All Activity

This stream auto-updates     

  1. Today
  2. I have used version .1.0.0.1 but I still can't delete the hets virus
  3. This is only necessary so that the user is not mistaken with the same files of decryptor.
  4. New version of the Emsisoft decryptor 1.0.0.1, but error Error: Unable to decrypt file with ID: oKHDYc1OHBXQFVnjGfk6rj1Zi8BGOtrxprKfz4Xk
  5. It is an ID that has been assigned by the ransomware's command and control servers. When encrypted files have an online ID, it means that the ransomware was able to communicate with its command and control servers, and thus it was able to receive a randomly generated public key to encrypt files with. It also means that a unique private key will be needed to decrypt the files, and these private keys don't leave the command and control server unless someone pays the ransom for files with the corresponding ID. By contrast, an offline ID is assigned to files by the ransomware when it can't connect to its command and control servers, and instead it uses a built-in public key to encrypt files. Since the offline ID and offline public key used for every computer infected by the same variant is identical, the same private key can be used to decrypt any files that have an offline ID. It's only a matter of us finding the private key for each variant of STOP/Djvu and adding it to our database.
  6. That shouldn't be necessary. They can just run the version of the decrypter they had already downloaded (it hasn't been updated for roughly a month).
  7. Help Ramsomware Hets ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iLkPxViexl Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0189jYs9doKHDYc1OHBXQFVnjGfk6rj1Zi8BGOtrxprKfz4Xk
  8. This is a newer variant of STOP/Djvu, and your ID is an online ID, so there is currently no way to decrypt your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/
  9. Yeah, that a pretty serious vulnerability for anyone using Linux. Considering how many VPN service providers use Linux servers, I wonder how many of them will have (or have had) issues with this. Fortunately there are ways to mitigate it, so as long as everyone takes the vulnerability seriously it shouldn't be a serious issue for very long.
  10. Help me ramsomware Hets ATTENTION! Don't worry, you can return all your files! All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iLkPxViexl Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0189jYs9doKHDYc1OHBXQFVnjGfk6rj1Zi8BGOtrxprKfz4Xk
  11. Hello @Muhammed I answered to you in topic
  12. @MohammedEid Files that were encrypted by 'STOP Ransomware' can only be decrypted if they were encrypted without contact with the ransomware server (offline). One condition for decryption is the presence of a decryption key. If there is no such key, then decryption is not possible, even if an offline key was used. You can find out the details in a special topic. Some files can only be partially encrypted. For example, files that are inside an archive can be extracted. In this case, only 1-2 files at the beginning of the alphabet list will be encrypted or damaged. There are reports from the victims that some music files and video files are being played, but I did not specify or remember what formats these are. This is a big burden for me, considering that I work with thousands of ransomware and very big quantity affected users around the world. See the 1st link in the signature.
  13. @MohammedEid Have you tried removing the .right extension to try to open and view the file in your program? If you haven’t tried, make a copy and try to open this copy in this way.
  14. @Muhammed Yes, the amount that extortionists require is large, not only for students. Files that were encrypted by 'STOP Ransomware' can only be decrypted if they were encrypted without contact with the ransomware server (offline). One condition for decryption is the presence of a decryption key. If there is no such key, then decryption is not possible, even if an offline key was used. You can find out the details in a special topic. Under this condition, your ID looks like an "online ID". This is the newest variant 'STOP Ransomware' and decryption keys have not yet been found for it. But... Extortionists can change the conditions at any time. Now you need to save the encrypted files and ransomware notes. Collect them in a safe place without sorting. Let them be in their places. Sometimes different encryption keys can be used to encrypt files. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu You will need to be download and run the decoder after each new version of Emsisoft decryptor. Perhaps something will change for the better. There is no other way to return your files if you do not pay the ransom. Some files can only be partially encrypted. For example, files that are inside an archive can be extracted. In this case, only 1-2 files at the beginning of the alphabet list will be encrypted or damaged. There are reports from the victims that some music files and video files are being played, but I did not specify or remember what formats these are. This is a big burden for me, considering that I work with thousands of ransomware and very big quantity affected users around the world. See the 1st link in the signature.
  15. Yesterday
  16. please help can u decrypte this file https://drive.google.com/open?id=128tkE17psfwi5HbUo5b3qACEjqjuhkHy
  17. I have added a description of the Readme description, please help me. I can't pay Fiyde because I'm a student. _readme.txt
  18. I have added a description of the Readme description, please help me. I can't pay Fiyde because I'm a student. _readme.txt
  19. Mobile phones ARE computers, computers one of whose programs pretends to be a (real) phone. Various companies (including Emsisoft) produce anti-malware/anti-virus programs for mobiles. You can read a summary of what these various programs can protect you from. Obviously iOS (Apple) and Android differ, and - as with PCs - there's several versions of each one's OS in use, and of course with Android some manufacturers supply variants on Android (ie not every Android phone is running the same OS). That means that odd combinations of phone model, version of Android etc may mean there's exploitable loopholes in subsets of phones, even if most are ok. In theory Apple's phones are more secure, partly because there's only their version of iOS in use, and partly because Apple try to make sure that only reputable apps are available. You might find it useful to read: https://www.av-comparatives.org/tests/mobile-security-review-2019/
  20. Some files can only be partially encrypted. For example, files that are inside an archive can be extracted. In this case, only 1-2 files at the beginning of the alphabet list will be encrypted or damaged. There are reports from the victims that some music files and video files are being played, but I did not specify or remember what formats these are. This is a big burden for me, considering that I work with thousands of ransomware and very big quantity affected users around the world. See the 1st link in the signature.
  21. Under this condition, your ID looks like an "online ID". This is the newest variant 'STOP Ransomware' and decryption keys have not yet been found for it. But... Extortionists can change the conditions at any time. Now you need to save the encrypted files and ransomware notes. Collect them in a safe place without sorting. Let them be in their places. Sometimes different encryption keys can be used to encrypt files. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu You will need to be download and run the decoder after each new version of Emsisoft decryptor. Perhaps something will change for the better. There is no other way to return your files if you do not pay the ransom.
  22. Hello @Zoran Files that were encrypted by 'STOP Ransomware' can only be decrypted if they were encrypted without contact with the ransomware server (offline). One condition for decryption is the presence of a decryption key. If there is no such key, then decryption is not possible, even if an offline key was used. You can find out the details in a special topic.
  23. It is important to always use the latest version of anti-virus protection of Internet Security class or higher. Very often, users find somewhere re-patched version, where hackers made changes that would will critical at the time of the attack. Unfortunately, this is very common when users do not want or cannot buy an antivirus product on the official website.
  24. You need to try downloading the new version of the Emsisoft decryptor. But first, delete the previous one.
  25. The ID has a t1 so why won't the encryptor work? List of variants of STOP Ransomware, for which offline keys were received (to today) 0156: .gero 0157: .hese 0159: .seto 0160: .peta 0161: .moka 162: .meds 0163: .kvag 0164: .domn 0165: .karl 0166: .nesa 0168: .noos 0169: .kuub 0170: .reco 0171: .bora 0173: .nols 0174: .werd 0175: .coot 0176: .derp 0178: .meka 0179: .toec 0180: .mosk 0181: .lokf 0182: .peet 0183: .grod 0184: .mbed 0185: .kodg 0186: .zobm 0188: .msop 0189: .hets
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up