates     

  1. Past hour
  2. Dear Sir please help me all my work and files are encrypted i'm trying to follow you instruction 1- downloaded FRST and scanned and the 2 files attached 2- i'm scanning the files with Kasperysky Internet security and it's deleting all malware 3- spyhunter didn't detect any malware 4 stopdecrypter no key message please help me with instruction to decrypt and get back all my files Addition.txt FRST.txt STOPDecrypter-log.txt
  3. Also attach this files: STOPDecrypter-log.txt _readme.txt
  4. Thanks for your reply .. but what shall i do ????
  5. @mdaher Uninstall SpyHunter first. Then restart the PC, even if there is no such request from this program. Uninstall McAfee Security Scan. This is a quick scan tool and it will not protect your PC from threats.
  6. Could you please help me i'm trying to follow the instruction but no clue already scanned all files with Kaspersky internet security and spyhunter when i try stopdecrypter it shows no Key kindly find attached 2 files as suggested please help me asap all my work and company paper will lost Addition.txt FRST.txt
  7. Today
  8. Oh thanks man. I'm looking forward to the future! ­čśŐ
  9. @Blacksharks This is in the updates in my article GlobeImposter Ransomware. Victims sent me samples. Test results: VT + VMR - Perhaps they will help decryption specialists figure out something. Compare this information with yours. All the same as by you? There is no free way and free tool to decrypt files. Alas.
  10. @GK sharma Hello This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. Download STOP Decrypter >>> First try to decrypt several files, previously by making copies of this files. If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter While most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers, which infect and will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check PC and make sure that no such components have been left behind, so I recommend´╗┐ following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  11. @Toby1222 Hello This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. Download STOP Decrypter >>> First try to decrypt several files, previously by making copies of this files. If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter While most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers, which infect and will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check PC and make sure that no such components have been left behind, so I recommend´╗┐ following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  12. Yes, use the site www.sendspace.com to upload such an archive. It is advisable to set an password 'infected' so that the service does not delete it.
  13. @Rachwell Gorblimy! Here are files from several encryptors and other malicious files. It is better to wait for the answer of the Emsisoft specialist @GT500, since it's their tool. It may be necessary to take samples of encryptor from Quarantine.
  14. Your files are now encrypted! All your files have been encrypted due to a security problem with your PC. Now you should send us email with your personal ID. This email will be as confirmation you are ready to pay for decryption key. You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files. Contact us using this email address ->> [email protected] If we do not answer you within 48 hours Write here ->> [email protected] Free decryption as guarantee! Before paying you can send us up to 1 *.JPG files for free decryption. The total size of files must be less than 5Mb Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. ----------- Your personal ID -------------- +QIAAAAAAACFkVXmHZIJDgQkCAOzZGvszw0ue=dSSkJaMDgWMYehg9blegmtjJlYshanooSp7X9EvtF1ZrPF9YjQegwvTlGiG+En UtKg0urUjTenVJi+fP=Ym2EXRnjmciSXdhCofqJ+v7p9m7SQt45=rOQRlwGssv2CPLK4Cb5DtMRQOWjmsAEhpjLdOpz7AY7vWMZh 9NpRsYn67a=bqPcOMQfZsvtNn7BZPMoIfcAfTxzUalVLGCEMjTS+CnRzU8cuHDXP9GlS85Nz17YuZupEVNvL=BT5g8pcc04uZumA 5aa+LahhSwHWIwgqxndIby2Vjvatggq9P6uS7WBYXVhZUU1==NlNBBnTcIc2wN7m=QUeH2QlRRY3a04oTDLbmJ5yrpctWL5o6Cbt ByCMrnXwrWlaCr32I4eW8ux1ym8z -------------------------------------------
  15. Bad luck for me, i was attacked by globe imposter v.2 and encrypt all my files into .docm, Is there any possible help sir?
  16. kindly let me know decryptor tool for these files , infected with Redmat 11237910_G10.pdf.redmat11237910_G10.pdf.redmat11237910_G10.pdf.redmatDATA -MACHINES .xlsx.redmat11237910_G10.pdf.redmat DATA -MACHINES .xlsx.redmat
  17. thank you so much GT500!!!
  18. Possibly in the future, just give us some time. ­čśë
  19. Should I have left the ransomware to encrypt my files properly?
  20. Okay, is it possible only to make a decryption key for .jpg files only? I don't want anything else. I am willing to pay for that.
  21. @Amigo-A and @GT500 Hi, Is attached the result of the Emsisoft emergency kit I have already discovered the possible source of ransomware, if you want to send the .zip file or the download link, maybe this information will help us scan_190615-205306.txt
  22. Yesterday
  23. Please I need help to decrypt files infected with .rumba ransomware.
  24. Hello Meri, I need a bit more information. What version of Windows is installed and have you tried to restore the system to a previous restore point?
  25. @Mohamad Ajmal See the answer to your request.
  26. @vivek choudhary This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. Download STOP Decrypter >>> If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter While most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers, which infect and will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check PC and make sure that no such components have been left behind, so I recommend´╗┐ following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  27. @Mohamad Ajmal This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. Download STOP Decrypter >>> If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter While most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers, which infect and will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check PC and make sure that no such components have been left behind, so I recommend´╗┐ following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up