Jump to content
atrisa

.HERAD Extension File Ransom Virus

Recommended Posts

Hi,

         All my computer files have been infected and the .heard extension has been added to all files.
Please help to resolve the problem.
Thank you

Share this post


Link to post
Share on other sites

Hello atrista and welcome to malwarebytes,

Go here: https://id-ransomware.malwarehunterteam.com/  follow those instructions and post back the results...

Next,

Go here: https://kb.gt500.org/stopdecrypter follow those instructions and post back the results...

Next,

Continue with the following:

If you do not have Malwarebytes installed do the following:

Download Malwarebytes version 3 from the following link:

https://www.malwarebytes.com/mwb-download/thankyou/

Double click on the installer and follow the prompts. If necessary select the Blue Help tab for video instructions....

When the install completes or Malwarebytes is already installed do the following:

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
 
  • Click on the Report tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
 
  • Right-click on AdwCleaner.exe and select user posted imageRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Next,

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
 
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
    user posted image
     
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.


Let me see those logs in your reply...

Thank you,

Kevin....

Share this post


Link to post
Share on other sites

Hello
Thank you very much for your attention.

Result from the site: https://id-ransomware.malwarehunterteam.com/
Is as follows:

---------------------------------------------------------------
 This ransomware may be decryptable under certain circumstances.

Please refer to the appropriate guide for more information.
Identified by

ransomnote_email: gorentos@bitmessage.ch
sample_extension: .herad
sample_bytes: [0x94B1D - 0x94B37] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D
Click here for more information about STOP (Djvu)
---------------------------------------------------------------

Result from STOPDecrypter v 2.1.0.24
Is as follows:

---------------------------------------------------------------
MACs: 30:85:A9:9B:BE:1B, 00:15:83:15:A3:10

STOPDecrypter v2.1.0.24
OS Microsoft Windows NT 6.2.9200.0, .NET Framework Version 4.0.30319.42000

No key for ID: l8W6QXRo2iHXkh0b9xJHq1nBTLlIbeGnxD7av9Y6 (.herad )
Unidentified ID: l8W6QXRo2iHXkh0b9xJHq1nBTLlIbeGnxD7av9Y6 (.herad )
MACs: 30:85:A9:9B:BE:1B, 00:15:83:15:A3:10
Decrypted 0 files, skipped 4
---------------------------------------------------------------

Result from Malwarebytes version 3
Is as follows:

---------------------------------------------------------------
Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 8/26/19
Scan Time: 2:45 PM
Log File: 77a0194a-c7ea-11e9-84cc-3085a99bbe1b.json

-Software Information-
Version: 3.8.3.2965
Components Version: 1.0.613
Update Package Version: 1.0.11270
License: Trial

-System Information-
OS: Windows 10 (Build 17763.678)
CPU: x64
File System: NTFS
User: DESKTOP-A79UCQH\cyber

