All Activity

This stream auto-updates     

  1. Today
  2. If the creator of STOPDecrypter is able to figure out a decryption key for you, then he should contact you privately to let you know.
  3. Beyond the browser hijacker that effected Google Chrome, I don't see anything else that looks malicious in the logs, so you should be good. I noted that while you had Malwarebytes Anti-Malware, HitmanPro, and some Trend Micro Screen Unlocker tool you don't appear to have a real anti-virus software with real-time protection installed (unless you had real-time protection enabled in Malwarebytes Anti-Malware, which I think they just call "Malwarebytes 3" now). If you are relying on Windows Defender to protect your computer, then I recommend getting a paid anti-virus software to supplement it. Most paid anti-virus software offers a 30-day free trial, including Emsisoft Anti-Malware, so I highly recommend finding something you like and not depending on free protection.
  4. No one has an immediate solution for this. If you can give the analysts a little time, they may be able to come up with a way for you to decrypt your files.
  5. If there is any news, you should be contacted privately by someone with the screen name Demonslay335.
  6. Cryptocurrency miners are fairly well detected. I would believe they mostly just use pre-existing mining software, and use a trojan to sneak it onto someone's computer without their knowledge, so detecting them is usually fairly easy. Unfortunately this does mean that EAM has to detect any legitimate mining software, since it could always be bundled with malware for the purposes of using your hardware to mine for someone else's profit.
  7. Yesterday
  8. i reset my google chrome browser and uninstall other antivirus , now tell me whats next
  9. Hallo Olynt, vielen Dank für Rückmeldung und Feedback. Freut mich wenn alles wie vorgesehen funktioniert hat. Für weitere Fragen stehe ich gerne zur Verfügung und wünsche einen guten Start in die neue Woche!
  10. On your system now there are several antivirus and support programs. This does not enhance protection, but only hinders. It is advisable to remove everything and install one, but a comprehensive anti-virus solution that will control all possible ways of penetration of malicious programs, including through remote access. For Windows Professional, you must install all critical patches from Microsoft, including to protect the RDP from all known vulnerabilities. STOP Ransomware, which attacked your PC, uses a very tricky method, which is associated with the penetration through the RDP-utility, which free antiviruses always miss.
  11. Anky Please, be patient. Support specialists may not respond during the weekend. This is indicated in the forum rules. Among other things, I want to note that your Google Chrome browser is also infected. Reset its settings, replace the start page with google.com, remove third-party extensions. What is now ruling there can lead your browser to sites that have become the cause of infection and encryption.
  12. sunny parmar Please, be patient. Support specialists may not respond during the weekend. This is indicated in the forum rules. The solution of the problem may come not very quickly. Do not depart from the topic, it is important for you, wait for the answer of the specialist and the final decision.
  13. The support team will review the logs and tell you what to do. Do not depart from the topic, it is important for you, wait for the answer of the specialist and the final decision.
  14. This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017, this is earlier than many antivirus programs. Some of them announced the discovery of one of the variants of this Ransomware only in August 2018, when there was a massive attack on residents of many countries. Unfortunately, this attack continues. Now on the forum a lot of victims from different options of this extortionist. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the decoder) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. Note: To identify this Ransomware and confirm my information, you can use the service ID Ransomware.He will give you a link to the support topic on the BleepingComputer forum, you need to read the first post of the topic and inform the requested information there or here - Mac-address of network device. --- If STOPDecrypter can't recover your files, then note that it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter Also, while most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers they infect that will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check and make sure that no such components have been left behind, so I recommend following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  15. Please, be patient. Support specialists may not respond during the weekend. This is indicated in the forum rules. The solution of the problem may come not very quickly. Do not depart from the topic, it is important for you, wait for the answer of the specialist and the final decision.
  16. ARNEST Please, be patient. Support specialists may not respond during the weekend. This is indicated in the forum rules. The solution of the problem may come not very quickly. Do not depart from the topic, it is important for you, wait for the answer of the specialist and the final decision.
  17. The support team will review the logs and tell you what to do. Do not depart from the topic, it is important for you, wait for the answer of the specialist and the final decision.
  18. This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017, this is earlier than many antivirus programs. Some of them announced the discovery of one of the variants of this Ransomware only in August 2018, when there was a massive attack on residents of many countries. Unfortunately, this attack continues. Now on the forum a lot of victims from different options of this extortionist. In some cases, the files can be decrypted. This is possible only in case where the files were encrypted with offline keys and an instance of the malware was detected. Demonslay335 (the developer of the decoder) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. Note: To identify this Ransomware and confirm my information, you can use the service ID Ransomware.He will give you a link to the support topic on the BleepingComputer forum, you need to read the first post of the topic and inform the requested information there or here - Mac-address of network device. --- If STOPDecrypter can't recover your files, then note that it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter Also, while most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers they infect that will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check and make sure that no such components have been left behind, so I recommend following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/
  19. Unfortunately, the note on the purchase of JURASIK-DECRYPT was not provided, nor here, nor on the BC forum.
  20. Hello, I'm very interested to know if EAM protect me enough against cryptocurrency mining malware ? I only find this old this old blog (October,11, 2017) https://blog.emsisoft.com/en/28817/cryptocurrency-mining-malware/, but I don't know if since this date there are some changes ?
  21. ANY NEWS MR GT500 OF A SOLUTION TO MY PROBLEM...
  22. My computer infected filename.fedasot Please help me for resolving this ransomware. I find tool but not
  23. i run another scan with frst64 asyou say so last scan file is attach with with t his rply FRST.txt
  24. So now i have to run scan with frst64 or press fix button
  1. Load more activity
  • Who's Online   0 Members, 0 Anonymous, 65 Guests (See full list)

    There are no registered users currently online

  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up