Jump to content


  • Posts

  • Joined

  • Days Won


Everything posted by cybermetric

  1. This is the .npsk STOP variant. Unfortunately, the offline/private key has never been donated to Emsisoft by a victim that paid the ransom and got the key.
  2. Are you sure it's 338? Another poster shows 337 for the version#. What is the complete ID shown in the ransom note?
  3. File pairs can only be used with the "old variant" STOP ransomware. The .tisc variant @Cyberguy has is a "new variant" version and cannot be decrypted by this method.
  4. Also, from the Emsisoft decrypter FAQ: Why won't the decrypter run? The decrypter requires version 4.5.2 or newer of the Microsoft .NET Framework, so this could mean your version of the .NET Framework is out of date. We recommend installing the latest version of the .NET Framework (4.8 at the time of writing this), and then trying the decrypter again. Make sure Windows has been completely updated.
  5. That has not ever happened for the STOP ransomware. Law enforcement has not nabbed the criminals and/or their servers.
  6. Both the .gujd and the ufwj STOP variants have the same offline ID (ends in "t1"). The same offline/private key will decrypt both variants if encrypted by the offline key, WHEN/IF Emsisoft is donated the offline/private key by a victim that has paid the ransom. This may or may not ever happen.
  7. You're right - it's .leex. This appears just above the decrypter log: Error: No key for New Variant offline ID: LTYv5JAYPKU9SqYbMp9sbHbkMoA4JlKc46dTaLt1Notice: this ID appears be an offline ID, decryption MAY be possible in the future. That is the offline ID for .leex.
  8. Something is amiss with the post of @Dinesh Shrestha. The first decrypter line indicates that he has an offline ID. Moreover, that is the offline ID for the .leek variant. The log from the decrypter indicates his files are encrypted by an online key of the .neer variant. 2 different encryptions? Or is the offline ID for the .neer variant the same as that for the .leek variant? I have no idea. Back to the experts!!
  9. The "error" is simply the decrypter's way of telling you that your files were encrypted by an online key, and cannot be decrypted. Simple as that.
  10. This is the type of response that the decrypter gives when it doesn't find any encrypted files. All I can suggest is to copy perhaps 5 of the files that were not decrypted into a test folder, and run the decrypter on just that folder (as you did on another folder above). If you still get the same result, one of the experts here will have to work on this. What happens if you remove the iqll extension from one of these files? Is it accessible? (Just a thought). in some cases the ransomware burps and just adds the extension without encrypting the file.
  11. You have an offline ID. WHEN/IF Emsisoft is donated the offline/private key by a victim of this variant who has paid the ransom, you will be able to decrypt your files. In the meantime, secure the encrypted files on an external HD for safe-keeping. Run the Emsisoft decrypter on a testbed of encrypted files every week or so to check. Emsisoft doesn't announce donated keys.
  12. The decrypter would have given you a reason. What did it report on the files it wouldn't decrypt?
  13. Run the Emsisoft decrypter NOW. It appears that Emsisoft has received the offline/private key for the .igll STOP variant.
  14. The extension is .ogdo, not odgo. The offline key has never been received by Emsisoft. Your files remain undecryptable until that happens.
  15. There is no solution for files encrypted by an online key of any of the "New Version" STOP variants (which include the .sspg variant).
  16. It is not resolvable. An online ID indicates files were encrypted by an online key, and cannot be decrypted.
  17. One could manually remove the extension quite easily. Also, using some other decrypter may have removed the extensions. I don't know how the Emsisoft decrypter would respond if the extensions have been removed. I'm sure Amigo-A (one of the resident experts) will be along with additional help. The error you got is because you weren't online when you ran the decrypter. The decrypter needs to connect with the Emsisoft server.
  18. It also looks like @daemon3642 has removed the .drume extension from the encrypted files, which he/she should not have done.
  19. The offline key for the .vari STOP variant has never been donated to Emsisoft by a victim who paid the ransom and got the key. If Emsisoft had received it, they would have added it to their server, and the Emsisoft decrypter would have decrypted your files. That has never happened. This, of course, assumes that your files were encrypted by an offline key. If you've run the Emsisoft decrypter and it indicates 'decryption is impossible', your files were encrypted by an online key, and are not decryptable.
  20. It's .ehiz, not .ehis. This is the latest (so far) variant of the STOP ransomware. If you run the Emsisoft decrypter on your files and it indicates "decryption is impossible", your files were encrypted by an online key, and you can only recover them by dealing with the criminals. The Emsisoft decrypter cannot help you.
  21. @YaYA: Why don't you be a hero and donate the private key to Emsisoft so they can add it to their system and others that had files encrypted by an offline key can recover their files?
  22. What extension was added to your files?
  • Create New...