Decrypt Files Encrypted by STOP Ransomware (Update October 2019)
THREAT REMOVAL

STOP Ransomware Decryptor – How to Decrypt Files (Updated)

1 Star2 Stars3 Stars4 Stars5 Stars (7 votes, average: 3.57 out of 5)
Loading...

Update October 2019. This is an article, created to explain how you can decrypt files, encrypted by STOP Ransomware virus.

STOP ransomware is the type of malware, whose main idea is to get users to pay ransom in the form of BitCoin to get their files back. Not all variants of this ransomware can be decrypted for free, but we have added the decryptor used by researchers that is often updated with the variants which become eventually decrypted. You can try and decrypt your files using the instructions below, but if they do not work, then unfortunately your variant of the ransomware virus is not decryptable.

STOPDecrypter (STOP Ransomware) – Update September 2019

As reported by Michael Gillespie, the operators of STOP ransomware have altered its code in newer versions. These changes make the way the decrypter work impossible, starting with .coharos, .gero, and .hese. Apparently, the cybercriminals started to utilize proper asymmetrical encryption, meaning the offline keys will no longer be valid for decryption after the release of the final keys Gillespie extracted.

The researcher is now working towards closing this decrypter, and continuing work on a new decrypter that will work only for the old versions of STOP (up to .carote). The new decrypter will completely replace STOPDecrypter once it’s released, and will work in a different way, the researcher said.

This version of STOPDecrypter currently works for .nuksus, .cetori, .carote, and .stare files. It is designed to support specific offline IDs, so it may not be effective for all occasions of the various iterations of the ransomware.

We will create another article with illustrated instructions when the new STOPDecrypter is released.

STOP Ransomware – More Information

Researchers have categorised STOP ransomware to be of several different variants.

  • The variant with the uppercase extensions.
  • The Puma variants of STOP.
  • The Djvu STOP variants.

The uppercase file extension variants only include uppercase extensions and they are a bit outdated, while the Puma and Djvu variants are relatively new ones as the Djvu variants of STOP ransomware being the latest viruses to hit the world.

How to Decrypt Your Files Encrypted by STOP Ransomware

To decrypt your files, first you need to download STOP Decryption tool (a.k.a. STOPDecrypter).

After the download, make sure to follow these steps:

Step 1) Extract the decrypter somewhere:

Step 2) Run it as an administrator:

Step 3) Click on “Select Directory” and then select a folder, where your important files are encrypted.

Step 4) Click on Decrypt and be patient. The software will return how many files were decrypted:

Remove STOP Ransomware

Be sure to only remove STOP once your files are decrypted. If the files are not decrypted, you should wait until security researchers update the decryptor to work for your variant. Until then, we strongly recommend that you backup your encrypted files and NOT pay the ransomware. Also, you can try and get some of your files back by following the alternative recovery instructions underneath. They are no guarantee that you will get all your files back, but with their help, you could restore at least some of the files.

To remove STOP ransomware, you should follow the first two steps. If they do not work, then try to remove this virus automatically with an advanced anti-malware software. Such software is often the preffered removal method, since it aims to detect an delete all STOP files plus remove them.

Avatar

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

46 Comments

  1. AvatarSathiyan

    Hi Ventsislav,

    My system had been attacked by .rectot ransomeware, last week. The files are encrypted. I have tried STOPDecryptor, but the decryption was denied due to no keys available for the following ID.

    pxWoC3VofRIj9qm3EywMcSZCrdOHVULWFqGvjJKp

    Can you please help me to retrieve my files

    Reply
    1. AvatarVentsislav Krastev (Post author)

      Hello, for the moment there are only about 30 decryption keys in the decrypter. Backup your files and wait for the decryptor to be updated. It usually gets updated every 10 days or so.

      Reply
  2. AvatarHugo

    Hola Ventsislav,

    Mi sistema fue atacado por ransomware .rezuc, hace dos dias. Los archivos están encriptados. He probado con STOPDecryptor, pero el descifrado fue denegado
    ID :
    sAkrsf5GtCegelujc1BiEbEIXc7mBBFkWliJgYI0 (.rezuc )

    Reply
    1. AvatarMilena Dimitrova

      Hi Hugo,

      The reason may be that the tool is designed to support specific offline IDs, so it may not be effective for all occasions of .rezuc ransomware infections.

