Jump to content

De_Frog_disk

Members
  • Posts

    4
  • Joined

  • Last visited

About De_Frog_disk

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Canada

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I do not think $ROJ4EGY.exe is a normal name. All the other files had similar names. also none of them could be opened. when I booted windows again and looked through the same folder, all the files had their normal names.
  2. It scans all files in your computer storage. system files and personal ones.
  3. Do you know what encryption method they are using? if its AES then there is Nothing you can do. other forms of encryption have some successful methods of attacking them. if its a legitimate piece of ransomware they probably did use AES. if not and the attackers were just lazy when writing the virus then they possibly could have just encoded the file with base64 or something and are trying to trick you. if this is the case the files can be easily recovered, if not then there is a problem. could you please send a sample of some of the text from one of the encrypted files. you can do this by opening it with notepad.
  4. So i did the standard plug in the USB and boot up Live rescue. during the scan, I noticed that all the files it was scanning had really weird names. so i started browsing through the file system of the hdd. It took me a good few seconds to realized that all the files were hashed. My question is how the heck can it detect if files are malicious or not if all of them are hashed?
  5. So i ran ESET live rescue and was doing a full in depth scan of everything. I noticed that all the files being scanned had weird names. I looked in the file system and saw that all the files had weird names. It took me a second to realized that they were all hashed. so my question is how can ESET LiveRescue possibly detect if a file is malicious when it is hashed?
×
×
  • Create New...