Kevin Zoll

Emsisoft Employee
  • Content Count

    18524
  • Joined

  • Last visited

  • Days Won

    168

Kevin Zoll last won the day on October 1

Kevin Zoll had the most liked content!

Community Reputation

280 Excellent

About Kevin Zoll

  • Rank
    Malware Removal Support
  • Birthday 12/04/1960

Contact Methods

  • Website URL
    http://www.malwareteks.com/

Profile Information

  • Gender
    Male
  • Location
    Depauville, NY, USA
  • Interests
    Computer Security, Malware Research, Malware Removal, Computer Programming, Website Design

Recent Profile Visitors

167651 profile views
  1. Andray, Then it's mostly an online ID and decryption is not possible. I suggest that you backup all encrypted files, and store them safely. If in the future law enforcement or security researchers are able to gain control of the cyber-criminals command & control server and are able to retrieve the encryption keys.
  2. Hello Andray, Thank you for contacting Emsisoft Support. This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  3. Hello Ruman, Thank you for contacting Emsisoft Support. Let's make sure of what we're dealing with. Please visit the following website and upload both an encrypted file (between 256KB and 2MB in size would be best) and a ransom note simultaneously for proper identification, and send me the information it provides: https://www.emsisoft.com/ransomware-decryption-tools/ Please be sure to read the information link on the results page, as whether we have a decrypter or not, sometimes someone else's decrypter is listed, or other information is available that might be useful for recovery. You might try undelete software such as Recuva from Piriform, or if your files are very important, it may be worth talking to a company that specializes in negotiating with the criminals that created the ransomware, such as Coveware, at https://www.coveware.com/. They are one of the few companies that do this completely transparently and honestly. If the identification process shows a ransomware that is not decryptable, there is nothing else we can do. We do not recommend paying the ransom unless there is absolutely no other choice.
  4. @mminee Yes, this is GarrantyDecrypt. Unfortunately, GarrantyDecrypt cannot be decrypted without paying the ransom. Also, I see you posted a support request on Bleeping Computer. You should not post asking for assistance on more than one forum. Even though we have a close working relationship with Bleeping Computer we do not actively monitor their forums, nor do they monitor ours. By posting on multiple forums, the techs that see your posts may not be aware that you are receiving assistance on another support forum.
  5. This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  6. Unfortunately, this is a newer variant of mosk that changed the way the produce encryption keys. Therefore we are not able to decrypt your files. I suggest that you back up all the encrypted files, in case we or another security are able to crack this version and issue a working decrypter for this variant.
  7. Please upload an encrypted file and its original unencrypted version to https://decrypter.emsisoft.com/submit/stopdjvu/ A word of caution, if the files were recently encrypted, then this may not work for you.
  8. We have identified "STOP (Djvu)". This ransomware may be decryptable under certain circumstances. Please refer to the appropriate guide for more information. Identified by: sample_extension: .mosk sample_bytes: [0x1C8F - 0x1CA9] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D ransomnote_email: [email protected] Click here for more information about STOP (Djvu). Case number: 858a6fa5cdd735b9f4c9001d42381624841d2fe01575916172
  9. In the case of larger scale ransomware attacks, restoring from backups is not economically feasible. Which is why many companies, enterprises, and governmental agencies often choose to pay the ransom. From the financial perspective it is much cheaper, and operational it gets the data back much quicker.
  10. @spikey what @JeremyNicoll is getting at as long as outlook.pst is open by another application, i.e. Outlook and Acronis. Exclusions in Emsisoft may not take effect until outlook.pst is no longer open by another application or the next reboot. Also keep in mind that you must clear all previous detection's against outlook,pst as they take precedence over any whitelist rule for outlook.pst.
  11. Thread ClosedReason: Lack of ResponsePM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  12. Hello, Welcome to the Emsisoft Support Forums. Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions. All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below: NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed. The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available. The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer. Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed. We reserve the right to refuse help to anyone who is unwilling to uninstall Pirated/Illegal software We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system. Start only one thread requesting help. Keep all questions in your thread. DO NOT start a new topic. If you don't know, stop and ask! Don't keep going on. Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there) Once your case has been solved, the thread will be closed. Your thread will be closed after 72-hours of no activity. DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and the such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response. DO NOT post any logs without first completing the steps in this guide, they will be deleted. DO NOT copy and paste logs into your threads. All logs are to be attached to your post. Download to your Desktop: Emsisoft Emergency Kit Farbar Recovery Scan Tool NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version. NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive. All scans are to be run in Normal Mode. Do not run anything in "Safe Mode", unless you are instructed to do so by the Malware Removal Specialist handling your case. Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at http://www.malwarete…kb/SafeMode.php WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. Let's get started: Install and Run Emsisoft Emergency Kit (EEK): IMPORTANT If you have Emsisoft Anti-Malware (EAM) Installed do not install and use EEK. Instead run a custom scan with EAM and provided the EAM Scan report. Double click EmergencyKitScanner.exe to install EEK When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection. Click "Yes" to Update Emsisoft Emergency Kit Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted. Save the scan log somewhere that you can find it. Exit Emsisoft Emergency Kit. Run Farbar Recovery Scan Tool (FRST): Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings. Press the Scan button. Farbar Recovery Scan Tool will produce the following logs: FRST.txt Addition.txt Attach the following logs to your reply: Emsisoft Emergency Kit log (C:\EEK\Reports) FRST.txt Addition.txt IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way. Once a Malware Removal Specialist has replied to your request for malware removal, they will handle your case from start to finish. You will have 72 hours to reply to any instructions given by the Malware Removal Specialist handling your case. Failure to comply with requests for information or instructions from the Malware Removal Specialist handling your case will result in the locking of your thread.
  13. Thread ClosedReason: Lack of ResponsePM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  14. Hello Linda, Download to your Desktop: Farbar Recovery Scan Tool NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version. NOTE: If you are unable to download FRST from the infected system, FRST can be saved to and run from a USB flash drive. Run Farbar Recovery Scan Tool (FRST): Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings. Press the Scan button. Farbar Recovery Scan Tool will produce the following logs: FRST.txt Addition.txt Attach those logs to your reply.
  15. The Windows Defender restrictions is likely a permissions issue and you will need to reset system permissions to their defaults using Windows Repair (All In One). https://www.bleepingcomputer.com/download/windows-repair-all-in-one/