All Activity

This stream auto-updates     

  1. Today
  2. Please help me to decrypt my file back. I got virus from this website. i think i got this virus from this website / app https://official-kmspico.com password official-kmspico.com Thanks before hand. ATTENTION! Don't worry my friend, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-mVSS8cJcv3 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Our Telegram account: @datarestore Your personal ID: 086Hjh74389hUSf83yJSDu5l4JvViyu408oZ0z2JDewnlpR6dttPgZt1
  3. Let's see it as a feature request for EMSI. Creating a RescueCD/USB or offering an external tool for that. People switching from other AV-Tools might expect such a feature. WinPE or Linuxbased are offered by competitors. But I'm not sure how many users/customers are waiting for such a feature. Without a backup tool, the rescue promise is often falling short. And endusers often skipping creating and updating the boot-cd/usbstick. Looks like a lot of work with little impact on the userbase.
  4. well if you're referring to this newsletter https://blog.emsisoft.com/en/32193/new-in-2018-10-new-home-and-business-license-plans/ there is nothing in this that mentions auto-renewal (nor incidently does it mention the removal of loyalty bonuses but I won't go there) thanks - I will pm you shortly
  5. You better need pay them and you get back all your files(I paying them 6000 USD and get key very quickly),If you try with another soft decrypted you most likely never get result.and after month or two if you ready to pay the kackers can ask price three times more expensive now :(
  6. Hello marko, we communicated our new license model to users suscribing to our newsletter early November 2018. Yes. we have a new shop partner and are working to improve the end user experience. Once again, we are reviewing our pricing communication and thank you for the input. As for the status of your personal license, feel free to drop me a PN or write an email to [email protected] and I will check it gladly.
  7. Hello Jeremy, we are thinking about it and we did report our colleagues the mismatched info from our website vs. order notification. In all truths, thank you for your feedback. We are looking at it and how to handle it.
  8. EMSI moves into the direction of the other Softwareproviders. Differentiating price model between home and enterprise. 30day trial only via account. Getting direct user contact via enduser accounts. Other AVs have done that before. As long as you're not a pure reseller, but let' your customers pay for the support it's fine. The promotion aspect might be no longer worth offering a free 30day option without account. EMSI will look at the stats of conversion rate. I would be surprised to see 30day Trialkeys for reseller soon.
  9. MACs: 50:7B:9D:42:68:F0, B6:6D:83:E0:81:FC, B6:6D:83:E0:81:FD, B4:6D:83:E0:81:FC No key for ID: TZJSkeJ4DTCXUnXpdCiXXExPiC8ea2s5LF4UOYOZ (.norvas )
  10. MACs: 50:7B:9D:42:68:F0, B6:6D:83:E0:81:FC, B6:6D:83:E0:81:FD, B4:6D:83:E0:81:FC No key for ID: TZJSkeJ4DTCXUnXpdCiXXExPiC8ea2s5LF4UOYOZ (.norvas )
  11. I managed to decode all files without any problem. Of course, I've also implemented all security recommendations for my NAS for the future. Thank you very much for your help! :))
  12. okay, thank you for the response. I'm waiting for the solution.
  13. Yesterday
  14. Thanks gents for casting an eye over this for me. I will keep an eye out for any updates but I believe with how BigBobRoss works and the fact the victim machine had internet access that the likelyhood of decrypting is remote. Would this be fair to say?
  15. I am with the same type of CODNAT encryption, but I have already restored the PC and pass the emissoft anti malware where it says that my PC is clean I think
  16. Hallo Thomas! Kannst mir bitte auch so einen Link schicken? Ich habe das selbe Problem. Danke im Voraus! olynt
  17. Since there was not given answer from the victim, it is important in any case not to leave the topic hanging on mid of word. In the case of this Ransomware, antivirus engines may be mistaken. Most likely they will call it the GlobeImposter Ransomware, but this is most likely another Ransomware. Apparently, it has the code from GlobeImposter in order to mislead. Service ID Ransomware id has recently also identified it as GlobeImposter. We have collected various variants as part of the updates in the article Maoloa Ransomware. Demonslay335 only recently discovered that some variants are not GlobeImposter, but are defined as GlobeImposter. This question still needs to be studied in detail and elaborated in detail, and there may be more such fake GlobeImposter. Recently another fake GlobeImposter was found, for him I have a separate article and updates, but it does not apply to this topic.
  18. Surya dinata Your data will be recorded. Today is the weekend. Smart heads must sometimes rest in order to work well afterwards. 😊
  19. I have done a scaning process with several antiviruses and I am sure it is free of malware. I have also run stopdecripter v2.1.0.5, but the results remain the same. [!] No keys were found for the following IDs:[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.bufas )[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.rar )[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.exe )[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.xlsx )[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.docx )[*] ID: iE5qxqT7ffEzQqdUb0LtnCPwfn0YDkpVZumwVgt1 (.jpg )Please archive these IDs and the following MAC addresses in case of future decryption:[*] MACs: D0:50:99:4B:9B:84 please help me...
  20. After checking the PC and folders with encrypted files, you can use the free tool to decrypt files - STOPDecrypter (link) This process should be approached with caution. Read the attached text file. Due to the nature of encryption, only files that are encrypted with offline keys can be decrypted. We recommend that you make a test decryption of a small number of encrypted files and make copies of them in advance.
  21. If your files are encrypted and now have an .fordan extension, then this is the result of an attack from the STOP Ransomware. STOP Ransomware encrypts files of users in many countries due to the fact that they download and run hacked software (MS Windows, MS Office, other repacked or patched programs), from which someone removed the activation, making them free and dangerous at the same time due of this malicious code. Before you decrypt the files, you need to make sure that there is neither this infection nor any other infection on the PC. We have seen cases when those who suffered from previous versions STOP Ransomware successfully decrypted files, but then they were attacked by the same encryptor, which encrypted files with a different extension, and used an encryption key that cannot be calculated. In punishment for haste and complacency, the user lost his files a second time and, possibly, forever. As experience shows, very often after encryption on a PC, this or another infection remains, which you could get together with the encryptor.Malicious programs often work in groups: trojans of a different type, password hijackers, backdoors, dormant malware, dangerous browser plugins. If you need help checking your PC for malware, you can make a request in the next section. You can also download the free tool Emsisoft Emergency Kit yourself and check the computer.
  22. Did you read the text file that was in the archive with the STOPDecrypter? Did you open the links 'Support Topic' and 'FAQ'? At these links is all the necessary information. Your now need to copy the information from the STOPDecrypter window and paste it here or on the Support Topic. Then Demonslay335 - the developer STOP Decrypter will see your information.
  23. sir my pc infect fordan malware (ransomeware) please solve my problem
  24. I used stopdecrypted but it doent decrypt my files it showing error
  25. After checking the PC and folders with encrypted files, you can use the free tool to decrypt files - STOPDecrypter (link) This process should be approached with caution. Read the attached text file. Due to the nature of encryption, only files that are encrypted with offline keys can be decrypted. We recommend that you make a test decryption of a small number of encrypted files and make copies of them in advance.
  26. After checking the PC (or only folders with encrypted files), you can use the free tool to decrypt files - STOPDecrypter (link) This process should be approached with caution. Read the attached text file. Due to the nature of encryption, only files that are encrypted with offline keys can be decrypted. We recommend that you make a test decryption of a small number of encrypted files and make copies of them in advance.
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up