Jump to content

"STOP (Djvu)" Infeted file


SDM
 Share

Recommended Posts

Need help to decrypt file.

We have identified "STOP (Djvu)". This ransomware may be decryptable under certain circumstances.
Please refer to the appropriate guide for more information.

Identified by:

ransomnote_filename: _readme.txt
ransomnote_email: [email protected]
sample_bytes: [0x293C - 0x2962] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D
Click here for more information about STOP (Djvu).
Case number: bf2fa31c000f94097a7c33e5dba0d3da655d230d1630265749

 

 

 

Link to comment
Share on other sites

Hello @SDM,

 

Welcome to the Emsisoft Support Forums.

 

I understand it is frustrating, but currently, we are not aware of any ways to decrypt files with Online-ID and some recent forms of STOP(DJVU).

 

Please read this Topic. It contains information about your situation and whether or not your files can be decrypted.

https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/

Link to comment
Share on other sites

Should I Delete below files?

 

C:\windows\System32\Drivers\7b4tV3HOPXa.sys     detected: Trojan.GenericKD.46846801 (B) [krnl.xmd]

And also below deleted

C:\Users\sdmis\AppData\Local\Temp\jamesnew.exe -> (AutoIT Script) -> (unicode)     detected: AIT:Trojan.Nymeria.4747 (B) [krnl.xmd]
C:\Users\sdmis\AppData\Local\Temp\md3_3kvm.exe     detected: Trojan.GenericKD.37499169 (B) [krnl.xmd]
C:\Users\sdmis\AppData\Roaming\2821170.exe -> (Embedded 0)     detected: Trojan.Stealer.FL (B) [krnl.xmd]
 

Link to comment
Share on other sites

@SDM,

 

Please read the entire instructions below. Yes, they are a bit lengthy and contain necessary administrative instructions as well as technical instructions.

 

NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.

 

The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.

The below guidelines are for the Help, my PC is infected! Support Forum. They are intended to help you provide the technician, working your thread, with enough information to start formulating a plan to clean your machine; and for you to leave the Emsisoft Support Forums with a safe, secure, functioning computer.

  • Emsisoft does not condone the use of Pirated/Illegal software. If such software is found on your computer, the technician assisting you will insist that the Pirated/Illegal software be removed.
  • We insist that anyone receiving help, here at the Emsisoft Support Forums, install an Anti-Malware program at a minimum to protect their system.
  • Start only one thread requesting help. Keep all your questions in your thread. DO NOT start a new topic.
  • If you don't know, stop and ask! Don't keep going on.
  • Continue to respond until you are given "All Clear" (Just because you can't see a problem doesn't mean it isn't there)
  • Once your case has been solved, the thread will be closed.
  • Your thread will be closed after 72-hours of no activity.
  • DO NOT use any form of Haxor, Leetspeak, Netspeak, IM speak and such in any postings on this forum. Use only proper spelling, grammar, punctuation, and capitalization. The more time the person helping you has to spend trying to figure out what you are saying, the longer it will take them to formulate a response.
  • DO NOT post any logs without first completing the steps in this guide, they will be deleted.
  • DO NOT copy and paste logs into your threads. All logs are to be attached to your post.

Download to your Desktop:

 

NOTE: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

 

NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.

 

All scans are to be run in Normal Mode.

 

WARNING: The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

 

Let's get started:

 

  • Install and Run Emsisoft Emergency Kit (EEK):

 

IMPORTANT If you have Emsisoft Anti-Malware (EAM) Installed do not install and use EEK. Instead run a custom scan with EAM and provided the EAM Scan report.

    • Double click EmergencyKitScanner.exe to install EEK
    • When the installation of EEK is complete the Emergency Kit scanner will run. NOTE: Make sure to enable PUPs detection.
    • Click "Yes" to Update Emsisoft Emergency Kit
    • Under "Scan" click-on "Malware Scan". IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
    • Save the scan log somewhere that you can find it.
    • Exit Emsisoft Emergency Kit.
  • Run Farbar Recovery Scan Tool (FRST):
    • Double-click to run it. When the tool opens click Yes to the disclaimer. NOTE: DO NOT change any of the default settings. If you do we will just close your logs and ask for new ones ran with FRST's default settings.
    • Press the Scan button.
    • Farbar Recovery Scan Tool will produce the following logs:
      • FRST.txt
      • Addition.txt
  • Attach the following logs to your reply:
    • Emsisoft Emergency Kit log (C:\EEK\Reports)
    • FRST.txt
    • Addition.txt

 

IMPORTANT NOTE: Any logs that are copied and pasted to a post will be removed from the post without being read. Do not alter or change the logs in any way.

