Jump to content

Amigo-A

Member
  • Posts

    2187
  • Joined

  • Last visited

  • Days Won

    55

Everything posted by Amigo-A

  1. Why did this happen? This 'STOP Ransomware' enters the PC due to the fact that computer is poorly protected. People often use free antivirus programs with the 'Free' label in the name. None of these programs will protect PC from programs similar to 'STOP Ransomware', because basic protection is not capable of this feat. If users used comprehensive protection of the 'Internet Security' class, then it would help protect PC from ransomware attacks. There is no 100% protection against malware, but what the 'Free' antivirus gives is 1-2 percent protection. After this attack, PCs could have stayed other malware elements. This maybe is an info-stealer and something else. Therefore, it is urgent to conduct a full check and destroy malware. Use an comprehensive anti-virus software such as Emsisoft Anti-Malware to effectively remove the malware. You can get a free trial 30-days version of Emsisoft Anti-Malware here: https://www.emsisoft.com/en/home/antimalware/ It will help you clean your PC from other malware for free.
  2. Next, I'll tell you what you need to do now, immediately, and what you can try after that.
  3. Hello. Did I understand correctly that you would launch the Emsisoft Decryptor and do nothing else? You have been attacked by a 'STOP Ransomware' that has been spreading for 4 years. The new variant uses the .tisc extension, which adds it to encrypted files. If you read the Guide and run the Emsisoft Decryptor, it will tell you the result of the check. Files can only be decrypted if an offline ID was used for encryption. It looks like offline ID. This will become possible when the decryption key for this variant is added to the Emsisoft Decryptor. This will become possible when someone buys the key and shares it with the Emsisoft Decryptor developer. There is no other way to decrypt files.
  4. Only after neutralizing all malicious files ... I recommend this following method only when there is no other way... You don't have to go to it until you try the Emsisoft Decryptor. Depending on the result of the check, you can wait for a new version with a decryption key or proceed to the next method. --- This is not the decryption, it is the recovery of certain types of files using the features of these files. 1) If you have encrypted ZIP/RAR archives, you can partially recover them. Only 1-2 files are damaged there. Remove the extension that the ransomware added to the archives, and extract the files in the usual way. Everything except 1-2 files will be fixed. If there is only 1 file in the archive, then it will most likely be unrecoverable. 2) There is an alternative (additional) way to recover some media files: WAV, MP3, MP4, M4V, MOV, 3GP. https://www.disktuna.com/media_repair-file-repair-for-stop-djvu-mp3-mp4-3gp But before trying the alternative variant with media files, it is recommended that you make a copy of the encrypted files. Something will be restored better, something will be restored worse. Some types of files can be opened (restored) using the application in which they were created. To do this, you must first remove the extension added by the ransomware. Then can try to open the file from the program in which it was created. If you open audio and video files in the editor, it will restore the structure, and upon closing it will offer to save the changes in the file. 3) If you have PDFs or files of other e-books, then they may suffer in part if they were not protected from manual modification. Therefore, after removing the added extension, they can be partially read (~ 80%). Unfortunately, it is not yet possible to recover files created in MS Office applications due to their sensitivity to any damage. They can be easily damaged without encryption. It is easier to recover and read text written on paper or on the stone than one created in MS Office. An alternative method for other files has not yet been found.
  5. Why did this happen? This 'STOP Ransomware' enters the PC due to the fact that computer is poorly protected. People often use free antivirus programs with the 'Free' label in the name. None of these programs will protect PC from programs similar to 'STOP Ransomware', because basic protection is not capable of this feat. If users used comprehensive protection of the 'Internet Security' class, then it would help protect PC from ransomware attacks. There is no 100% protection against malware, but what the 'Free' antivirus gives is 1-2 percent protection. After this attack, PCs could have stayed other malware elements. This maybe is an info-stealer and something else. Therefore, it is urgent to conduct a full check and destroy malware. Use an comprehensive anti-virus software such as Emsisoft Anti-Malware to effectively remove the malware. You can get a free trial 30-days version of Emsisoft Anti-Malware here: https://www.emsisoft.com/en/home/antimalware/ It will help you clean your PC from other malware for free. !!! You need to neutralize all malicious files in the system. This should be done as quickly as possible. Otherwise, the files may be encrypted using the online ID and decryption will never be possible.
  6. Next, I'll tell you what you need to do now, immediately, and what you can try after that.
  7. Привет Вы подверглись нападению со стороны программы- вымогателя STOP , которая распространяется уже 4 года. В новом варианте используется расширение .tisc, которое добавляет его к зашифрованным файлам. Если вы прочитаете Руководство и запустите Emsisoft Decryptor , он сообщит вам результат проверки. Файлы можно расшифровать только в том случае, если для шифрования использовался автономный идентификатор. Это станет возможным, когда ключ дешифрования для этого варианта будет добавлен в Emsisoft Decryptor. Это станет возможным, когда кто-то купит ключ и поделится им с разработчиком Emsisoft Decryptor. Другого способа расшифровать файлы нет.
  8. Also... Check beforehand if newer versions of Microsoft .NET Framework are installed https://dotnet.microsoft.com/download/dotnet-framework After installation, restart your PC. Encrypted files do not pose a threat if they themselves were not previously something malicious (hacktool, crack, patch, PUP... etc.).
  9. Download the decryptor and run it will tell you that the files can be decrypted in the future, i.e. when the decryptor developers will have the decryption key for this variant. This variant has appeared recently and no one seems to have shared the key yet.
  10. Hello @mansveryhot You can determine for yourself the possibility of decryption in the future when the decryptor contains the key for this new variant. Download the Emsisoft Decryptor and run it, he will check and tell you the result. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu
  11. This is a new 'STOP Ransomware' variant that adds this extension to encrypted files. You can determine for yourself the possibility of decryption in the future when the decryptor contains the key for this new variant. Download the Emsisoft Decryptor and run it, he will check and tell you the result. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu
  12. Although you did not answer, it became clear to us that there is a new 'STOP Ransomware' variant that adds this extension to encrypted files. You can determine for yourself the possibility of decryption in the future when the decryptor contains the key for this new variant. Download the Emsisoft Decryptor and run it, he will check and tell you the result. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu
  13. Although you did not answer, it became clear to us that there is a new 'STOP Ransomware' variant that adds this extension to encrypted files. You can determine for yourself the possibility of decryption in the future when the decryptor contains the key for this new variant. Download the Emsisoft Decryptor and run it, he will check and tell you the result. https://www.emsisoft.com/ransomware-decryption-tools/stop-djvu
  14. Download the decryptor and run it will tell you that the files can be decrypted in the future, i.e. when the decryptor developers will have the decryption key for this variant. This variant has appeared recently and no one seems to have shared the key yet.
  15. Download the decryptor and run it will tell you that the files can be decrypted in the future, i.e. when the decryptor developers will have the decryption key for this variant. This variant has appeared recently and no one seems to have shared the key yet.
  16. https://www.bleepingcomputer.com/forums/t/708565/zeppelin-ransomware-support-topic/ Yes, you need to refer to this forum thread for a specialist to check your files. He may also answer you here, but that forum topic has more potential than the new topic you opened here.
  17. https://id-ransomware.blogspot.com/p/hot-stop.html Here you can see variants with any extensions that do not have a decryption key. The "*" sign indicates that the decryption key has not yet been received.
  18. Save the necessary encrypted files in a safe place, for example, it can be an external drive, which after transferring files must be disconnected from the PC.
  19. Hello More information needed: upload 2 encrypted files and a note from the ransomware to the file-sharing site so I can download and look. https://dropmefiles.com/ Just drag the files to the site window and copy the download link. There is no need to attach files here, because I can't look at them. It could be a new variant of 'STOP Ransomware' or something else.
  20. Hello More information needed: upload 2 encrypted files and a note from the ransomware to the file-sharing site so I can download and look. https://dropmefiles.com/ Just drag the files to the site window and copy the download link. There is no need to attach files here, because I can't look at them. It could be a new variant of 'STOP Ransomware' or something else.
  21. I am temporarily not responding to messages. Sorry.