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 312943
Threats Detected: 67
Threats Quarantined: 0
Time Elapsed: 16 min, 45 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 32
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ParetoLogic Registration3, No Action By User, [3222], [457731],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{850EA901-7BF6-47CB-9AD7-9879D6B11017}, No Action By User, [3222], [457731],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{850EA901-7BF6-47CB-9AD7-9879D6B11017}, No Action By User, [3222], [457731],1.0.11270
PUP.Optional.SpeedyPC, HKU\S-1-5-21-709982592-2884008671-4219726286-1001\SOFTWARE\SpeedyPC Software, No Action By User, [1543], [396736],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\REI_AxControl.DLL, No Action By User, [350], [327193],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\REI_AxControl.DLL, No Action By User, [350], [327193],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\CLSID\{10ECCE17-29B5-4880-A8F5-EAD298611484}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\REI_AxControl.ReiEngine.1, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKU\S-1-5-21-709982592-2884008671-4219726286-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{10ECCE17-29B5-4880-A8F5-EAD298611484}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\TYPELIB\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\INTERFACE\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\INTERFACE\{BD51A48E-EB5F-4454-8774-EF962DF64546}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{BD51A48E-EB5F-4454-8774-EF962DF64546}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{BD51A48E-EB5F-4454-8774-EF962DF64546}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\REI_AxControl.ReiEngine, No Action By User, [350], [327197],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\APPID\REI_AxControl.DLL, No Action By User, [350], [327193],1.0.11270
PUP.Optional.SpeedyPC, HKLM\SOFTWARE\WOW6432NODE\SpeedyPC Software, No Action By User, [1543], [396735],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\REIMAGE\Reimage Repair, No Action By User, [350], [336077],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F9B60A6B-ECD7-4933-9C2B-C36C2F017CD7}, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{F9B60A6B-ECD7-4933-9C2B-C36C2F017CD7}, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ParetoLogic Update Version3, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{24077C0C-8648-4609-9368-FA8E438CF370}, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{24077C0C-8648-4609-9368-FA8E438CF370}, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ParetoLogic Update Version3 Startup Task, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\CLSID\{801B440B-1EE3-49B0-B05D-2AB076D4E8CB}, No Action By User, [350], [327206],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\APPID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}, No Action By User, [350], [332494],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}, No Action By User, [350], [332494],1.0.11270
PUP.Optional.Reimage, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}, No Action By User, [350], [332494],1.0.11270

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 2
PUP.Optional.SpeedyPC, C:\ProgramData\SpeedyPC Software\SpeedyBackup, No Action By User, [1543], [340762],1.0.11270
PUP.Optional.SpeedyPC, C:\PROGRAMDATA\SPEEDYPC SOFTWARE, No Action By User, [1543], [340762],1.0.11270

File: 33
PUP.Optional.ParetoLogic, C:\WINDOWS\TASKS\ParetoLogic Registration3.job, No Action By User, [3222], [457731],1.0.11270
PUP.Optional.ParetoLogic, C:\WINDOWS\SYSTEM32\TASKS\ParetoLogic Registration3, No Action By User, [3222], [457731],1.0.11270
PUP.Optional.SpeedyPC, C:\ProgramData\SpeedyPC Software\SpeedyBackup\NagData.dat, No Action By User, [1543], [340762],1.0.11270
PUP.Optional.ParetoLogic, C:\WINDOWS\TASKS\PARETOLOGIC UPDATE VERSION3.job, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, C:\WINDOWS\SYSTEM32\TASKS\PARETOLOGIC UPDATE VERSION3, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, C:\WINDOWS\TASKS\PARETOLOGIC UPDATE VERSION3 STARTUP TASK.job, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.ParetoLogic, C:\WINDOWS\SYSTEM32\TASKS\PARETOLOGIC UPDATE VERSION3 STARTUP TASK, No Action By User, [3222], [370963],1.0.11270
PUP.Optional.Reimage, C:\WINDOWS\REIMAGE.INI, No Action By User, [350], [412667],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\APPDATA\ROAMING\Microsoft\Windows\Recent\STOPDecrypter (2).lnk, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (2).ZIP, No Action By User, [0], [392687],1.0.11270
HackTool.Cain, C:\PROGRAM FILES (X86)\CAIN\ABEL.EXE, No Action By User, [9185], [29604],1.0.11270
HackTool.Cain, C:\PROGRAM FILES (X86)\CAIN\ABEL64.EXE, No Action By User, [9185], [29604],1.0.11270
PUP.Optional.PasswordTool.Cain, C:\USERS\CYBER\Desktop\Cain.lnk, No Action By User, [14972], [299928],1.0.11270
PUP.Optional.PasswordTool.Cain, C:\PROGRAM FILES (X86)\CAIN\CAIN.EXE, No Action By User, [14972], [299928],1.0.11270
Generic.Malware/Suspicious, C:\$RECYCLE.BIN\S-1-5-21-709982592-2884008671-4219726286-1001\$RMVR4EX.TMP\BTMFYQAYMJ.EXE, No Action By User, [0], [392686],1.0.11270
PUP.Optional.Reimage, C:\$RECYCLE.BIN\S-1-5-21-709982592-2884008671-4219726286-1001\$RUO147J.EXE, No Action By User, [350], [331559],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOCUMENTS\STOPDECRYPTER.ZIP, No Action By User, [0], [392687],1.0.11270
Ransom.HiddenTear, C:\USERS\CYBER\DOWNLOADS\HIDDEN-TEAR-MASTER.ZIP, No Action By User, [8721], [124721],1.0.11270
PUP.Optional.Reimage, C:\USERS\CYBER\DOWNLOADS\REIMAGEREPAIR.EXE, No Action By User, [350], [331559],1.0.11270
Generic.Malware/Suspicious, C:\USERS\CYBER\DOWNLOADS\WANAKIWI_0.2 (1).ZIP, No Action By User, [0], [392686],1.0.11270
Generic.Malware/Suspicious, C:\USERS\CYBER\DOWNLOADS\WANAKIWI_0.2.ZIP, No Action By User, [0], [392686],1.0.11270
Generic.Malware/Suspicious, C:\USERS\CYBER\DOWNLOADS\HIDDEN-TEAR-MASTER.ZIP, No Action By User, [0], [392686],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (7).ZIP, No Action By User, [0], [392687],1.0.11270
Generic.Malware/Suspicious, C:\USERS\CYBER\DOWNLOADS\CAIN AND ABEL CA_SETUP.EXE, No Action By User, [0], [392686],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER.ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (1).ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (5).ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (8).ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (3).ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (6).ZIP, No Action By User, [0], [392687],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\STOPDECRYPTER (9).ZIP, No Action By User, [0], [392687],1.0.11270
Generic.Malware/Suspicious, C:\USERS\CYBER\DOWNLOADS\HASHCRACKER FOR GURON18 - [C0D3D BY JULIA (JULIA.PCRET@EXPLOIT.IM)] - 20170211.ZIP, No Action By User, [0], [392686],1.0.11270
MachineLearning/Anomalous.100%, C:\USERS\CYBER\DOWNLOADS\HOW TO COMPARE FILES.RAR, No Action By User, [0], [392687],1.0.11270