 

Link to comment
Share on other sites

 

Copy the below code to NotepadSave As fixlist.txt to your Desktop.

 

HKLM\SOFTWARE\Policies\Microsoft\Windows Defender: Restriction <==== ATTENTION
HKU\S-1-5-21-2124178159-2478543808-3343313784-1001\...\MountPoints2: {0b547bca-028f-11ec-a54e-a497b16b4640} - "F:\HiSuiteDownLoader.exe" 
HKU\S-1-5-21-2124178159-2478543808-3343313784-1001\...\MountPoints2: {0b547bfd-028f-11ec-a54e-a497b16b4640} - "F:\HiSuiteDownLoader.exe" 
GroupPolicy: Restriction ? <==== ATTENTION
Policies: c:\ProgramData\NTUSER.pol: Restriction <==== ATTENTION
HKLM\SOFTWARE\Policies\Google: Restriction <==== ATTENTION
Task: {0108D740-8999-4995-8D00-A138BD1A4A46} - System32\Tasks\HP\HP Support Assistant\sp113254 => C:\hpswsetup\sp113254\install.exe [15400 2021-05-01] (Access Denied)  [File not signed] (Access Denied) <==== ATTENTION
Task: {B384BD60-6A47-49B0-BA8E-19AC65900D03} - System32\Tasks\services64 => C:\Users\sdmis\AppData\Roaming\services64.exe <==== ATTENTION
Task: {DC0C4897-1F7A-4D99-9826-62F7BB0B9252} - \hkshHimgHc -> No File <==== ATTENTION"hxxp://search.imesh.net","hxxp://mysearch.avg.com/?cid={050554FA-6835-4C39-97BD-44E9A1D96A02}&mid=18b092b499054b999dfcb6a54c92a49d-daaafb875cbc96d7346284261264dc3353eec6a3&lang=en&ds=ad011&pr=sa&d=2013-06-19 09:32:36&v=15.3.0.10&pid=safeguard&sg=23&sap=hp","hxxp://mysearch.avg.com/?cid={050554FA-6835-4C39-97BD-44E9A1D96A02}&mid=18b092b499054b999dfcb6a54c92a49d-daaafb875cbc96d7346284261264dc3353eec6a3&lang=en&ds=ad011&pr=sa&d=2013-06-19 09:32:36&v=15.3.0.10&pid=safeguard&sg=0&sap=hp","hxxp://www.google.com","hxxp://www.default-search.net?sid=476&aid=128&itype=n&ver=13072&tm=399&src=hmp","hxxp://www.default-search.net?sid=476&aid=128&itype=a&ver=13337&tm=399&src=hmp","hxxp://rocket-find.com/?f=7&a=rckt_ir_14_29_ff&cd=2XzuyEtN2Y1L1QzutDtDtCzy0DtCyBtDyB0B0A0D0AtAtA0BtN0D0Tzu0SzytByCtN1L2XzutBtFtBtCtFtCyEtFyEtN1L1CzutCyEtBzytDyD1V1StN1L1G1B1V1N2Y1L1Qzu2StC0A0E0EtD0B0CtCtGyD0DzztAtGyBtD0EtCtG0AyB0F0AtGyCzyyCyBzyyB0ByC0EyD0Fzz2QtN1M1F1B2Z1V1N2Y1L1Qzu2StAzz0BtB0FzytDyBtG0DzzyE0DtG0CzytC0EtGtB0C0ByBtGyB0AtA0E0Azz0DyDyDtC0E0E2Q&cr=857237764&ir=","hxxp://websearch.allsearches.info/?pid=685&r=2014/10/05&hid=15583301489611313085&lg=EN&cc=IN&unqvl=64","hxxp://astromenda.com/?f=7&a=ast_ir_14_40_ch&cd=2XzuyEtN2Y1L1QzutDtDtCzy0DtCyBtDyB0B0A0DyEtByDyBtN0D0Tzu0StCtDtDzztN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1StN1L1G1B1V1N2Y1L1Qzu2SyE0DzztC0A0A0D0BtGtAyDtD0BtG0ByC0B0DtGyB0FtByEtGyD0AtB0F0Fzz0AtC0B0DtD0D2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0C0B0A0EtDtD0DyBtGtDzyzz0BtGyE0FyDtBtG0ByE0FtCtG0F0DyCzztC0DtA0B0B0DtD0D2Q&cr=883311839&ir=","hxxp://astromenda.com/?f=7&a=ast_ir_14_40_ch&cd=2XzuyEtN2Y1L1QzutDtDtCzy0DtCyBtDyB0B0A0DyEtByDyBtN0D0Tzu0StCtDtDzztN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyE0F0A0FtCyCzzyCtGzzyEzztCtG0A0D0C0AtGtCtC0BtAtGyB0BtAzz0D0B0EyE0B