      Reply
  3. AvatarMz Islam

    Hello

    I have attacked by .stone malware.Any update on it.

    Reply
  4. AvatarKadek Doni

    hallo, saya terkena serangan rezuc sudah saya hapus virus dan sudah saya dekrip menggunakan STOPDecrpter tapi masih tidak bisa,
    [!] No keys were found for the following IDs:
    [*] ID: WGilpyyKEdCsZtqgJQJDyZFDZRJLgqXkDt2Cn1bI (.rezuc )

    Reply
  5. AvatarJuan

    QTxwfONh4EEd3XUaSKGlJAa6gnc1qExRkDAfc8Il (.rezuc )

    Reply
    1. AvatarMilena Dimitrova

      Hi Juan,

      Did you try using the decrypter? It may be able to partially decrypt some of your files.

      Reply
      1. AvatarFernando Calderon

        Milena Dimitrova, te funcionó con el descifrador?

        También estoy siendo afectado por el . rezuc

        Ojalá pueda existir alguna solución.

        Reply
  6. AvatarDana Marsetiya Utama

    hello sir, please help me. my PC was atack .rezuc 2 week ago . i have used stop decrypter. unfortunately, it is not success. please help me
    [!] No keys were found for the following IDs:
    [*] ID: cn00hmtMuQnAXDeGdCAxRRCtIxPnEe67zYAIErey (.rezuc )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: FC:3F:DB:39:E1:5B, 60:6D:C7:F7:DB:09, 62:6D:C7:F7:DB:09, 62:6D:C7:F7:D3:09, 60:6D:C7:F7:DB:0A
    This info has also been logged to STOPDecrypter-log.txt

    Reply
  7. AvatarSagar Girme

    No key found for
    ID: 094KJASHd743dfg76fdfN3In9TaUitalymIQE7m8wG5kr5CVBqn1uAC1eHMt
    Kindly help me get the key as my all imp data hsa been encypted .
    Thanks
    Sagar

    Reply
  8. AvatarJoaquín

    Saludos, fui atacado por el .lanset desde el 3 de junio, voy a seguir las indicaciones y comento como me fue

    Reply
  9. AvatarAther Saeed

    Dear Sir,
    My PC attacked my vesad Ransomware yesterday. I have used stopdecrypter but No If found show and still waiting to recover my data. Can you please help me in this matter

    Reply
  10. AvatarMax

    buenas tardes yo tengo un problema con un virus que me encripto los documentos con un .lanset y la aplicación manda esto:

    No key for ID: MgAeYiYcERnWXoMBuAtbMk00jMzQo30bPiDS5b7G (.lanset )
    Unidentified ID: MgAeYiYcERnWXoMBuAtbMk00jMzQo30bPiDS5b7G (.lanset )
    MACs: F0:4D:A2:6E:0F:BE, 8C:A9:82:21:28:48, 00:0D:F0:90:8E:3A

    ojala me pudieran ayudar

    Reply
  11. Avataryounes

    Mon système avait été attaqué par .boston ransomware. Les fichiers sont chiffrés. J’ai essayé STOPDecryptor, mais le décryptage a été refusé en raison d’aucune clé disponible pour l’ID suivante.

    [-] No key for ID: h7sKicaMLw9rahE9B05UJhximTsaRjBTjpug3GYj (.boston )

    [!] No keys were found for the following IDs:
    [*] ID: h7sKicaMLw9rahE9B05UJhximTsaRjBTjpug3GYj (.boston )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: DC:A9:71:6C:FF:ED, E8:03:9A:16:3E:7C
    This info has also been logged to STOPDecrypter-log.txt

    Pouvez-vous s’il vous plaît aidez-moi à récupérer mes fichiers

    Reply
  12. Avataryounes

    My system was attacked by .boston ransomware. The files are encrypted. I tried STOPDecryptor, but the decryption was denied due to no key available for the next ID.

    [-] No key for ID: h7sKicaMLw9rahE9B05UJhximTsaRjBTjpug3GYj (.boston )
    [!] No keys were found for the following IDs:
    [*] ID: h7sKicaMLw9rahE9B05UJhximTsaRjBTjpug3GYj (.boston )
    Please archive these IDs and the following MAC addresses in case of future decryption:
    [*] MACs: DC:A9:71:6C:FF:ED, E8:03:9A:16:3E:7C

    This info has also been logged to STOPDecrypter-log.txt
    Can you please help me recover my files

    Reply
    1. AvatarMilena Dimitrova

      Hi younes,

      You can learn more about the .boston ransomware from this article: https://sensorstechforum.com/remove-boston-ransomware/

      Reply
  13. AvatarTA

    my system is effected by phobos ransome ware, is there any file Decryptor available.

