GT500

Emsisoft Employee
  • Content Count

    12535
  • Joined

  • Days Won

    374

Everything posted by GT500

  1. I forgot to mention this the other day, so I'll mention it now in case anyone else reads this. DOCX files are ZIP archives which contain other files, and if you have a file pair for a ZIP archive that meets the file size requirement then that should allow for decryption of DOCX and XLSX files.
  2. Dr. Web does not release free decrypters. Their ransomware decryption service is strictly a paid service, however they will at least let you know if your files can be decrypted before they require you to pay anything. If they do require a file pair, then you'll need to find one. Try to remember if you ever sent any files to others (via e-mail, file sharing services, etc) or if you ever saved them to any kind of external media (CD's, DVD's, USB flash drives, etc).
  3. Our software is not compatible with Windows 8. We dropped all support for Windows 8 a couple of years ago. Could you take a screenshot of the message you're seeing, and post it here? You can paste it right into the reply field.
  4. It's probably necessary, however you'd have to ask Malwarebytes support to be certain (I'm not familiar with their current software versions). I'm fairly certain it's too soon for them to have fixed the BSoD, as the day before that update was released I was told they were still investigating the cause. Unless it was a really simple fix then that's just not enough time to implement a fix, test it internally, push it out to beta for volunteers to try, gather feedback, fix any remaining issues, release a new beta, and then push it out to stable once it's deemed satisfactory.
  5. Awesome! thanks for letting us know. 👍
  6. We just released 2020.7 stable, and the new beta (which was moved to stable a few minutes ago) should have had extra fixes for performance issues. https://blog.emsisoft.com/en/36400/new-in-2020-7-new-rdp-attack-alerts-new-notifications-system/
  7. Send us the largest file pairs you have with .hrosas extensions, and we'll try too add keystreams for them. The decrypter won't be able to decrypt anything larger than your file pairs, but anything smaller should be fine.
  8. Is anyone still having this issue with the current beta?
  9. Is your largest file pair also the largest DOCX file you have?
  10. This is a newer variant of STOP/Djvu, and your ID is an online ID, so there is currently no way to decrypt your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/ Our forums are monitored by criminals who make ransomware, so you shouldn't ask people to contact you privately to offer help. If anyone does contact you privately, the don't follow any advise they give you.
  11. You'll have to wait for @Amigo-A as I have no contacts at Dr. Web.
  12. The information they gave you is fairly typical. Most ransoms like this are expected to be paid in bitcoins. Obviously we don't recommend paying the ransom, however we also understand that you have to do what you feel is necessary. Just be sure to ask them to decrypt one file for you to demonstrate that they can do it, that way you know in advance that their decrypter works before you pay them anything. If they can't decrypt one file for you then it's best to assume it's a scam, and cease all contact with them.
  13. If law enforcement is able to catch the criminals or otherwise gain access to their servers and release their private keys for use in decrypters, then we can add them to our database so that everyone can get their files back. Our recommendation is to save a backup of your encrypted files and keep it in a safe place in case decryption is possible at some point in the future. We also recommend keeping an eye on BleepingComputer's newsfeed, as they will usually report on new developments with ransomware decrypters: https://www.bleepingcomputer.com/ If you have an RSS feed reader, then they also have an RSS feed so that you don't have to manually check for news: https://www.bleepingcomputer.com/feed/
  14. The only "solution" is to use the private keys to decrypt files, however only the criminals have these. There's nothing we can do until those are released.
  15. Please be careful. Criminals who make ransomware do monitor our forums, and they will take any opportunity to contact you and try to get you to follow their advice, often offering "paid" help or fake "solutions" or "decrypters" that make things worse for you. For your safety we recommend only following the advise of experts, and we also recommend not communicating privately with other victims. If someone does leave advise publicly, please allow experts time to evaluate it and comment on it before trying it.
  16. No. Newer variants of STOP/Djvu use RSA keys, which are impervious to most attacks.
  17. Unfortunately there's no way around this. The files used for the file pair need to be a minimum of 150 KB, otherwise they can't be used to generate a proper keystream for decryption. If the files were too small, you'd end up with incomplete decryption.
  18. That's an application error, and Windows would have logged it. That's perfectly fine. C:\ProgramData\Emsisoft\Updates is where EAM saves update files it downloads before merging them into the main Emsisoft Anti-Malware folder. In most cases it isn't needed to exclude this folder, however it can prevent issues in the rare instance where another security software may falsely detect one of our updates or otherwise prevent an update file from being copied to the Emsisoft Anti-Malware folder. That being said, I'm fairly certain that there are no instances where anything will ever execute out of C:\ProgramData\Emsisoft or any of its subfolders.
  19. This is a newer variant of STOP/Djvu, and your ID is an online ID, so there is currently no way to decrypt your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/ Please note that you shouldn't post your e-mail address or other contact information publicly. Not only does it encourage spam/junk mail, but criminals do monitor our forums and will try to contact ransomware victims with fake "fixes" or "decrypters" they'll try to get you to pay for, or they'll try to extort money from you via other means.
  20. If law enforcement is able to catch the criminals or otherwise gain access to their servers and release their private keys for use in decrypters, then we can add them to our database so that everyone can get their files back. Unfortunately those methods don't usually work, as the criminals who make the ransomware account for them and try to prevent them.
  21. More than likely not. There are too many threads about this ransomware to keep track of, or to be able to reply to all of them. Our recommendation is to keep an eye on BleepingComputer's newsfeed, as they will usually report on new developments with ransomware decrypters: https://www.bleepingcomputer.com/ If you have an RSS feed reader, then they also have an RSS feed so that you don't have to manually check for news: https://www.bleepingcomputer.com/feed/
  22. This is a newer variant of STOP/Djvu, and your ID is an online ID, so there is currently no way to decrypt your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/ Tradução fornecida pelo Google: Esta é uma variante mais recente do STOP / Djvu, e seu ID é um ID online, portanto, atualmente não há como descriptografar seus arquivos. Há mais informações no seguinte link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  23. That means it can't find any encrypted files. File pairs won't work with newer variants of STOP/Djvu as they use RSA keys, which are impervious to most attacks.
  24. When you add them to the exclusions in Emsisoft Anti-Malware, be sure to add them to both the scanning and monitoring exclusions. If you don't, then Emsisoft Anti-Malware will still open hooks to excluded processes, and those hooks can be the cause of compatibility issues (whether a process is "monitored" or not is actually irrelevant unless the Behavior Blocker is actively blocking a process, and a notification would be displayed if that were the case).