0DtD0D2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0C0B0A0EtDtD0DyBtGtDzyzz0BtGyE0FyDtBtG0ByE0FtCtG0F0DyCzztC0DtA0B0B0DtD0D2Q&cr=742290923&ir=","hxxp://astromenda.com/?f=7&a=ast_ir_14_40_ch&cd=2XzuyEtN2Y1L1QzutDtDtCzy0DtCyBtDyB0B0A0DyEtByDyBtN0D0Tzu0StCtDtDzztN1L2XzutAtFyDtFtCtFtBtN1L1CzutCyEtBzytDyD1V1TtN1L1G1B1V1N2Y1L1Qzu2SyE0F0A0FtCyCzzyCtGzzyEzztCtG0A0D0C0AtGtCtC0BtAtGyB0BtAzz0D0B0EyE0B0DtD0D2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0C0B0A0EtDtD0DyBtGtDzyzz0BtGyE0FyDtBtG0ByE0FtCtG0F0DyCzztC0DtA0B0B0DtD0D2Q&cr=742290923&uref=308&ir=","hxxp://istart.webssearches.com/?type=hp&ts=1414299264&from=adks&uid=WDCXWD1600AAJS-75M0A0_WD-WMAV3A05887958879","hxxp://websearch.searchoholic.info/?pid=2440&r=2015/01/05&hid=15583301489611313085&lg=EN&cc=IN&unqvl=72","hxxp://websearch.searchoholic.info/?pid=2440&r=2015/01/06&hid=15583301489611313085&lg=EN&cc=IN&unqvl=72","hxxp://websearch.searchoholic.info/?pid=2440&r=2015/01/07&hid=15583301489611313085&lg=EN&cc=IN&unqvl=72","hxxp://www.mystartsearch.com/?type=hp&ts=1426370868&from=wpc&uid=WDCXWD3200AAJS-22L7A0_WD-WCAV2D11200412004","hxxp://www.mystartsearch.com/?type=hp&ts=1439179040&z=0d434046751f2ad94ff7a8cg5zbcet8g3c4c5t4m9g&from=wpc&uid=WDCXWD3200AAJS-22L7A0_WD-WCAV2D11200412004","hxxp://in.yhs4.search.yahoo.com/yhs/web?hspart=iry&hsimp=yhs-fullyhosted_003&type=wncy_ir_15_33&param1=1&param2=f%3D7%26b%3DChrome%26cc%3Din%26pa%3DWincy%26cd%3D2XzuyEtN2Y1L1QzutDtDtCzy0DtCyBtDyB0B0A0DtAtCyByDtN0D0Tzu0StCtAtCyBtN1L2XzutAtFtCtBtFyDtFtAtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2SyC0FyE0C0CyE0EyEtGtCtDyE0EtG0D0BtByCtGtB0AzytBtGyEzyyEzyyD0C0FyDzyyCyBtC2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0C0FtAzyyDyC0DyEtG0CzytCyBtGyE0C0EtAtG0Azy0AyCtG0F0EtCtDtAtCyDtC0C0BzyyE2QtN0A0LzuyE%26cr%3D98691865%26a%3Dwncy_ir_15_33%26os%3DWindows%2B8.1%2BPro","hxxp://in.yhs4.search.yahoo.com/yhs/web?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_ir_15_33&param1=1&param2=f%3D7%26b%3DChrome%26cc%3Din%26pa%3DWinYahoo%26cd%3D2XzuyEtN2Y1L1QzutDtDtC0EtCtDtC0FtDtDtDtDtAtCyByDtN0D0Tzu0StCtAtBtBtN1L2XzutAtFtCtDtFtCtDtFtDtN1L1Czu1StN1L1G1B1V1N2Y1L1Qzu2SyEtDzyyD0C0C0AyDtGtDyCtC0AtGzztByByCtGtAyDyCtBtG0F0B0AyCtBzy0EzytDyCyEtA2QtN1M1F1B2Z1V1N2Y1L1Qzu2StCzytAyC0EtDtB0AtGzy0F0C0FtGyE0AtCtDtGzzyC0F0BtGtCyDtBtCyDtB0CtAzy0EtAyD2QtN0A0LzuyE%26cr%3D2043513736%26a%3Dwny_ir_15_33%26os%3DWindows 8.1 Pro","hxxp://www.google.co.in/","hxxp://d391tbweljugwk.cloudfront.net/?ts=AHEqBH8nAXYnCE..&v=20160606&uid=AB8CEB564AC852222AEAAC7E7E8125B1&ptid=wak&mode=loadm","hxxp://adrenalin.myadrenalin.com/aaap/index1.html","hxxps://adrenalin.myadrenalin.com/aaap/index1.html"
S2 pubgame-updater; C:\windows\PublicGaming\appsetup.exe [X] <==== ATTENTION
S3 WdNisSvc; "%ProgramFiles%\Windows Defender\NisSrv.exe" [X]
S4 WinDefend; "%ProgramFiles%\Windows Defender\MsMpEng.exe" [X]
S1 Xb1V5WU; \??\C:\Users\sdmis\AppData\Roaming\Xb1V5WU.sys [X]
