Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

STOP Ransomware (.STOP, .Puma, .Djvu, .Promo, .Drume) Help & Support Topic


  • Please log in to reply
9960 replies to this topic

#9946 KhaledMaher

KhaledMaher

  • Members
  • 4 posts
  • OFFLINE
  •  

Posted 26 March 2020 - 06:04 AM

Thanks , i know that i can't now but i mean if i installed and a windows and saved the data can i recover it when the make a decryption for it ? 

My files is encrypted with NPS (DJVU)


Edited by KhaledMaher, 26 March 2020 - 06:06 AM.


BC AdBot (Login to Remove)

 


#9947 cybercynic

cybercynic

  • Members
  • 1,737 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edge of Tomorrow
  • Local time:03:10 AM

Posted 26 March 2020 - 06:14 AM

Thanks , i know that i can't now but i mean if i installed and a windows and saved the data can i recover it when the make a decryption for it ? 

My files is encrypted with NPS (DJVU)

nps??  Do you mean .npsk?

 

If so,that is one of the latest STOP variants, and there is currently no solution for it.

You can save the encrypted files and the ransom note and re-install Windows. You will still be able to decrypt the files if a solution becomes available.

 

Check the c: drive for the SystemID/PersonalID.txt file. It contains all of the ID's used in the encryption.

If one of the ID's listed therein ends in 't1', you should be able to decrypt some of your files WHEN or IF Emsisoft recovers the offline/private key for this variant.

If none of the ID's listed therein end in 't1', ALL of your files were encrypted by an online key and cannot be recovered.


An Ounce of Prevention is Worth a Pound of Cure


#9948 cybercynic

cybercynic

  • Members
  • 1,737 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edge of Tomorrow
  • Local time:03:10 AM

Posted 26 March 2020 - 06:36 AM

Dear Respected members any solution of .ooss variant offline key solution will be highly appreciated 

The offline key for this variant has not yet been recovered by Emsisoft.

Suggest you run the Emsisoft decrypter on a test bed of files every week or so to check if it has. The recovery of keys is not announced by Emsisoft.


An Ounce of Prevention is Worth a Pound of Cure


#9949 KhaledMaher

KhaledMaher

  • Members
  • 4 posts
  • OFFLINE
  •  

Posted 26 March 2020 - 09:09 AM

  s


Edited by KhaledMaher, 26 March 2020 - 09:10 AM.


#9950 KhaledMaher

KhaledMaher

  • Members
  • 4 posts
  • OFFLINE
  •  

Posted 26 March 2020 - 09:11 AM

 

Thanks , i know that i can't now but i mean if i installed and a windows and saved the data can i recover it when the make a decryption for it ? 

My files is encrypted with NPS (DJVU)

nps??  Do you mean .npsk?

 

If so,that is one of the latest STOP variants, and there is currently no solution for it.

You can save the encrypted files and the ransom note and re-install Windows. You will still be able to decrypt the files if a solution becomes available.

 

Check the c: drive for the SystemID/PersonalID.txt file. It contains all of the ID's used in the encryption.

If one of the ID's listed therein ends in 't1', you should be able to decrypt some of your files WHEN or IF Emsisoft recovers the offline/private key for this variant.

If none of the ID's listed therein end in 't1', ALL of your files were encrypted by an online key and cannot be recovered.

 

yes i mean npsk 

sorry my bad 

thanks for the effort brother i will do everything you told me to keep the files 



#9951 eliran2211

eliran2211

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted 26 March 2020 - 10:20 AM

my files has been encrypted 

my files ends with .bora and i have STOP(djvu)

the files has beed attacked after Aug-19.

 

my personal ID is: 0171mHffOtTbf3PbgQGquFQVoR0mkyWiQOrwHUTxfL86gXCOe

there is any solution for now or will be some ?

 

Thanks,

Eliran


Edited by eliran2211, 26 March 2020 - 10:33 AM.


#9952 cybercynic

cybercynic

  • Members
  • 1,737 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edge of Tomorrow
  • Local time:03:10 AM

Posted 26 March 2020 - 03:19 PM

my files has been encrypted 

my files ends with .bora and i have STOP(djvu)

the files has beed attacked after Aug-19.

 

my personal ID is: 0171mHffOtTbf3PbgQGquFQVoR0mkyWiQOrwHUTxfL86gXCOe

there is any solution for now or will be some ?

 

Thanks,

Eliran

Your personal ID indicates that you have files encrypted by an online key. However, the personal ID from the ransom note is not always a reliable indicator of what key(s) the files were encrypted with.

 

Check the C: drive for the SystemID/PersonalID.txt file. It contains all of the ID's involved in the file encryption.

If one of the ID's listed therein ends in 't1', you should be able to recover at least SOME of your files by running the Emsisoft decrypter.

If none of the ID's listed therein end in 't1', ALL of your files were encrypted by an online key and cannot be recovered.


An Ounce of Prevention is Worth a Pound of Cure


#9953 kahono

kahono

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:10 PM

Posted 27 March 2020 - 02:17 AM

 

Hello
 
I need your help understanding if I expect or throw away the files. From what I've read, files encrypted with .moka with the end of the t1 key can decrypt. It turns out that in PersonalID.txt, 3 keys appear: t6U1Ca26o7X4bbydPJjznf7q056rKRcxdf7E9wOp
pXOWwMb75Hnuc4gdNXMEBPuk9J38RTu7hziEXxO2
eXTnrcF7c7WG6gyLVibdj4JhwF6wcxk8i4YV81t1
 
When I scan with STOPDecrypter, I get the following: +] File: C: \\ Desktop \ logo skymovie.mp4.moka
[-] No keys for ID: pXOWwMb75Hnuc4gdNXMEBPuk9J38RTu7hziEXxO2 (.moka).
 
