Jump to content

.LOKD Files need to recover


Recommended Posts

7 minutes ago, IT Person said:

Hello can you please help me to recover my data infected from .LOKD here are samples for same and here is its personal ID. Please let me know its recoverable or not (Online ID or Offline ID? ) Thanks in advance. 

 

Your personal ID:
0212Asd4a7d60N1ziFzqRlLaGJTvDRyLFPprgVxExd9uMugdksk6

_readme.txt 1.09 kB · 0 downloads outlook12.JPG.lokd 33.97 kB · 0 downloads outlook1.JPG.lokd 48.8 kB · 0 downloads

Starting...

File: C:\Users\admin\Desktop\Infected files LOKD files\Infected files LOKD files\outlook1.JPG.lokd
Error: No key for New Variant online ID: 0N1ziFzqRlLaGJTvDRyLFPprgVxExd9uMugdksk6
Notice: this ID appears to be an online ID, decryption is impossible

File: C:\Users\admin\Desktop\Infected files LOKD files\Infected files LOKD files\outlook12.JPG.lokd
Error: No key for New Variant online ID: 0N1ziFzqRlLaGJTvDRyLFPprgVxExd9uMugdksk6
Notice: this ID appears to be an online ID, decryption is impossible

 

""Result after run decryption tool, Please help!!!

Link to post
Share on other sites

Unfortunately, STOP(Djvu) was updated, and we no longer have any method to decrypt this ransomware unless the encryption occurred some time ago, before the 29th of August 2019.

Please refer to this blog post for information about a decrypter that may work, and also for support instructions if it does not: https://blog.emsisoft.com/en/34375/emsisoft-releases-new-decryptor-for-stop-djvu-ransomware/

Newer STOP(Djvu) is currently impossible to decrypt without the encryption keys held by the criminals. That applies to online or offline ID, but offline ID may be shared by many victims. If one pays and reports the encryption keys to us, we can add them to the decrypter so others with the same offline ID can decrypt their files. Online ID correspond to encryption keys that are unique.

Make sure you remove the malware from your system first before using this decrypter. If you don't, the malware may lock your system or encrypt your files again. Use an antivirus such as Emsisoft Anti-Malware to effectively remove the malware. You can get a free trial version of Emsisoft Anti-Malware here: https://www.emsisoft.com/en/home/antimalware/

Quite a lot more information about STOP(Djvu) can be found here: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/

For STOP related support, please read our blog post about the tool. The section marked "Community collaboration" explains how to get support in this situation.

While it is very rare that it helps, you might try undelete software, or if your files are very important it may be worth talking to a company that specializes in ransomware negotiation, and will communicate in your behalf with the criminals that created the ransomware.

Exercise a bit of caution when looking for a company to help, though. Generally speaking, if a company claims to be able to decrypt files that were encrypted by a type of ransomware for which no decryption tool is available, that company is probably just going to pay the ransom and charge you more than you would have paid if you had dealt with the criminals directly. Better is to search for companies who specialize in ransomware negotiation.

Again, if the STOP(Djvu) decrypter does not decrypt any of the encrypted files, there is nothing else we can do. We do not recommend paying the ransom unless there is absolutely no other choice.

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...