2021-08-30 09:23 - 2021-08-30 09:23 - 000000000 ____D C:\windows\system32\%LOCALAPPDATA%
2021-08-29 19:59 - 2021-08-29 19:59 - 000000040 ____H C:\A7720AED8DF0
2021-08-29 19:44 - 2021-08-29 21:44 - 000000000 ____D C:\Program Files (x86)\PowerControl
2021-08-29 19:44 - 2021-08-29 21:16 - 000003270 _____ C:\windows\system32\Tasks\services64
2021-08-29 19:44 - 2021-08-29 19:44 - 000000273 _____ C:\Users\sdmis\Documents\UcOidexGzlfwOG4aQ0Jis17X.exe
2021-08-29 19:44 - 2021-08-29 19:44 - 000000223 _____ C:\Users\sdmis\Documents\x6bYPP69TcSmm2GeqhtMqtNn.exe
2021-08-29 19:44 - 2021-08-29 19:44 - 000000223 _____ C:\Users\sdmis\Documents\7CMg8MBxy6w29wLFYp80NGtM.exe
2021-08-29 19:44 - 2021-08-29 19:44 - 000000000 ____D C:\Users\sdmis\AppData\Local\AdvinstAnalytics
2021-08-29 19:44 - 2021-08-29 19:44 - 000000000 ____D C:\ProgramData\399IFA3OGI898SR6TU6R805CV
2021-08-29 19:40 - 2021-08-30 00:02 - 000000000 ____D C:\ProgramData\71
2021-08-29 19:40 - 2021-08-29 19:40 - 001564823 _____ C:\ProgramData\7187
2021-08-29 18:36 - 2021-08-30 00:02 - 000000000 ____D C:\ProgramData\62
2021-08-29 18:36 - 2021-08-29 18:36 - 001564823 _____ C:\ProgramData\6273
2021-08-29 18:17 - 2021-08-29 19:18 - 000000000 ____D C:\Users\sdmis\AppData\Roaming\hyperc
2021-08-29 18:17 - 2021-08-29 18:17 - 000000000 ____D C:\Users\sdmis\AppData\Roaming\Dioxin
2021-08-29 18:14 - 2021-08-30 00:02 - 000000000 ____D C:\ProgramData\44
2021-08-29 18:14 - 2021-08-29 18:24 - 006738528 ____N C:\windows\system32\Drivers\7b4tV3HOPXa.sys
2021-08-29 18:14 - 2021-08-29 18:14 - 001564823 _____ C:\ProgramData\4497
2021-08-29 18:00 - 2021-08-29 19:16 - 000000000 ____D C:\Users\sdmis\AppData\Local\08e81521-ff8a-475f-b33a-7fafbc9c0621
2021-08-29 18:00 - 2021-08-29 18:00 - 000000000 ____D C:\ProgramData\PIOHMWB2EMJVLKA7J8IYYDIXM
2021-08-29 18:00 - 2021-08-29 18:00 - 000000000 ____D C:\ProgramData\5RETQM2YCTPWBE33KBE2SMYCF
2021-08-29 17:59 - 2021-08-30 00:02 - 000000000 ____D C:\ProgramData\64
2021-08-29 17:59 - 2021-08-29 19:59 - 000000000 ____D C:\Users\sdmis\AppData\Local\d8fd4aad-e936-40e9-94d8-fb2ce6557a0a
2021-08-29 17:59 - 2021-08-29 17:59 - 001564823 _____ C:\ProgramData\6476
2021-08-29 17:59 - 2021-08-29 17:59 - 000000000 ____D C:\Users\sdmis\AppData\Local\Yandex
2021-08-29 21:17 - 2021-08-29 21:17 - 000000000 _____ () C:\Program Files (x86)\temp_files
Unlock: C:\windows\system32\config\SYSTEM
Unlock: C:\windows\system32\Drivers\7b4tV3HOPXa.sys
FirewallRules: [{1C5C1928-14EB-4A36-9513-ABCEA27AD30E}] => (Allow) C:\hp\Diagnostics\PSDR\HPDiagnosticCoreUI.exe => No File
FirewallRules: [{9BB61B28-9928-4B13-B297-9EF91C21E697}] => (Allow) C:\hp\Diagnostics\PSDR\HPDiagnosticCoreUI.exe => No File
C:\windows\System32\Drivers\7b4tV3HOPXa.sys
C:\Users\sdmis\AppData\Local\Temp\jamesnew.exe
C:\Users\sdmis\AppData\Local\Temp\md3_3kvm.exe
C:\Users\sdmis\AppData\Roaming\2821170.exe

