This is the result of the STOP Ransomware attack. I have been tracking the malicious work of this program since December 2017. Now on the forum a lot of victims from different variants of this Ransomware. In some cases, the files can be decrypted.
@Demonslay335 (the developer of the STOPDecrypter) collects information from the victims, writes data and tries to update the STOP Decrypter. After that, victims can try to decrypt the files. A positive result and a lucky chance are not always possible.
Download STOP Decrypter now >>>
I recommend to you start decrypt with a small group of files, but first you need to make copies of these files.
If STOPDecrypter won't be able to recover your files yet, it can still be used to get information that may be able to help the creator of STOPDecrypter figure out your decryption key. Here's a link to instructions on how to get this information with STOPDecrypter: https://kb.gt500.org/stopdecrypter
[+] Loaded 59 offline keys
Please archive the following info in case of future decryption:
[*] ID: fLZ0FsGOpqQKtS85F02McGLS2zvr55u1wR2tblpR
[*] ID: 68O9eTFDNbn8z2O956vweaL1v2GY5gvWBYMKcmt1
[*] MACs: 2A:03:9A:C3:93:6B, E8:03:9A:C3:93:6B, E8:03:9A:C3:93:6C
This info has also been logged to STOPDecrypter-log.txt