    Reply
  14. Avatardejan

    my pc is attack with lanset file, nothing help can you help me ? its from stop decriptor
    [+] Loaded 59 offline keys
    Please archive the following info in case of future decryption:
    [*] ID: OhAKRb0PtyEIJpbtKYWv4vB7W9OBJMKx0IeExn1X
    [*] MACs: 00:1F:16:CF:F4:15, 02:00:4C:4F:4F:50, 12:17:C4:B6:19:EC, 22:17:C4:B6:19:EC, 00:17:C4:B6:19:EC
    This info has also been logged to STOPDecrypter-log.txt

    Reply
  15. AvatarDhanushka Wanasinghe

    Thank you so much. And It worked for .muslat extension. That was a headache for me. I tried with so many tools but , I wonder this tool worked for me. I recommend this for all you get infected by this shit.

    Reply
  16. Avatarcironi

    My files infected ransomware extension .poret ,can you help me please! Thanks.

    Your personal ID:
    096Asudh743uifdgdRqM2r84mfpJgkHbqoXhpXKlMf0TqRIzRBGBEGUs7

    Reply
    1. AvatarMilena Dimitrova

      Hi cironi,

      You can learn more about the ransomware from this article: https://sensorstechforum.com/remove-poret-files-virus/

      Reply
  17. Avatarcironi

    No key for ID: RqM2r84mfpJgkHbqoXhpXKlMf0TqRIzRBGBEGUs7 (.poret )
    Unidentified ID: RqM2r84mfpJgkHbqoXhpXKlMf0TqRIzRBGBEGUs7 (.poret )
    MACs: 74:D0:2B:2C:9C:FF

    Reply
  18. AvatarESTEBAN

    hola, tuve un problema con este virus ransomware, me ataco y el codigo es .NOVASOF Y .BOPADOR POR FAVOR NECESITO AYUDA CON ESTE CODIGO 27/07/2019

    Reply
  19. Avataresmael zabeti

    si vous avez pour rabbit4444 ransomware
    merci

    Reply
    1. AvatarMilena Dimitrova

      Hi esmael,

      Here you can read more about the ransomware: https://sensorstechforum.com/rabbit4444-files-virus-remove/

      Reply
  20. Avatarrahul

    my system has an ransomware .nelasod it affected all my file
    please help to recover my file

    Reply
  21. Avatarcabinas321smile@hotmail.com

    hola buenas noches , no me deja descargar el desifrador porq me lleva a una pagina supuestamente con virus ,

    Reply
  22. AvatarFerianto Suharta

    Hi, Ransomware attacked my PC since May 2019,
    with file .dotmap

    please help with my data below
    Your personal ID:
    085Asdhih8743yisdfFDP0I4Kof9HLwaMcp08ggr7wfX4fUKFU2w44erdoao

    Reply
  23. AvatarZvonimir

    My files infected ransomware extension .masodas,can you help me please! Thanks.

    Your personal ID:
    151hTdLhhG9q7dhPXHvumM8FJyRGQTefDCsNbGBlCVaarWqYPh

    Reply
  24. AvatarMo

    MACs: 14:D6:4D:49:98:5F, 14:D6:4D:49:98:58, 14:D6:4D:49:98:5D
    —————————————-
    STOPDecrypter v2.1.0.24
    OS Microsoft Windows NT 6.2.9200.0, .NET Framework Version 4.0.30319.42000
    —————————————-

    No key for ID: 9FUPqXCTh4PsEHaQqDRBffLRxXm5RoDjeOezmnUZ (.todar )
    Unidentified ID: 9FUPqXCTh4PsEHaQqDRBffLRxXm5RoDjeOezmnUZ (.todar )
    MACs: 14:D6:4D:49:98:5F, 14:D6:4D:49:98:58, 14:D6:4D:49:98:5D
    Decrypted 0 files, skipped 2

    Reply
  25. AvatarInfected with kovasoh virus

    I have been infected with kovasoh virus, BTCWare Ransom v4 AES256 this variant, can you help me with a decoder?
      ID: JDBXLVkzA4eGCuvOSS4tI5XREH3polEkLc5SvOwf (.kovasoh)
      MACs: E0: D5: 5E: 43: 23: B8

    Reply
    1. AvatarMilena Dimitrova

      Hi there,

      You can find the decryption tool and instructions in this article: https://sensorstechforum.com/remove-kovasoh-virus-restore-files/
      Note that the tool is designed to support specific offline IDs, so it may not be effective for all occasions of Kovasoh infections.

