VIRUS RAMSONWARE ZIPE

 me infecto la pc y no puedo ver mis archivos.  por favor!!! necesito recuperarlos . gracias espero una respuesta saludos.
This may be a new variant of STOP (DJVU) Ransomware. The malware developers have been consistent on using 4-letter extensions since switching to the New STOP Djvu variants.

Did you find any ransom notes? If so, what is the actual name of the ransom note?
Can you provide (copy & paste) the ransom note contents in your next reply?

The best way to identify the different ransomwares is the ransom note (including it's actual name and contents), samples of the encrypted files, any obvious extensions appended to the encrypted files, possible filemarkers, the malware file itself responsible for the infection and information related to any email addresses or hyperlinks provided by the cyber-criminals to request payment.

You can submit (upload) samples of encrypted files, ransom notes and any contact email addresses or hyperlinks provided by the malware developer to ID Ransomware (IDR) or Emsisoft Website for assistance with identification and confirmation of the infection. This is a service that helps identify what ransomware may have encrypted your files, whether it is decryptable and then attempts to direct you to an appropriate support topic where you can seek further assistance. ID Ransomware can identify ransomwares which adds a prefix instead of an extension and more accurately identifies ransomwares by filemarkers if applicable so try that first. Uploading both encrypted files and ransom notes together along with any contact email addresses or hyperlinks provided by the criminals gives a more positive match with identification and helps to avoid false detections.

Please provide a link to the ID Ransomware results.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Unified Network of Instructors and Trusted Eliminators (Malware Removal Expert)

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

hola buenos dias aca encontre una

ATTENTION!


Don't worry, you can return all your files!

All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.

The only method of recovering files is to purchase decrypt tool and unique key for you.

This software will decrypt all your encrypted files.

What guarantees you have?

You can send one of your encrypted file from your PC and we decrypt it for free.

But we can decrypt only 1 file for free. File must not contain valuable information.

You can get and look video overview decrypt tool:

https://we.tl/t-gSEEREZ5tS

Price of private key and decrypt software is $980.

Discount 50% available if you contact us first 72 hours, that's price for you is $490.

Please note that you'll never restore your data without payment.

Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.



To get this software you need write on our e-mail:

*** Email address is removed for privacy ***


Reserve e-mail address to contact us:

*** Email address is removed for privacy ***


Your personal ID:

0228OIdshyeFAax9CY0arsgLy3LgUn8TRVCkfDKCjnplRHM6qGD6

1 person found this reply helpful

·

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Please read the first page (Post #1) of the STOP Ransomware (.STOP, .Puma, .Djvu, .Promo, .Drume) Support Topic AND these FAQs for a summary of this infection, it's variants, any updates and possible decryption solutions using the Emsisoft Decryptor.

There no longer is an easy method to get OFFLINE KEYS for many of these newer variants and no way to decrypt files if infected with an ONLINE KEY without paying the ransom and obtaining the private keys from the criminals who created the ransomware. Emsisoft can only get OFFLINE KEYS AFTER a victim has PAID the ransom, receives a key and provides it to them. This means if infected with an ONLINE KEY, we cannot help you decrypt files since there is no way to gain access to the criminal's command server and retrieve this KEY. Emsisoft has obtained and uploaded to their server OFFLINE KEYS for the following new STOP (Djvu) variants....gero, .hese, .seto, .peta, .moka, .meds, .kvag, .domn, .karl, .nesa, .noos, .kuub, .reco, .bora, .nols, .werd, .coot, .derp, .meka, .toec, .mosk, .lokf, .peet, .grod, .mbed, .kodg, .zobm, .msop, .hets, .righ, .mkos, .nbes, .reha, .topi, .repp, .alka, .nppp, .npsk, .opqz, .mado, .covm as noted in Post #9297 and elsewhere in the support topic.

** If there is no OFFLINE KEY for the variant you are dealing with OR if it is one of the newer STOP (Djvu) variants which used an ONLINE KEY, we cannot help you unless an OFFLINE KEY is retrieved and added to the Emsisoft server / decryptor. For now, the only other alternative to paying the ransom, is to backup/save your encrypted data as is and wait for a possible future solution.

** If an OFFLINE KEY is available for the variant you are dealing with and your files were not decrypted by Emsisoft Decryptor, then you most likely were encrypted by an ONLINE KEY and those files are not recoverable since they are not decryptable unless you pay the ransom. ONLINE ID's for new STOP (Djvu) variants are not supported by the Emsisoft Decryptor. If infected with an ONLINE ID, the Emsisoft Decryptor will indicate this under the Results Tab and note the variant is impossible to decrypt.

When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in the above support topic and victims will receive notification if subscribed to it.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Unified Network of Instructors and Trusted Eliminators (Malware Removal Expert)

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

ESTOY MUY TRISTE POR LO QUE PASO, GRACIAS POR EL APORTE. SALUDOS

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

De nada.
Windows Insider MVP 2017-2020
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015
Unified Network of Instructors and Trusted Eliminators (Malware Removal Expert)

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

 
 

Question Info


Last updated September 30, 2020 Views 316 Applies to: