Jump to content

damaged files


Recommended Posts

Hello @MBR,

Let's make sure of what we're dealing with. Please copy/paste all lines of the results of this test into a reply to this email if you need further help.

Please visit the following website and upload both an encrypted file (between 256KB and 2MB in size would be best) and a ransom note simultaneously for proper identification, and send me the information it provides:


Please be sure to read the information link on the results page, as whether we have a decrypter or not. Sometimes someone else's decrypter is listed, or other information is available that might be useful for recovery.

While it is very rare that it helps, you might try undelete software, or if your files are very important it may be worth talking to a company that specializes in ransomware negotiation, and will communicate in your behalf with the criminals that created the ransomware.

Exercise a bit of caution when looking for a company to help, though. Generally speaking, if a company claims to be able to decrypt files that were encrypted by a type of ransomware for which no decryption tool is publicly available, that company is probably just going to pay the ransom and charge you more than you would have paid if you had dealt with the criminals directly. Better is to search for companies who specialize in ransomware negotiation.

If the identification process shows a ransomware that is not decryptable, there is nothing else we can do. We do not recommend paying the ransom unless there is absolutely no other choice.

Link to comment
Share on other sites

@adjiif our decryption tool could not decrypt your files, then they cannot be decrypted without paying the ransom.

Reinstalling your OS will do nothing about your encrypted files.  If fact, reinstalling Windows in some cases will make it impossible to recover the encrypted files.  That is not the case with the case with STOP(DJVU).

Link to comment
Share on other sites


That file extension RUGJ is used by STOP(DJVU). Unfortunately, we no longer have any method to decrypt STOP(DJVU) unless the encryption occurred before the 29th of August 2019.

Please refer to this blog post for information about a decrypter that may work, and also for support instructions if it does not: https://blog.emsisoft.com/en/34375/emsisoft-releases-new-decryptor-for-stop-djvu-ransomware/

I understand it is frustrating, but currently, we cannot decrypt files that we do not have the Private Encryption Key in our Database.


There's the possibility that law enforcement may be able to catch the criminals and release their database of private keys, meaning that you could try again using the tool in few weeks in case something changed.


We do not recommend paying the ransom unless there is absolutely no other choice. 22% of those who paid a ransom never got access to their data. 9% said they got hit with additional ransom demands after paying. We’re talking about criminals, after all.


Our recommendation is to save a backup of your encrypted files and keep it in a safe place in case decryption is possible at some point in the future.


Please review our Protection Guides at your leisure, they contain several tips on protecting your computer and data.


We also recommend keeping an eye on BleepingComputer's newsfeed, as they will usually report on new developments with ransomware decrypters: https://www.bleepingcomputer.com/


If you have an RSS feed reader, then they also have an RSS feed so that you don't have to manually check for news: https://www.bleepingcomputer.com/feed/


Please consider subscribing to a reliable anti-malware application to avoid similar issues in the future.


You can get our full version of Emsisoft Anti-Malware here: https://www.emsisoft.com/en/pricing/


I know it’s a big loss for you. We are glad to offer this service for free and help as much as we can, but there is not always an immediate resolution for all the cases.

Link to comment
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...