As it turns out in O2, the files were encrypted with an online key ???
 
Thank you for your response and your tireless work.
 
PS: I scanned with decrypter_2 and gave no result.

 

Please help me.
my image file was hit by a virus, all the image files changed to .jpg.npsk
how to clean viruses and restore files
key id: pxJpJxVUeVQZvWYy5vi1QCmLK2TliuQbmsHlgZtH

 

 

Hello
 
I need your help understanding if I expect or throw away the files. From what I've read, files encrypted with .moka with the end of the t1 key can decrypt. It turns out that in PersonalID.txt, 3 keys appear: t6U1Ca26o7X4bbydPJjznf7q056rKRcxdf7E9wOp
pXOWwMb75Hnuc4gdNXMEBPuk9J38RTu7hziEXxO2
eXTnrcF7c7WG6gyLVibdj4JhwF6wcxk8i4YV81t1
 
When I scan with STOPDecrypter, I get the following: +] File: C: \\ Desktop \ logo skymovie.mp4.moka
[-] No keys for ID: pXOWwMb75Hnuc4gdNXMEBPuk9J38RTu7hziEXxO2 (.moka).
 
As it turns out in O2, the files were encrypted with an online key ???
 
Thank you for your response and your tireless work.
 
PS: I scanned with decrypter_2 and gave no result.

 

 



#9954 NikkoAndIssues

NikkoAndIssues

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:10 PM

Posted 27 March 2020 - 05:04 AM

Hey their, Im glad to know that im not the only one facing this situation. Just to open up my fathers important documents have been turned to or been encrypted into this opqz. type of file any luck I can still recover it? any possibilities?

 



#9955 cybercynic

cybercynic

  • Members
  • 1,737 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edge of Tomorrow
  • Local time:03:10 AM

Posted 27 March 2020 - 06:55 AM

Hey their, Im glad to know that im not the only one facing this situation. Just to open up my fathers important documents have been turned to or been encrypted into this opqz. type of file any luck I can still recover it? any possibilities?

 

.opqz is the latest STOP ransomware variant and is not currently decryptable.

 

READ the very first post in the STOP ransomware topic for complete information on STOP and decryption possibilities.


An Ounce of Prevention is Worth a Pound of Cure


#9956 heromen

heromen

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:11:40 AM

Posted 27 March 2020 - 04:28 PM

plz help me...plz help me :bowdown: :bowdown: :bowdown:

 

.stone

 

Unable to decrypt Old Variant ID: Uyw8CN9pry1vJ3PgnFClnjWiu4G7LGClVo6VyRvI

 

need all photo plz help to recovery photo file :bowdown: :bowdown: :bowdown:

 

 

My English is not good :( :( :(
 
plz see to photo

 

http://uupload.ir/files/so3i_stone_info.jpg


Edited by heromen, 27 March 2020 - 04:35 PM.


#9957 rjrage

rjrage

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:10 PM

Posted Yesterday, 05:01 AM

Extension: .opqz

Physical Address: E0-B9-A5-68-64-D9

Personal ID: 0216OIWojlj48bWfZNVj3frlFlxu2UmbR0fIpuFnKhRIelpgqy5rp



#9958 quietman7

quietman7

    Bleepin' Gumshoe

  • Topic Starter

  • Global Moderator
  • 56,401 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:03:10 AM

Posted Yesterday, 05:57 AM

.opqz is the newest variant....there is no OFFLINE KEY available to decrypt your files.  Please read the first page (Post #1) of this topic.


.
.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#9959 cybercynic

cybercynic

  • Members
  • 1,737 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Edge of Tomorrow
  • Local time:03:10 AM

Posted Yesterday, 02:43 PM

plz help me...plz help me :bowdown: :bowdown: :bowdown:

 

.stone

 

Unable to decrypt Old Variant ID: Uyw8CN9pry1vJ3PgnFClnjWiu4G7LGClVo6VyRvI

 

need all photo plz help to recovery photo file :bowdown: :bowdown: :bowdown:

 

 

My English is not good :( :( :(
 
plz see to photo

 

http://uupload.ir/files/so3i_stone_info.jpg

You need to submit matched original/encrypted file pairs to the Emsisoft submission portal for each file type you need to recover. You then run the Emsisoft decrypter.

 

READ this article first: https://www.bleepingcomputer.com/news/security/stop-ransomware-decryptor-released-for-148-variants/


An Ounce of Prevention is Worth a Pound of Cure


#9960 Omarmuhamed

Omarmuhamed

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:09:10 AM

Posted Yesterday, 06:13 PM

Hello.

my pc has encrepted with lanset extention 9 month ago please any could help me to recover my graduation project

+ i try stopdecreptor and doesn't work

+ i add an infected photo

 

 

 

 

 

[-] No key for ID: UG5BTeVUI2M58LZZHhTrx0FOosTEUBucQDUfayEh (.PNG )
 
Decrypted 0 files!
Skipped 2 files.
 
[!] No keys were found for the following IDs:
[*] ID: UG5BTeVUI2M58LZZHhTrx0FOosTEUBucQDUfayEh (.jpg )
[*] ID: UG5BTeVUI2M58LZZHhTrx0FOosTEUBucQDUfayEh (.PNG )
Please archive these IDs and the following MAC addresses in case of future decryption:
[*] MACs: CC:AF:78:78:59:72, DC:0E:A1:EC:C7:BD, CC:AF:78:78:59:72, C0:18:85:F0:40:C8

Edited by Omarmuhamed, Yesterday, 06:15 PM.





23 user(s) are reading this topic

0 members, 23 guests, 0 anonymous users