

The tool will create a log (Fixlog.txt) please post it to your reply.

Run FRST and click Fix only once and wait. The location is listed in the 3rd line of the Farbar log you have submitted. Save the file as fixlist.txt in the same folder where the Farbar tool is running from. Online Application (HKLM-x32\.\ - \AGProx圜heck -> No File C:\Program Files (x86)\Microleaves\Online Application\Online Application Updater.exe No File No File No File C:\Program Files\Mojave\Mojave.exe No File C:\Program Files\Mojave\Mojave.exe C:\Program Files (x86)\Microleaves\Online Application\Online Application Updater.exe <= ATTENTIONĪlternateDataStreams: C:\Windows:nlsPreferences Ĭ:\Users\simon\AppData\Local\Ĭ:\Users\simon\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gcaiated.lnkĬ:\Program Files (x86)\mozilla firefox\defaults\pref\secure_cert.jsĬ:\Users\simon\AppData\Roaming\Microsoft\Windows\gcaiatedĬ:\Users\simon\AppData\Local\c59e74dd-4758-4d5f-947b-d30e5bcdde0b Remove these programs in bold via the Control Panel > Programs > Programs and Features.įastDataX 1.20 (HKLM-x32\.\FastDataX_is1) (Version: 1.20 - ) I just wondered how likely the average ransomware is likely to get decrypted in the future years?Not much of a chance, but who knows.Ĭould I move this over to the Globe Imposter 2.0 thread? Select the " Choose a File" navigate to the location of the File. In the Reply section in the bottom of the topic Click the " more reply Options" button. The first time the tool is run, it makes also another log (Addition.txt).

It will make a log (FRST.txt) in the same directory the tool is run. When the tool opens click Yes to disclaimer. Your best option is to restore these Files from your backups if you have saved them.Īfter you have saved the compromised files we can have a look at your system and clean what we can.ĭownload the version of this tool for your operating system.Īnd save it to a folder on your computer's Desktop.ĭouble-click to run it.

Should a way be found in the future you will be able to restore them. I can only suggest you save your compromised files to a Flash Driver or CD. Send a file to this forum for their review. Some helpers are looking at what can be done, if a decrypt method is found in the future. If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.Īll your files have been encrypted and I do not see anyways they can be decrypted at the moment.
