Leaderboard


Popular Content

Showing content with the highest reputation since 07/22/19 in all areas

  1. 1 point
    the Ransomware need decryptor.... they removed shadow volume copy, so wont be able to restore and also encrypt the original file, so no point of using data recovery tool. Please suggest
  2. 1 point
    Try installing it, rebooting and then try Win updates again https://www.catalog.update.microsoft.com/home.aspx
  3. 1 point
    Some info on this here andrey https://borncity.com/win/2019/08/14/windows-updates-kb4512506-kb4512486-drops-error-0x80092004/ Do you have KB4474419 and KB4490628 installed?
  4. 1 point
    We've had this conversation before. There's no need to keep posting your information. We already have it. If there's a way your files can be decrypted, then you will be contacted privately to let you know how.
  5. 1 point
    Look at your file that I attached. From personal experience, I use always folders with English words or numbers for decryption. Folders in other languages may not be supported. This does not apply to decrypters from Emsisoft. This is just my experience. @GT500 from Emsisoft or @Demonslay335 experts will tell you in more detail or fix this problem. Wait. I recommend solving problems with decryption through PM, so developers and ransomware actors will not know the secret.
  6. 1 point
    Not yet, but decryption of 3.0 is coming soon. The idiot who coded it has an annoying bug that corrupts many files that we have to overcome.
  7. 1 point
    Hello @chmm2100387 Previously and at the moment there is no known way to decrypt files after an attack by Phobos Ransomware. This is checked regularly as the current version or a new version of the encryptor is released. None of those involved in decrypting files after an attack by ransomware has not yet published a decryptor or method that allows you to decrypt files or otherwise return information from files after a Phobos attack. If you will search for new information on the Internet, then take into consideration the following info: many sites that Google gives in search results make public disinformation and offer to download fake decryption tools. Sites that provide true information and free decryption tools: https://www.bleepingcomputer.com/forums/f/239/ransomware-help-tech-support/ https://support.emsisoft.com/forum/83-help-my-files-are-encrypted/ if you want, add to them those that are in my signature. These sites (forums) help victims for free. No fee is required if they can help. Experts from different countries and different nationalities gather here. If decryption becomes possible, then they and we will report on successful decryption methods in the news and on forum publications.
  8. 1 point
    Ach, so they are. I just c&p them out of the OP's report and looked them up separately. I wonder why the OP had two copies?
  9. 1 point
    The digital signature has been whitelisted now, so hopefully that should resolve the issue for you.
  10. 1 point
    I have seen this error for many months. It happens to me after each hourly update. See here https://support.emsisoft.com/topic/30404-event-id-17/?tab=comments#comment-190117
  11. 1 point
    MBAM = Malwarebytes Anti-Malware? That's not quite our area of expertise.
  12. 1 point
    That happens when a software publisher doesn't digitally sign something. We can whitelist a specific file, but when that file gets updated then it's no longer whitelisted.
  13. 1 point
    Hi Anugio-A, My computer is infected in the similar way to the OP's situation but maybe some variant from his/hers. Would appreciate your kindly help if you can look at it. B.T.W. I didn't find any infected txt or hta files but I assume ".ini" or ".html" files may be the easiest to decrypt if possible. Thanks so much in advance for any help if you would like to offer! desktop.ini.id[D2206A4C-2275].[[email protected]].Adame index.html.id[D2206A4C-2275].[[email protected]].Adame
  14. 1 point
    Hello, The main causes of laptop random reboots, list in order, are: Heat Faulty hardware Faulty drivers Software crashes Malware You logs show no Malware. Also I see no crash dumps in the FRST logs. The Event log shows that Chrome is misbehaving and an Intel Driver is crashing. There is an Alternate Data Stream that should be removed. Copy the below code to Notepad; Save As fixlist.txt to your Desktop. Close Notepad. NOTE: It's important that both files, FRST64, and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. NOTE: If the tool warns you about an outdated version please download and run the updated version.
  15. 1 point
    Hello @karan11 Looking at the format of the encrypted file, we can say that this is the result of the Phobos Ransomware attack. But in order for our help to be more accurate and informative, ALWAYS need to attach to the message 2-3 different encrypted files and a ransom notes, that the extortionists left for you. This may be files info.txt, info.hta I recommend to put them in the archive and attach to the message, in this way they will not be damaged.
  16. 1 point
    A context menu scan should use that option as well. I don't have any reason at the moment not to take you at your word. There's no need to try to provide proof. Brave is Chromium-based, and thus supports IOfficeAntiVirus. The same goes for Opera 15+ and Vivaldi. I assume you mean the software from the following URL? https://getblackbird.net/ I'm not familiar with it. I usually use ShutUp10 (with almost every option selected), and then run a batch file that executes PowerShell to remove almost all of Windows 10's pre-installed apps. Detection, as far as I know, works fine under these conditions. If it supports command-line scanners, then you'll want to use a2cmd.exe with the /s parameter. You can get the documentation by running a2cmd.exe /s /? in a Command Prompt (be sure to use the CD command to switch to the Emsisoft Anti-Malware folder before trying to run a2cmd.exe from the Command Prompt).
