- Dec 26, 2022
- 5
Greetings.
A Loki ransomware has managed to delete all my restore points and added itself to Windows Defender exclusion list, however since I have Acronis True Image from my WD hard drive purchase I bought for local daily backup, Acronis Ransomware Protection allows me to block ransomware's file access I denied the ransomware, thus the ransomware has encrypted nothing but files on the root C:\ drive which are driver installation logs and the stuff on Public user folder, and all of them are program shortcuts.
I know I'm supposed to send in Malwarebytes logs, but since the ransomware is still active and it has added itself to Windows Defender exclusion list, I didn't want to boot into my Windows installation, not even safe mode. Why? Afraid of the ransomware starting up. However, Malwarebytes free seems not to be licensed for offline scanning from my precursory internet search. Hence I'm attaching just a FRST logfile collected from booting the system from Windows 10 installation USB disk
A Loki ransomware has managed to delete all my restore points and added itself to Windows Defender exclusion list, however since I have Acronis True Image from my WD hard drive purchase I bought for local daily backup, Acronis Ransomware Protection allows me to block ransomware's file access I denied the ransomware, thus the ransomware has encrypted nothing but files on the root C:\ drive which are driver installation logs and the stuff on Public user folder, and all of them are program shortcuts.
I know I'm supposed to send in Malwarebytes logs, but since the ransomware is still active and it has added itself to Windows Defender exclusion list, I didn't want to boot into my Windows installation, not even safe mode. Why? Afraid of the ransomware starting up. However, Malwarebytes free seems not to be licensed for offline scanning from my precursory internet search. Hence I'm attaching just a FRST logfile collected from booting the system from Windows 10 installation USB disk