Jump to content

Search the Community

Showing results for tags 'ransomware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • ESET General Forums
    • ESET Announcements
    • General Discussion
    • Forum FAQ's and Rules
    • Submit a virus, website or potential false positive sample to the ESET lab
    • Quick questions by guests (registration not required)
  • ESET Home User Products
    • ESET Internet Security & ESET Smart Security Premium
    • ESET NOD32 Antivirus
    • ESET Cyber Security (for Mac)
    • ESET Cyber Security Pro (for Mac)
    • ESET NOD32 Antivirus for Linux Desktop
    • ESET Products for Mobile Devices
    • Web portals
  • Malware Detection and Cleaning
    • Malware Finding and Cleaning
    • ESET Standalone Malware Removal Tools
  • ESET Business User Products
    • ESET Cloud solutions
    • ESET Endpoint Products
    • ESET Products for Windows Servers
    • ESET Products for Linux Servers
    • ESET Products for Mobile Devices
    • Remote Management
    • ESET Enterprise Inspector (EDR)
    • ESET Products for Virtualized Environments
    • Encryption
    • ESET Licensing for Business
  • ESET Beta Products
    • ESET Beta Products for Home Users
    • ESET Beta Products for Business Users
  • Slovak and Czech forums
    • ESET NOD32 Antivirus, ESET Internet Security a ESET Smart Security Premium
    • Produkty pre mobilné zariadenia
    • Vírusy a iné hrozby
    • Ostatné

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL






Found 15 results

  1. Hello, As I know if you run eset uninstalltool in safe mode you can uninstall agent and endpoint. If a zero day ransomware reboots the pc into safe mode is there any client settings to be enabled to prevent the ransomware from uninstalling the endpoint security? https://www.zdnet.com/article/snatch-ransomware-reboots-pcs-in-windows-safe-mode-to-bypass-antivirus-apps/ Thanks, Peter
  2. we are install eset antivirus is unable to stop virus in my computer all file corrected Mess drop by virus is below Your All Files Encrypted With High level Cryptography Algorithm If You Need Your Files You Should Pay For Decryption You Can Send 1MB File For Decryption Test To Make Sure Your Files Can Be Decrypted After 48 hour If You Dont contact us or use 3rd party applications or recovery tools Decryption fee will Be Double After Test You Will Get Decryption Tool Your ID For Decryption:V24ebEl6JQ Contact Us: RDP700@protonmail.com Screenshot is atta
  3. Hello. I used your product NOD32 in the past, and I heard that a new version has been released recently. I am currently concerned with ransomware protection, so I am very interested in capabilities of the ransomware shield component. I don't want to lose my data to something like bad rabbit :(. So, I've decided to check if NOD32 is the product that I need. As I understand it, ransomware outbreaks happen because it takes time to add malware signatures to antivirus database, so most antivirus products have good dynamic analysis. I wanted to test how ESET deals with "unknown" ransomware. To
  4. https://www.virustotal.com/#/file/1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887/detection
  5. hello friends my friend's computer files was encrypted. (docs, excel, spss , ...) (windows is normall) extension of file was changed to .bef5 in any folder we saw: _README_.hta file and files with chanegd name like: 3CGg7QHcMK.bef5 what he must do to decrypt his files? thnaks when _README_.hta was opend, show this page: (also attached) CERBER RANSOMWARE Instructions Can't you find the necessary files? Is the content of your files not readable? It is normal because the files' names and the data in your files have been encrypted by "Cerber Ransomware". It means your files are NOT damaged
  6. please help to recover my files. Files are encrypted by cerber ransomware and also changed file name with extension .96b1.. isthare any eset tool for decrypt those files....
  7. Help Us, my computer treat virus .zepto file, how decrrypt file locked zepto. I Need Help
  8. Hi. Will it be possible for the decoding of the new version of enigma (*.enigma)? beginning with the spread of 10 August 2016. (the previous version was transcribed.) Examples of encrypted files can add to the message.
  9. I clicked on a link in an email saying someone in hong kong bought something off our apple account on iTunes said and to press it if it wasn't us, so stupidly did. By the way there were 2 purchases we did not make. The email contained about four lines yet the size was 1,591 kb with 455 pages found in the message source file. I had to enter the password for the account but only got a picture of the page which was not operational. I looked at the email and all the misspellings so tried to find the message source on google - eservicesuport@acountinclogin.onmicrosoft.com didn't find it.
  10. Just want to share interesting information: ESET releases new decryptor for TeslaCrypt ransomware hxxp://www.welivesecurity.com/2016/05/18/eset-releases-decryptor-recent-variants-teslacrypt-ransomware/ How do I clean a TeslaCrypt infection using the ESET TeslaCrypt decrypter? hxxp://support.eset.com/kb6051/
  11. I tried to post a version this question yesterday, but without success. I need to clean a TorrentLocker (Cryptolocker-like)* infection from my Windows 7 laptop. The computer was infected despite Eset antivirus running, however I realised there was a problem and shut it down before TorrentLocker had encrypted all at-risk files on the hard disk. I have since booted using ESET SysRescue and run a scan, which showed no infection, although the original zip/exe file was still on the hard disk. (I have now deleted it manually using a linux-live CD.) I have not restarted Windows since.
  12. Hi Team, After several days (weeks?) of testing "ESET HIPS against CryptoLocker" I can confirm that I sure would recommend it, at least regarding the part that it does not interfere with legitimate applications. This is the resulting page when "something" (an .EXE) tries to execute itself from %AppData%: (see attached image 01) So, HIPS will ask customer for action, and also an "automatic" exception rule can be added from within alert window (as this example for some Java's module): (see attached image 02) The original rule (named "CryptoLocker"
  13. Hi all, Do we have some detailed data about this malware? Tomo
  14. hello i get infected with the virus fbi agent how do i clean and fix my computer
  • Create New...