Kevin Zoll

Emsisoft Employee
  • Content Count

    18524
  • Joined

  • Last visited

  • Days Won

    168

Everything posted by Kevin Zoll

  1. Andray, Then it's mostly an online ID and decryption is not possible. I suggest that you backup all encrypted files, and store them safely. If in the future law enforcement or security researchers are able to gain control of the cyber-criminals command & control server and are able to retrieve the encryption keys.
  2. Hello Andray, Thank you for contacting Emsisoft Support. This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  3. Hello Ruman, Thank you for contacting Emsisoft Support. Let's make sure of what we're dealing with. Please visit the following website and upload both an encrypted file (between 256KB and 2MB in size would be best) and a ransom note simultaneously for proper identification, and send me the information it provides: https://www.emsisoft.com/ransomware-decryption-tools/ Please be sure to read the information link on the results page, as whether we have a decrypter or not, sometimes someone else's decrypter is listed, or other information is available that might be useful for recovery. You might try undelete software such as Recuva from Piriform, or if your files are very important, it may be worth talking to a company that specializes in negotiating with the criminals that created the ransomware, such as Coveware, at https://www.coveware.com/. They are one of the few companies that do this completely transparently and honestly. If the identification process shows a ransomware that is not decryptable, there is nothing else we can do. We do not recommend paying the ransom unless there is absolutely no other choice.
  4. @mminee Yes, this is GarrantyDecrypt. Unfortunately, GarrantyDecrypt cannot be decrypted without paying the ransom. Also, I see you posted a support request on Bleeping Computer. You should not post asking for assistance on more than one forum. Even though we have a close working relationship with Bleeping Computer we do not actively monitor their forums, nor do they monitor ours. By posting on multiple forums, the techs that see your posts may not be aware that you are receiving assistance on another support forum.
  5. This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  6. Unfortunately, this is a newer variant of mosk that changed the way the produce encryption keys. Therefore we are not able to decrypt your files. I suggest that you back up all the encrypted files, in case we or another security are able to crack this version and issue a working decrypter for this variant.
  7. Please upload an encrypted file and its original unencrypted version to https://decrypter.emsisoft.com/submit/stopdjvu/ A word of caution, if the files were recently encrypted, then this may not work for you.
  8. We have identified "STOP (Djvu)". This ransomware may be decryptable under certain circumstances. Please refer to the appropriate guide for more information. Identified by: sample_extension: .mosk sample_bytes: [0x1C8F - 0x1CA9] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D ransomnote_email: [email protected] Click here for more information about STOP (Djvu). Case number: 858a6fa5cdd735b9f4c9001d42381624841d2fe01575916172
  9. In the case of larger scale ransomware attacks, restoring from backups is not economically feasible. Which is why many companies, enterprises, and governmental agencies often choose to pay the ransom. From the financial perspective it is much cheaper, and operational it gets the data back much quicker.
  10. @spikey what @JeremyNicoll is getting at as long as outlook.pst is open by another application, i.e. Outlook and Acronis. Exclusions in Emsisoft may not take effect until outlook.pst is no longer open by another application or the next reboot. Also keep in mind that you must clear all previous detection's against outlook,pst as they take precedence over any whitelist rule for outlook.pst.
  11. Thread ClosedReason: Lack of ResponsePM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  12. Hello, Welcome to the Emsisoft Support Forums. Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions. All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below: NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed. The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available. The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer. Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed. We reserve the right to refuse help to anyone who is unwilling to uninstall Pirated/Illegal software We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system. Start only one thread requesting help. Keep all questions in your thread. DO NOT start a new topic. If you don't know, stop and ask! Don't keep going on. Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there) Once your case has been solved, the thread will be closed. Your thread will be closed after 72-hours of no activity. DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and the such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response. DO NOT post any logs without first completing the steps in this guide, they will be deleted. DO NOT copy and paste logs into your threads. All logs are to be attached to your post. Download to your Desktop: Emsisoft Emergency Kit Farbar Recovery Scan Tool NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version. NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive. All scans are to be run in Normal Mode. Do not run anything in "Safe Mode", unless you are instructed to do so by the Malware Removal Specialist handling your case. Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at http://www.malwarete…kb/SafeMode.php WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist. Let's get started: Install and Run Emsisoft Emergency Kit (EEK): IMPORTANT If you have Emsisoft Anti-Malware (EAM) Installed do not install and use EEK. Instead run a custom scan with EAM and provided the EAM Scan report. Double click EmergencyKitScanner.exe to install EEK When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection. Click "Yes" to Update Emsisoft Emergency Kit Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted. Save the scan log somewhere that you can find it. Exit Emsisoft Emergency Kit. Run Farbar Recovery Scan Tool (FRST): Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings. Press the Scan button. Farbar Recovery Scan Tool will produce the following logs: FRST.txt Addition.txt Attach the following logs to your reply: Emsisoft Emergency Kit log (C:\EEK\Reports) FRST.txt Addition.txt IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way. Once a Malware Removal Specialist has replied to your request for malware removal, they will handle your case from start to finish. You will have 72 hours to reply to any instructions given by the Malware Removal Specialist handling your case. Failure to comply with requests for information or instructions from the Malware Removal Specialist handling your case will result in the locking of your thread.
  13. Thread ClosedReason: Lack of ResponsePM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  14. Hello Linda, Download to your Desktop: Farbar Recovery Scan Tool NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version. NOTE: If you are unable to download FRST from the infected system, FRST can be saved to and run from a USB flash drive. Run Farbar Recovery Scan Tool (FRST): Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings. Press the Scan button. Farbar Recovery Scan Tool will produce the following logs: FRST.txt Addition.txt Attach those logs to your reply.
  15. The Windows Defender restrictions is likely a permissions issue and you will need to reset system permissions to their defaults using Windows Repair (All In One). https://www.bleepingcomputer.com/download/windows-repair-all-in-one/
  16. That should take care of everything. How are things running?
  17. Copy the below code to Notepad; Save As fixlist.txt to your Desktop. Task: {AD61C44E-AB59-4CA7-9813-267C0109B90C} - \{F671ACEE-123F-402D-9569-6FA78514D210} -> No File <==== ATTENTION Task: {D347C392-82B1-4629-BD2E-0F64828FAFF6} - \{AEB0B1A2-83B5-40DE-A0DB-CEAED321E4AC} -> No File <==== ATTENTION HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = HKU\S-1-5-21-3615462294-2877540407-2494349180-1000\Software\Classes\.scr: AutoCADScriptFile => C:\WINDOWS\system32\notepad.exe "%1" Close Notepad. NOTE: It's important that both files, FRST64, and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. NOTE: If the tool warns you about an outdated version please download and run the updated version.
  18. Let's take a fresh look. Run a fresh scan with FRST, attach the new FRST scan reports to your reply.
  19. Thread ClosedReason: ResolvedPM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  20. You are welcome. Thread ClosedReason: ResolvedPM either Kevin, Elise, or Arthur to have this thread reopened.The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread
  21. Your logs look fine. Unless you are still having problems. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your Desktop. Double-Click on Delfix to run it. Ensure Remove disinfection tools is checked. Also place a checkmark next to: Create registry backup Purge system restore Click the Run button. When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad. Empty the Recycle Bin You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. To Remove EEK simple delete the EEK for in the of your System Drive, normally C:\EEK Run Windows Update and update your Windows Operating System. That should take care of everything. Safe Surfing!
  22. Let's get one more set of logs from FRST. Run a fresh scam with FRST, attach the new FRST scan reports to your reply.
  23. Close all programs and disconnect any USB or external drives before running the tool. Double-click RogueKiller.exe to run the tool again. Once the Prescan has finished, click Scan. Once the Status box shows "Scan Finished". Select the following items: [PUP.Gen1 (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\simplitec -- N/A -> Found [PUP.Emotiplus (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-3615462294-2877540407-2494349180-1000\Software\Emotiplus -- N/A -> Found [PUP.Popcorn (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-3615462294-2877540407-2494349180-1000\Software\Popcorn Time -- N/A -> Found [PUP.Popcorn (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-3615462294-2877540407-2494349180-1000\Software\PopcornTime -- N/A -> Found [PUP.Gen1 (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-3615462294-2877540407-2494349180-1000\Software\WebApp -- N/A -> Found [PUP.Popcorn (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Popcorn Time_is1 -- N/A -> Found [Tr.DNSChanger (Malicious)] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{b68dd92b-2ea6-415e-860e-7a19ec872a0f}|NameServer -- 213.166.69.3,185.143.221.60 (missing) -> Found [PUM.Policies (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System|ConsentPromptBehaviorAdmin -- 0 -> Found [PUP.HackTool (Potentially Malicious)] (folder) AutoKMS -- C:\Windows\AutoKMS -> Found [PUP.OnlineIO (Potentially Malicious)] (folder) AdvinstAnalytics -- C:\Users\User\AppData\Local\AdvinstAnalytics -> Found [PUP.Popcorn (Potentially Malicious)] (folder) PopcornTime -- C:\Users\User\AppData\Local\PopcornTime -> Found [PUP.Popcorn (Potentially Malicious)] (folder) PopcornTimeDesktop -- C:\Users\User\AppData\Local\PopcornTimeDesktop -> Found [PUP.Gen1|PUP.Popcorn (Potentially Malicious)] (folder) Popcorn Time -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Popcorn Time -> Found [PUP.Gen1 (Potentially Malicious)] (folder) simplitec -- C:\ProgramData\simplitec -> Found [PUP.Gen1|PUP.Popcorn (Potentially Malicious)] (folder) Popcorn Time -- C:\Program Files (x86)\Popcorn Time -> Found Click the Delete button. Attach the RogueKiller report to your next reply. The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex.txt) The highest number of [X], is the most recent Delete log.