  22. A new version: Only after neutralizing all malicious files ... I recommend this following method only when there is no other way... This is not the decryption, it is the recovery of certain types of files using the features of these files. 1) If you have encrypted archives, you can partially recover them. Only 1-2 files are damaged there. Remove the extension that the ransomware added to the archives, and extract the files in the usual way. Everything except 1-2 files will be fixed. If there is only 1 file in the archive, then it will most likely be unrecoverable. 2) There is an alternative (additional) way to recover some media files: WAV, MP3, MP4, M4V, MOV, 3GP. https://www.disktuna.com/media_repair-file-repair-for-stop-djvu-mp3-mp4-3gp But before trying the alternative variant with media files, it is recommended that you make a copy of the encrypted files. Something will be restored better, something will be restored worse. Some types of files can be opened (restored) using the application in which they were created. To do this, you must first remove the extension added by the encryptor. Then can try to open the file from the program in which it was created. If you open audio and video files in the editor, it will restore the structure, and upon closing it will offer to save the changes in the file. 3) If you have PDFs or files of other e-books, then they may suffer in part if they were not protected from manual modification. Therefore, after removing the added extension, they can be partially read (~ 80%). Unfortunately, it is not yet possible to recover files created in MS Office applications due to their sensitivity to any damage. They can be easily damaged without encryption. It is easier to recover and read text written on paper or on the stone than one created in MS Office. An alternative method for other files has not yet been found.
  23. @cybermetric Yes. And that too. It seems to me that it has a system freeze. I am confused by the screenshot of the screen with the number 7. Any other design? Updating the system can be problematic or impossible.
  24. Only after neutralizing all malicious files ... I recommend this following method only when there is no other way... This is not the decryption, it is the recovery of certain types of files using the features of these files. 1) If you have encrypted archives (zip, rar) , you can partially recover them. Only 1-2 files are damaged there. Remove the extension '.orkf' that the ransomware added to the archives, and extract the files in the usual way. Everything except 1-2 files will be fixed. If there is only 1 file in the archive, then it will most likely be unrecoverable. 2) There is an alternative (additional) way to recover some media files: WAV, MP3, MP4, M4V, MOV, 3GP Link: https://www.disktuna.com/media_repair-file-repair-for-stop-djvu-mp3-mp4-3gp But before trying the alternative variant with media files, it is recommended that you make a copy of the encrypted files. Something will be restored better, something will be restored worse. Some types of files can be opened (restored) using the application in which they were created. To do this, you must first remove the extension added by the encryptor. Then can try to open the file from the program in which it was created. If you open audio and video files in the editor, it will restore the structure, and upon closing it will offer to save the changes in the file. 3) If you have PDFs or files of other e-books, then they may suffer in part if they were not protected from manual modification. Therefore, after removing the added extension, they can be partially read (~ 80%). Unfortunately, it is not yet possible to recover files created in MS Office applications due to their sensitivity to any damage. They can be easily damaged without encryption. It is easier to recover and read text written on paper or on the stone than one created in MS Office. An alternative method for other files has not yet been found.
×
×
  • Create New...