Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
my pc infected with New Hard Ransomware ( 98E8 file) Help Please
#11
(12-23-2016, 02:48 PM)GuiltySpark Wrote:  That's not Cerber3 but Cerber 4.0 / 5.0 you are SOL. Best thing is to use a backup image and re-install from there.

Been so many of late, I forget what number Cerber is at now Big Grin  they are all nasty and does not change the fact like GuiltySpark said your shit out of luck, which is the case for many of these ransomware. Its easy to beat ransomware if everyone follows this simple rule Backup, Backup, Backup.
<left><form action="https://www.paypal.com/cgi-bin/webscr" method="post">If you are satisfied with my help, consider a donation. Thank you so much for your continued support! 
<input type="hidden" name="cmd" value="_s-xclick">
<input type="hidden" name="hosted_button_id" value="Y4ZDLXGFS4F8Q">
<input type="image" src="https://www.paypalobjects.com/en_US/GB/i/btn/btn_donateCC_LG.gif" border="0" name="submit" alt="PayPal — The safer, easier way to pay online.">
<img alt="" border="0" src="https://www.paypalobjects.com/en_GB/i/scr/pixel.gif" width="0" height="0">
</form>

   </div></left> 

#12
I would not pay them one penny or one pony paying would just allow them to continue
take the mike tyson hit move on next time backup your data

#13
(12-23-2016, 12:47 PM)Britec Wrote:  [Image: FRST.png] Scan with Farbar Recovery Scan Tool


Please download Farbar Recovery Scan Tool x64 and save it to your Desktop.




  • Right-click on [Image: FRST.png] icon and select [Image: RunAsAdmin.jpg] Run as Administrator to start the tool.
    (XP users click run after receipt of Windows Security Warning - Open File).
  • When the tool opens click Yes to disclaimer.
  • Make sure that Addition option is checked.
  • Press Scan button and wait.
  • The tool will produce two logfiles on your desktop: FRST.txt and Addition.txt.
Please attach .txt files into your next reply.

sorry for late
this results in normal windows/ and in-safe mode
check attachment


Attached Files
.txt   Addition.txt (Size: 55.58 KB / Downloads: 3)
.txt   Addition-safe-mode.txt (Size: 35.03 KB / Downloads: 1)
.txt   FRST.txt (Size: 47.62 KB / Downloads: 3)
.txt   FRST-safe-mode.txt (Size: 42.51 KB / Downloads: 2)

#14
I am sorry we can't do much if any to get the data if anything do you have a backup of your data

#15
(12-24-2016, 01:45 PM)Compton Wrote:  I would not pay them one penny or one pony paying would just allow them to continue
take the mike tyson hit move  on next time backup your data
Agreed Compton,
Bloody Cyber Criminals? STOP MAKING RANSOMWARE, WE ALL HATE IT, YOUR DESTROYING US PIECE BY PIECE! STOP DESTROYING OUR DATA Sad

(12-24-2016, 12:57 PM)Britec Wrote:  
(12-23-2016, 02:48 PM)GuiltySpark Wrote:  That's not Cerber3 but Cerber 4.0 / 5.0 you are SOL. Best thing is to use a backup image and re-install from there.

Been so many of late, I forget what number Cerber is at now Big Grin  they are all nasty and does not change the fact like GuiltySpark said your shit out of luck, which is the case for many of these ransomware. Its easy to beat ransomware if everyone follows this simple rule Backup, Backup, Backup.
Yes Brian,
Backing up is the key, Backup, Backup, Backup, I can't emphasise this enough to my customers, BACKUP BACKUP BACKUP, BACKUP OR YOU WILL REGRET IT

#16
A few months ago, a dentist office here got hit with this " I can't recall the type of ransomware". Instead of paying the ransom, they rebuilt the whole database. Yes... they did have a backup, but it was all on paper. Took them 3 months to recover.

The problem is, people are just paying the ransom. The news even reported on a police station that got hit and they also paid the ransom. The more that they get money, they will keep doing it.
L.S. Computer Systems
807 East Broadway
Hopewell, VA. 23860, USA
+1 (804) 715-8185
https://www.lscomputersystems.com

#17
(12-24-2016, 11:00 PM)LarryTheComputerGuy Wrote:  A few months ago, a dentist office here got hit with this " I can't recall the type of ransomware". Instead of paying the ransom, they rebuilt the whole database. Yes... they did have a backup, but it was all on paper. Took them 3 months to recover.

The problem is, people are just paying the ransom. The news even reported on a police station that got hit and they also paid the ransom. The more that they get money, they will keep doing it.
I know, if people would stop paying the ransom, there would be no more ransomware, but to be fair to them, besides backing up data, they have no choice if their data is encrypted, they would do anything to get it back so they would have to pay but I see your point Larry

#18
now I would think the police of all places would have data backup they should have IT expects right

#19
(12-25-2016, 01:16 AM)Compton Wrote:  now I would think the police of all places  would  have data backup they should have IT expects right

They usually do Compton, but with some businesses and public entities, not everything that an IT Department suggest is done for whatever reason. "Till Something Happens"
L.S. Computer Systems
807 East Broadway
Hopewell, VA. 23860, USA
+1 (804) 715-8185
https://www.lscomputersystems.com

#20
ya I know but sometime you have persistent my rule is if you are not willing to pay for data backups
I am not going to work for you because if something goes wrong you will not hear it was that cheap manager or boss not willing to pay for
data backups it will be Compton the IT guy should have gone



Forum Jump:


Users browsing this thread:
2 Guest(s)

Powered By MyBB, © 2002-2024 Melroy van den Berg.