  17. 1 point
    That's not encouraging... Hopefully someone from Emsi will come along and explain. It seems to me that there's three issues: first, whether or not with 'Paranoid' being set, files are being scanned as they are downloaded. I'd certainly have hoped so; if not we need an "even more Paranoid" setting... Secondly (if files are being scanned on download): why is a scan-on-download not making the same detection as a custom scan later on? Downloading files is surely the main way that most of us get potential malware, so a scan then should be as thorough/rigorous as possible. Thirdly, the Behaviour Blocker's behaviour. If all you've let the installer do is start & display its splash screen then it probably hasn't yet done anything that the blocker would think is suspicious, so no BB alert is fair enough. (I'm not suggesting you should let it do more if you think it is dodgy.) I don't think/know that the fact that the installer is running with Admin privilege is relevant. I /hope/ that malicious softare running under Admin auth is blocked when it actually does do something dodgy.
  18. 1 point
    I've let our malware analysts know about your files, and they'll take a look at them if they need to. That being said, our malware analysts are already familiar with the encryption used by JSWorm 3 and JSWorm 4. In theory decryption of both should be possible. Keep an eye on our blog and BleepingComputer's news for the announcement: https://blog.emsisoft.com/ https://www.bleepingcomputer.com/ Both also have RSS feeds available, if you'd like to be automatically notified about new articles: https://blog.emsisoft.com/feed/ https://www.bleepingcomputer.com/feed/
  19. 1 point
    Make sure that you don't have any ports forwarded for the NAS in your router, and make sure that UPnP is disabled in the router's configuration.
  20. 1 point
    https://www.sendspace.com/file/s5ndbp
  21. 1 point
    I will forwarded this information. Wait please.
  22. 1 point
    This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted. @Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. Download STOP Decrypter now >>> I recommend to you start decrypt with a small group of files, but first you need to make copies of these files. If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter  [+] Loaded 59 offline keys Please archive the following info in case of future decryption: [*] ID: fLZ0FsGOpqQKtS85F02McGLS2zvr55u1wR2tblpR [*] ID: 68O9eTFDNbn8z2O956vweaL1v2GY5gvWBYMKcmt1 [*] MACs: 2A:03:9A:C3:93:6B, E8:03:9A:C3:93:6B, E8:03:9A:C3:93:6C This info has also been logged to STOPDecrypter-log.txt
  23. 1 point
    Here are some additional files to assist you guys with finding a possible solution. We have had three clients hit so far, one I cannot pull files from, so I have attached the two that I could pull from, and it includes 3 files and the ransom note. https://www.sendspace.com/filegroup/pQy%2Fr36fUtEYB9TrvQLBEQ
  24. 1 point
    Asdu374idfg68O9eTFDNbn8z2O956vweaL1v2GY5gvWBYMKcmt1 It looks like an online key with which decoding is not yet possible.
  25. 1 point
    While most ransomwares will automatically delete themselves after they finish encrypting files, some are now leaving behind components on computers they infect that will encrypt any new files saved and will encrypt any files you manage to decrypt. It's best to check and make sure that no such components have been left behind, so I recommend following the instructions at the link below to get us logs from FRST so that one of our experts can make sure there is nothing malicious still on your computer (please attach the log files FRST saves to a reply to this topic on the forums): https://help.emsisoft.com/en/1738/how-do-i-run-a-scan-with-frst/ Note: If anything that appears suspicious is found in your logs, then your post will be moved into a new topic to facilitate better communication between you and whoever is assisting you. We'll also try to make sure that you are following the new topic so that you receive e-mail notifications when someone replies to it.
  26. 1 point
    Obviously we can't condone or endorse piracy, however if someone wants to take risks with their computer then they should be running risky software in a sandbox or a virtual machine. Tell him to add exclusions for the games, as well as for Steam/Origin/Uplay/etc. That should help with performance issues. In Emsisoft Anti-Mawlare for instance, you can exclude the entire Steam folder like in the screenshot below, and that covers any games in the SteamApps folder as well:
  27. 0 points
    Dear Tahir If I could help you, I would certainly help. But it is not in my power. We cannot change the encryption as we wish, it is a very complex computing process. @Demonslay335 (the developer of the STOPDecrypter) collects information from STOPDecrypter with ID victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible. 
  28. 0 points
    ini contoh sample dari varian ransomware .NELASODYUMI2.0.5.4 (1).exe.nelasod _readme.txt Crack PES 2017.kuyhAa.rar.nelasod
  29. 0 points
    If you go to the Protection settings (click on the Shield icon on the left side of the main GUI screen), then look at the File Guard settings there, you can make a choice ("Scan Level") for how often EAM looks at files. The default is probably less often than you'd like, but means less impact on system performance.
  • Who's Online   0 Members, 0 Anonymous, 57 Guests (See full list)

    There are no registered users currently online

  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up