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)
---------------------------------------------------------------

Result from AdwCleaner
Is as follows:

---------------------------------------------------------------
# -------------------------------
# Malwarebytes AdwCleaner 7.4.0.0
# -------------------------------
# Build:    07-23-2019
# Database: 2019-08-21.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Clean
# -------------------------------
# Start:    08-26-2019
# Duration: 00:00:11
# OS:       Windows 10 Pro
# Cleaned:  46
# Failed:   0


***** [ Services ] *****

No malicious services cleaned.

***** [ Folders ] *****

Deleted       C:\Program Files (x86)\Cain
Deleted       C:\Program Files (x86)\Common Files\PARETOLOGIC
Deleted       C:\Program Files (x86)\PARETOLOGIC
Deleted       C:\ProgramData\PARETOLOGIC
Deleted       C:\ProgramData\SpeedyPC Software
Deleted       C:\Users\cyber\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Cain
Deleted       C:\Users\cyber\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PARETOLOGIC

***** [ Files ] *****

Deleted       C:\Users\cyber\Downloads\ReimageRepair.exe
Deleted       C:\Users\cyber\Downloads\SpyHunter-Installer.exe
Deleted       C:\Windows\Reimage.ini

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

Deleted       C:\Windows\System32\Tasks\PARETOLOGIC REGISTRATION3
Deleted       C:\Windows\System32\Tasks\PARETOLOGIC UPDATE VERSION3
Deleted       C:\Windows\System32\Tasks\PARETOLOGIC UPDATE VERSION3 STARTUP TASK
Deleted       C:\Windows\Tasks\PARETOLOGIC REGISTRATION3.JOB
Deleted       C:\Windows\Tasks\PARETOLOGIC UPDATE VERSION3 STARTUP TASK.JOB
Deleted       C:\Windows\Tasks\PARETOLOGIC UPDATE VERSION3.JOB

