All Activity

This stream auto-updates     

  1. Past hour
  2. DrWeb can decrypt some files that STOP-Decrypter cannot decrypt, only in another way. Only .pdf encrypted files and all the Office documents .doc, xls, docx, xlsx, ppt, pps, etc … Unfortunatly with this way can't will decrypt photo, video, audio and many files with other extensions. If free test decrypt these files will successful, the fees requested by Dr.Web experts 150 EUR for Rescue Pack (Personal decryptor + 2-year DrWeb Security Space protection). There is no alternative to receiving this service. If the test-decrypt will fails, no payment will be required. Tell me, if this way suits you, I will let you know what files you need to collect for this. I do not participate in this process and do not provide any help except this information. I not having any financial benefit and is not involved in this decryption service at all.
  3. In addition, the STOP-Djvu Ransomware does the following: 1) leaves behind a software module that steals personal information from browsers and other programs; 2) modifies the hosts file to prevent browsers from opening anti-virus companies' websites and forums (like this one) that helps victims. For these targets: 1) after checking and cleaning the PC, when it is be confirmed that there are no other malicious modules, you need to replace the passwords for all sites with more complex ones (at least 12-16 characters, including A-a, Z-z, 0-9, @ # $). 2) you need to reset or delete the modified hosts file, without it, all legitimate sites will be available to you. The path to this file is: C:\Windows\System32\drivers\etc\
  4. Most ransomwares will automatically delete themselves after they finish encrypting files, but some are now leaving behind components on computers they infect that will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best practice to check and make sure that no such components have been left behind, so we recommend following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (just attach the log files FRST saves to your message): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  5. Hello @Mido This is the result of the STOP-Djvu Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. Extension .kvag - this is new variant of STOP Ransomware. Until recently, it was possible to collect some information and add it to STOP-Decrypter. Now this does not help. We expect changes in the decryption method. But so far there is no such news and the victims remain with encrypted files. I repeat, there is no way to decrypt files yet. Any site that offers decryption for this variant may be a scam site. Be careful.
  6. Hello @SYED Please read my height above. At this point in time, this is the only chance to return some of their files. This is not a simple job that can be done as 1-2 min. It takes time, the work of analysts and the computing power of PC's of specialists.
  7. Today
  8. Please upload a copy of the ransom note and an encrypted file here and post back with the result. https://id-ransomware.malwarehunterteam.com
  9. I appears I need some more help. I'm doing this on my laptop now and things aren't going as smoothly. Is there a list of process files for Emsisoft that I can look at to exclude them from mbam?
  10. Hi everyone, My computer has been affected with .kvag virus which has changed the extension of my all files. It is a ransomware virus which demands ransom money to decrypt my all data. Can anyone please me decrypt my all data with any Decryption tool? Below is the text note which was dropped automatically in every folder, its a note by the virus maker... ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-JbqssVgS78 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0163Asd483yiqgkhjdgc99x12hHpIXDmv0CktjyInyq4DEIwiwmlAFxli9v
  11. Yesterday
  12. HELLO ALL I am also infected by STOP DJVU .PETA i got my file with shadow files.
  13. Last week
  14. We paid two time and they didn`t gave me decryption code.
  15. Never pay to [email protected]! They always want extra money after first payment.
  16. Never pay to [email protected]! They always want extra money after first payment.
  17. Never pay to [email protected]! They always want extra money after first payment.
  18. Never pay to [email protected]! They always want extra money after first payment.
  19. Never pay to [email protected]! They always want extra money after first payment.
  20. There is another problem also. When two different alarms (like "update" and "restore object from quarantine" notify) appear on the Anti-Malware side, the computer is completely frozen and the computer must be restarted.
  21. Microsoft windows server. did you find something? at this moment seem there n't decryptor. Ransomware contact is [[email protected]]
  22. Hey, I just got infected and seek help too.. Was your server running linux? Trying to find how I got infected too.
  23. Hello, my personal server was infected by Phobos ransomware Banjo extension. Somebody could help me?
  24. In addition, Buran was launched as a project that can be bought and remade in order to complicate the detection by antiviruses, transfer data to the server, and key the key in a secure way that cannot be obtained otherwise. We have already seen several projects redone from the original Buran. Service ID Ransomware identifies everything under one name, so only a specialist can find the differences.
  25. Hello @Asif Ali Please read my height above. At this point in time, this is the only chance to return some of their files. This is not a simple job that can be done as 1-2 min. It takes time, the work of analysts and the computing power of PC's of specialists.
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up