Jump to content

Amigo-A

Visiting Expert
  • Posts

    2436
  • Joined

  • Last visited

  • Days Won

    61

Everything posted by Amigo-A

  1. Hola Argemiro! Para que podamos determinar el codificador, debe proporcionarnos 2 o 3 archivos cifrados y un archivo llamado nota de rescate (a ransom note). Para hacer esto, colóquelos en el zip-archivo y adjúntelos al mensaje.
  2. This is not a single criminal, there is a large group from Ukraine operating there, which has secure European servers and very good technical and political cover. These criminals have been active for many years and no one is going to arrest them. To tell the truth, I don't believe that they will ever be arrested and that they will return the files to all the victims. But you need to hope. It is generally recommended to save encrypted files and ransom notes on an external drive and disconnect from the PC.
  3. Hello. You can read this general guide to see if the files can be decrypted.
  4. It is likely that in the future it will be possible to decrypt the files. But this future depends on when someone buys the key and gives it to the developers of the decryptor.
  5. You can learn more from our general guide. It is enough to read only the first part.
  6. Hello. You can learn more from our general guide. It is enough to read only the first part.
  7. Hello. You can learn more from our general guide. It is enough to read only the first part.
  8. You can learn more from our general guide. It is enough to read only the first part.
  9. It is not recommended to experiment with different decryptors that are designed to decrypt files encrypted by other ransomware. This will permanently damage them. About STOP Ransomware, you should know that only some variants are compatible. Other variants of this ransomware use a different encryption key and will also corrupt files from the other variant or other version. If you want to know how many there were, look at this list.
  10. It is likely that in the future it will be possible to decrypt the files. But this future depends on when someone buys the key and gives it to the developers of the decryptor.
  11. You can read this general guide to see if the files can be decrypted.
  12. You can read this general guide to see if the files can be decrypted.
  13. You can read this general guide to see if the files can be decrypted.
  14. You can read this general guide to see if the files can be decrypted.
  15. You will have time to roll back the system. First you need to save the encrypted files for the future. Make a copy to an external drive.
  16. To understand what happened, you better read this guide, or at least the first part of it.
  17. Hello. Impossible to change anything by turning off your internet connection. The online key is randomly generated on the extortionists server. The affected PC receives an online ID when its files are encrypted or during encryption.
  18. Hello. This is not a error in the program. With this message the 'Emsisoft Decryptor' tell that it does not yet have the key to decrypt the files of this variant. Perhaps in the future someone will pass on the decryption key and it will be added to the Emsisoft Decryptor to decrypt files affected users. Other 'STOP Ransomware' variants use other encryption and decryption keys. Keys from an incompatible variant can corrupt encrypted files. None of us can influence the process of adding keys. This depends on voluntary transfer, when someone buys and voluntarily transfers the key.
  19. .eyrv - This is a new 'STOP Ransomware' variant The first part of this guide tells you what variants can be decrypted in the future when the decryption key for that variant will loaded into the decryptor.
  20. Hello You need to attach the _readme.txt file to the message
  21. The note ALL YOUR FILES HAVE BEEN LOCKED BY DEADBOLT.html (or index.html) should look like this
  22. Yes, as in the answer: In the future it will be possible to decrypt files if a decryption key is added to the decryptor. The addition of a key depends on the voluntary transfer of that key by someone who paid a ransom and decrypted their files. No one can influence the acceleration of this event. We can only hope that this happy event will happen.
  23. Hello @Grzegorz Qfi This guide should answer all questions related to this ransomware variant. Encrypted files do not need to be deleted if you need them. It is recommended to save them on an external drive and disconnect it from the computer. Perhaps in the future, extortionists will release master-keys or their servers will be arrested by the police. Try to get yourself together and start backing up your most important files to an external drive and cloud storage so that you have at least one copy of your most important and valuable files. These can be family and personal photos, happy moments of the video, important documents, including very confidential ones. If you do it 1 time, then after that you will do it quickly and on autopilot.
  24. Hello. It would be better if you tell us what you were doing before this error occurred. For example: you run a program that needs to connect to a server...
×
×
  • Create New...