***** [ Registry ] *****

Deleted       HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{10ECCE17-29B5-4880-A8F5-EAD298611484}
Deleted       HKCU\Software\ParetoLogic
Deleted       HKCU\Software\cain
Deleted       HKCU\Software\speedypc software
Deleted       HKLM\SOFTWARE\Classes\AppID\REI_AxControl.DLL
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{850EA901-7BF6-47CB-9AD7-9879D6B11017} 
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F9B60A6B-ECD7-4933-9C2B-C36C2F017CD7} 
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{24077C0C-8648-4609-9368-FA8E438CF370} 
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{850EA901-7BF6-47CB-9AD7-9879D6B11017} 
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F9B60A6B-ECD7-4933-9C2B-C36C2F017CD7} 
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ParetoLogic Update Version3 Startup Task
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\paretologic registration3
Deleted       HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\paretologic update version3
Deleted       HKLM\Software\Classes\AppID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}
Deleted       HKLM\Software\Classes\CLSID\{10ECCE17-29B5-4880-A8F5-EAD298611484}
Deleted       HKLM\Software\Classes\CLSID\{801B440B-1EE3-49B0-B05D-2AB076D4E8CB}
Deleted       HKLM\Software\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}
Deleted       HKLM\Software\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546}
Deleted       HKLM\Software\Classes\REI_AxControl.ReiEngine
Deleted       HKLM\Software\Classes\REI_AxControl.ReiEngine.1
Deleted       HKLM\Software\Classes\TypeLib\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}
Deleted       HKLM\Software\Classes\uus3url-pl
Deleted       HKLM\Software\Reimage
Deleted       HKLM\Software\Wow6432Node\ParetoLogic
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\REI_AxControl.DLL
Deleted       HKLM\Software\Wow6432Node\\Classes\AppID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}
Deleted       HKLM\Software\Wow6432Node\\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546}
Deleted       HKLM\Software\Wow6432Node\\Classes\TypeLib\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}
Deleted       HKLM\Software\Wow6432Node\speedypc software

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries cleaned.

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries cleaned.

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.

***** [ Preinstalled Software ] *****

No Preinstalled Software cleaned.


*************************

[+] Delete Tracing Keys
[+] Reset Winsock

*************************

AdwCleaner[S00].txt - [5641 octets] - [26/08/2019 15:07:40]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########
---------------------------------------------------------------

Addition.txt FRST.txt

Share this post


Link to post
Share on other sites

Hello atrisa,

Upload a File to Virustotal

Go to http://www.virustotal.com/

  • Click the Choose file button
  • Navigate to the file C:\Users\cyber\AppData\Roaming\Messenger2go\Messenger2go.exe
  • Click the Scan it tab
  • If you get a message saying File has already been analyzed: click Reanalyze file now
  • Copy and paste the URL address back here please.
  • Repeat the above steps for the following files



C:\Users\cyber\Downloads\Messenger2go.15.1908.1rhmsn.exe

Next,

At present it would seem there is no decryption key for the version of Ransomware you have. I recommend that you register at Bleeping Computers and post to the Ransomware Help Forum here: https://www.bleepingcomputer.com/forums/f/239/ransomware-help-tech-support/

Thanks,

Kevin

Edited by kevinf80
typo

Share this post


Link to post
Share on other sites

Thanks
Threads Tagged with:
STOP Ransomware (.STOP, .Puma, .Djvu, .Promo, .Drume) Help & Support Topic
It currently has offline key activity
Can I hope files with online keys can also be recovered?

Share this post


Link to post
Share on other sites

Did you check with VirusTotal for Messenger2go

Regarding the encrypted files, your best option is to register at Bleeping Computers and post your information to the Ransomware Help forum, if a fix is available you will find it there...

Share this post


Link to post
Share on other sites

The following page will appear after running the Messenger2go file:

458517852_Screenshot(7).thumb.png.8946bf8ce03589f7526f0f645b586655.png

By running Messenger2go.15.1908.1rhmsn.exe you will get the previous result

Share this post


Link to post
Share on other sites

Thanks for the update and good luck at BC, I`ll close this thread out unless you have any other questions..

Share this post


Link to post
Share on other sites

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Thanks

 

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.