      Reply
  26. AvatarHans

    J’ai été infecté par .masok j’ai essayé plusieurs applications sans succès.
    Mais ce descripteur a marché pour moi. sincèrement Merci.

    Reply
  27. Avatarcleidy piña loayza

    Mis archivos de extensión .masodas ransomware infectados,Puedes ayudarme por favor! Gracias.
    personal ID:
    151hTdLhhGzOg9XSTKCdP8dlxNwj7ULfkJ9uqCPwpe9DLsEjQc

    Reply
  28. AvatarTharaka

    .vesrato ransomware was attacked to my computer in last month to my PC. I have tried with the stop Decryption tool
    [+] File: F:\Doc\Civil 3D\New folder\Drawing2.dwg.vesrato
    [-] No key for ID: NuDpRNOvOrnKJCAMBJPpHAF0vqKYPRBQvoD0JeLh (.vesrato

    Please Help

    Reply
  29. AvatarThildder

    Como descriptografar arquivos criptografados pelo MOKA vírus.

    Reply
  30. Avataredu

    He sidi atacado por .nesa. Ojalá se pueda conseguir la llave.
    Luego de que STOPDECRYPTER descifra algun archivo, en que carpeta los guarda?
    muchas gracias!!

    Reply
  31. Avataredu

    He sido atacado por .nesa. Ojalá se pueda conseguir la llave.
    Luego de que STOPDECRYPTER descifra algun archivo, en que carpeta los guarda?
    muchas gracias!!

    Reply
    1. AvatarMilena Dimitrova

      Hi edu,

      Unfortunately, currently there is no way to decrypt .nesa files, as there’s no official decrypter released.

      Reply
  32. Avatarbrijesh

    Hi Ventsislav,

    My system had been attacked by .format ransomeware, last week. The files are encrypted. I have tried STOPDecryptor, but the decryption was denied due to no keys available for the following ID.

    wE4qoa9XX5bmrO7tLy2qD5ruqlU5ILgJ1FgMJpR1 (.format )

    CjJKpan you please help me to retrieve my files

    Reply
  33. AvatarVentsislav Krastev (Post author)

    Hello Brijesh,

    It seems that your keys are not the same as the ones in the decryptor. You should backup the files and keep trying since the STOP Decrypter gets regularly updated by the researcher who made it as newer STOP virus variants come out. In the meantime, you can also try restoring your files using the following alternative file recovery solutions: https://sensorstechforum.com/restore-files-encrypted-ransomware-without-decryptor/

    Reply
  34. AvatarChristian

    Primero que todo, junto con saludarlos, felicito a los creadores y usuarios de este foro.
    Hace 3 días he sido infectado con ransomware que encripto todos mis archivos y los dejo con terminación .noos
    Me pueden ayudar a desencriptar archivos?

    Saludos y gracias

    Reply
  35. AvatarSalvador

    Hola Ventsislav,

    Mi sistema había sido atacado por ransomware .kuub, la semana pasada. Los archivos están encriptados. He tratado STOPDecryptor, pero el descifrado fue denegado debido a ninguna tecla para el siguiente ID.

    No key for ID: lwJVH8irj7rWDbGSaO5YsIFmPMmC3IXilgKuTAsQ (.kuub )

    ¿Me podría ayudar a recuperar mis archivos

    Reply
  36. AvatarSalvador

    Mi sistema había sido atacado por ransomware .kuub, la semana pasada. Los archivos están encriptados. He tratado STOPDecryptor, pero el descifrado fue denegado debido a ninguna tecla para el siguiente ID.
    ID: lwJVH8irj7rWDbGSaO5YsIFmPMmC3IXilgKuTAsQ (.kuub )

    Reply
  37. Avatarisabelita

    ayuda con virus que coloca los archivos con extensión kuub como lo desencripto por favor id UmeMQWLA2nQkz7EUDJ8gkBbwe0Zzs2VRHzMKSrM7

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...