phantom512

Member
  • Content Count

    1
  • Joined

  • Last visited

Community Reputation

0 Neutral

About phantom512

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Dear DemonSlay335 I would appreciate any help you can give me to get my files decrypted. I was infected with the ransomware that appends a ".gusau" file extension, and unfortunately your current STOPDecrypter does not work on my files. The STOPdecrypter log is as follows: [+] Loaded 64 offline keys Please archive the following info in case of future decryption: [*] ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 [*] ID: 68O9eTFDNbn8z2O956vweaL1v2GY5gvWBYMKcmt1 [*] MACs: EC:08:6B:14:E0:8C, EC:08:6B:14:E0:8E, EC:08:6B:14:E0:8F, 40:8D:5C:03:3A:11 This info has also been logged to STOPDecrypter-log.txt Selected directory: C:\Decrypt Starting decryption... [+] File: C:\Decrypt\HiJackThis.exe.gusau [-] No key for ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 (.gusau ) [+] File: C:\Decrypt\TSSniper_0_80_0_600_Freeware.zip.gusau [-] No key for ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 (.gusau ) [+] File: C:\Decrypt\windows6.1-kb4012212-x64_2decefaa02e2058dcd965702509a992d8c4e92b3.msu.gusau [-] No key for ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 (.gusau ) [+] File: C:\Decrypt\YUMI-2.0.6.1a.exe.gusau [-] No key for ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 (.gusau ) Decrypted 0 files! Skipped 4 files. [!] No keys were found for the following IDs: [*] ID: ujE2lYYKAwZr5Qi3kj9FDPJ0WdH5abcyOiGnxFS8 (.gusau ) Please archive these IDs and the following MAC addresses in case of future decryption: [*] MACs: EC:08:6B:14:E0:8C, EC:08:6B:14:E0:8E, EC:08:6B:14:E0:8F, 40:8D:5C:03:3A:11 This info has also been logged to STOPDecrypter-log.txt I have also attached the _readme.txt file for reference. Any help would be greatly appreciated. I managed to stop the virus before it infected too much, but unfortunately only had a single copy of some files I would prefer not to lose. Regards, phantom512 _readme.txt