Jump to content

Amigo-A

Visiting Expert
  • Posts

    2343
  • Joined

  • Last visited

  • Days Won

    61

Everything posted by Amigo-A

  1. Hello. You probably need to read this Guide first. At least the first part of it, in order to understand the essence.
  2. You didn't say which ransomware attacked your PC. Was it 'STOP Ransomware'? You probably need to read this Guide first. At least the first part of it, in order to understand the essence.
  3. Hello. You probably need to read this Guide first. At least the first part of it, in order to understand the essence.
  4. Hello. Unable to decrypt because the encryption key was obtained from the extortionist's server, where it was previously randomly generated. It is impossible to calculate it using a super-computer within the limits of human life. There is no other legitimate decryption tool. Read more in this Guide
  5. Hello. You probably need to read this Guide first. At least the first part of it, in order to understand the essence.
  6. Hello. You probably need to read this Guide first. At least the first part of it, in order to understand the essence.
  7. 1) Despite this, we recommend that you save the encrypted files on an external medium and disconnect it from the PC. Perhaps in the future, after the arrest of extortionists or their servers, decryption keys will be obtained. 2) I can recommend that you do some steps to recover some important files if you have the desire, time, and patience. This is not decryption, this is the use of alternative possibilities. Only advice, no technical support, at your peril.
  8. If it is determined that the online key was used, then decryption is impossible. If someone somewhere claims that he can decrypt the files, then he is lying or conspiring with the extortionists.
  9. 1) Despite this, we recommend that you save the encrypted files on an external medium and disconnect it from the PC. Perhaps in the future, after the arrest of extortionists or their servers, decryption keys will be obtained. 2) I can recommend that you do some steps to recover some important files if you have the desire, time, and patience. This is not decryption, this is the use of alternative possibilities. Only advice, no technical support, at your peril.
  10. 1) Despite this, we recommend that you save the encrypted files on an external medium and disconnect it from the PC. Perhaps in the future, after the arrest of extortionists or their servers, decryption keys will be obtained. 2) I can recommend that you do some steps to recover some important files if you have the desire, time, and patience. This is not decryption, this is the use of alternative possibilities. Only advice, no technical support, at your peril.
  11. 1) Despite this, we recommend that you save the encrypted files on an external medium and disconnect it from the PC. Perhaps in the future, after the arrest of extortionists or their servers, decryption keys will be obtained. 2) I can recommend that you do some steps to recover some important files if you have the desire, time, and patience. This is not decryption, this is the use of alternative possibilities. Only advice, no technical support, at your peril.
  12. 1) Despite this, we recommend that you save the encrypted files on an external medium and disconnect it from the PC. Perhaps in the future, after the arrest of extortionists or their servers, decryption keys will be obtained. 2) I can recommend that you do some steps to recover some important files if you have the desire, time, and patience. This is not decryption, this is the use of alternative possibilities. Only advice, no technical support, at your peril.
  13. If it is determined that the online key was used, then decryption is impossible. If someone somewhere claims that he can decrypt the files, then he is lying or conspiring with the extortionists.
  14. If it is determined that the online key was used, then decryption is impossible. If someone somewhere claims that he can decrypt the files, then he is lying or conspiring with the extortionists.
  15. If it is determined that the online key was used, then decryption is impossible. If someone somewhere claims that he can decrypt the files, then he is lying or conspiring with the extortionists.
  16. Need to read this Guide. https://support.emsisoft.com/forum/83-help-my-files-are-encrypted/ If it is determined that the online key was used, then decryption is impossible. If someone somewhere claims that he can decrypt the files, then he is lying or conspiring with the extortionists.
  17. Need to read this Guide. https://support.emsisoft.com/forum/83-help-my-files-are-encrypted/
  18. Hello vostoski! I looked in my database and found no match. For this case, a new description has been compiled in the Digest "Crypto-Ransomware". Problem Ransomware --- You need to do an in-depth search for the malware file. First, look at the Downloads folder and the location where you downloaded the files. If you usually use a browser, you can start your search from the "Downloads" section. If you find suspicious files, do not run them to view. Place each such file in a separate archive with the password "infected" and pass it on to us. Next, you should check the temporary directories "Temp". Hope you haven't cleaned anything before. %WINDIR%\Temp\ %TEMP%\<random>.tmp\ %TEMP%\<random>.tmp\<random>\ %TEMP%\<random>\ Disk C:\Users\%USERNAME%\AppData\Local\Temp\ Folder "AppData" applies to hidden directories. You will need to first enable a view of hidden and system files. If there are a lot of files, then focus on the date when the files were encrypted. It is better to collect everything in one big zip archive here. Also, put a password (preferably a non-standard one) and share the link to the place where you upload it.
  19. Place a ransom note and 2-3 encrypted files in the zip archive and attach them to the message. Or give us the download link. Do not change anything in the files or their names.
  20. What can you do while waiting for a happy day? 1) Consider your line of defense to avoid re-encrypting files with malicious files. Very often, victims of ransomware do not fix bugs and continue to use basic or free antivirus protection. First of all, you need to understand that this is only 1 percent protection and the next time the same will happen. Extortionists anew will use ransomware to attack PCs and steal data, encrypt files, and the victim anew will have to pay a ransom or lose files. 2) Save encrypted files or only the most valuable to an external drive. Disconnect it from your PC. This will save your files from being re-encrypted or otherwise encrypted. We have seen many cases where encryption was repeated and files were encrypted by another variant of the ransomware that left no chance of salvation.
  21. We just don't know when it will happen. Someone buys a key, gives it to the Emsisoft Decryptor developers, here on the forum. Then the developers will add the key to the Decryptor database. After that, anyone affected by this variant of ransomware can it used.
  22. @Yasir Try to recover PSD files using this site if it justifies the costs https://onlinefile.repair/photoshop You can also recover other files on the site that were not fully encrypted. There is a charge, but you can try if the end justifies the means.
  23. This is the result of a Zeppelin Ransomware attack. They are configured individually for each company. The creation of a common decryptor is still problematic. If you need professional help for an individual investigation, leave a request to the Emsisoft specialists.
  24. Hello This is BigLock Ransomware This variant has been known since autumn, but a newer one, which also attacked your files, has been known since the beginning of December. It is still being studied, so there are no public tools for decrypting the files. You can leave a request to Emsisoft specialists, they will contact you and carry out an investigation of an individual case.
×
×
  • Create New...