 

Close Notepad.

 

NOTE: It's important that both files, FRST, and fixlist.txt are in the same location or the fix will not work.

 

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system

 

IMPORTANT: Save all of your work, as the next step may reboot your computer.

 

Run FRST and press the Fix button just once and wait.

 

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

 

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

 

NOTE: If the tool warns you about an outdated version please download and run the updated version.

 

Also, let me know how the machine is running now, and what remaining issues you've noticed.

Link to comment
Share on other sites

Thanks a lot for kind help. 

I have attached fixlog also for your kind review.

System is working fine except at startup it is taking bit too long time.

I will not be deleting any of the encrypted file (Extension with .lqqw).

As and when solution will be available at your end I will try to decrypt, till then I will wait.

I have also forwarded the details to cyber crime department in India for their information. I know nothing is  in their hand.

 

 

Fixlog.txt

Link to comment
Share on other sites

The malware driver has not removed.

Our recommendation is to save a backup of your encrypted files and keep it in a safe place in case decryption is possible at some point in the future.

 

Please review our Protection Guides at your leisure, they contain several tips on protecting your computer and data.

 

We also recommend keeping an eye on BleepingComputer's newsfeed, as they will usually report on new developments with ransomware decrypters: https://www.bleepingcomputer.com/

 

If you have an RSS feed reader, then they also have an RSS feed so that you don't have to manually check for news:
 

Run a fresh scan with FRST, attach the new FRST scan reports to your reply.

Link to comment
Share on other sites

Thread Closed

 

Reason: Lack of Response

 

PM either Kevin to have this thread reopened.

 

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on a system, other than the one they were written for, could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

 

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE if you don't we are just going to send you back to this thread

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...