Meds Virus Ransomware (.meds File) - Remove + Restore Data
THREAT REMOVAL

Meds Virus (.meds File) – How to Remove + Restore Data

What is the Meds Virus? How to open Meds Virus files? How to remove Meds Virus (STOP Ransomware)? How to try and restore Meds Virus files?

Update October 2019. The Meds virus (.meds file) is the name of a ransomware infection that belongs to the “STOP Ransomware” virus family. The Meds virus (.meds file) aims to enter your computer unnoticed and then encrypt your files and set the Meds virus extension to be added to them. The main idea behind this is for the Meds virus to get you to pay hundreds of dollars in BitCoin. Read this article to learn how to remove Meds virus from your computer and how to try and restore .meds files, encrypted by it.

Threat Summary

NameMeds Virus
TypeRansomware, Cryptovirus
Short DescriptionA virus that is a STOP Ransomware variant. Aims to encrypt your files and extort you into paying ransom to get your files to work.
SymptomsFiles have the Meds Virus extension. A ransom note, called _readme.txt is also added.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by Meds Virus

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Meds Virus.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Meds Virus – How Did I Get It and What Does It Do?

The so-called Meds virus also known as .meds ransomware could end up on your computer as a result of being uploaded on software download or torrent download sites and waiting for you to download and execute its files.

Another method via which the Meds virus could end up on your computer is likely by being sent to you as a malicious e-mail attachment. Such attachments are very often met and they often sent to usnsuspecting victims by pretending to be legitimate invoices, receipts or other seemingly important documents.

Once an infection with Meds Virus commences, the virus files of it are dropped on the computers of victims. Among them is the ransom note of this infection, called _readme.txt:

ATTENTION!

Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:

https://we.tl/t-514KtsAKtH

Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.
To get this software you need write on our e- mail:
gorentos@bitmessage.ch

Reserve e-mail address to contact us:
gorentos2@firemail.cc
Our Telegram account:
@datarestore

Your personal ID:

When the Meds virus infects your computer it also begins to encrypt the files in it. The virus uses AES encryption mode, which generates an assymetric encryption key that makes it very hard to decode files and make them work again. The encryption attacks the following types of files:

  • Documents.
  • Images.
  • Videos.
  • Audio files.
  • Archives.
  • Virtual drive files.
  • Databases.

After encryption, the Meds virus leaves its own file extension to be added to the encoded files.

Not only this, but since it is a variant of STOP Ransomware, the Meds Virus may also use the following commands to delete the shadow copies on the infected computer:

→ sc stop VVS
sc stop wscsvc
sc stop WinDefend
sc stop wuauserv
sc stop BITS
sc stop ERSvc
sc stop WerSvc
cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
C:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet

This ensures that all of the backups and shadow copies in Windows are permanently deleted.

Remove Meds virus and Try to Restore Files

If you want to remove Meds virus from your computer, we strongly recommend that you read the instructions below and follow the steps. If you want maximum effectiveness and fastest removal, then we strongly recommend that you download and run a scan of your computer by using an advanced malware removal software. Such program has been created with the primary purpose to help victims to remove this ransomware infection in minutes time and ensure that future protection is also guaranteed.

Avatar

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:
Twitter

17 Comments

  1. AvatarStefany

    Hello,

    I’ve been attacked with the ransomware .meds.
    I have succeeded in getting back my data on the PC,
    and removing it.
    But my problem is that my external hard disks are
    Infected, do you have an idea how to release the files
    that are on the externals ?

    Reply
    1. AvatarMilena Dimitrova

      Hi Stefany,

      How did you succeed in getting back your data? Via backup?

      Reply
      1. AvatarStefany

        Yes We have restored the system on the PC.
        But the problem remains in the external hard disks that they were connected to the PC

        Reply
        1. AvatarVentsislav Krastev (Post author)

          Hello Stefany,

          Can you access the external drive? I mean when you connect it to your computer, can you use it like normal, apart from the encrypted files on it.

          Reply
          1. AvatarStefany

            Yes ! The external hard disks are accessible and all files still exist with .meds extension

          2. Avatarharry

            hay stefany and ventsislav,

            My computer have been attacked with ransomware .meds too..
            and now, all my files were injected and they change to .meds extension..
            maybe how to decrypt that file was infected with that.

            thank you before

    2. Avataranonymous

      that is mine problem too

      Reply
  2. AvatarSai Karthik

    Bro all are being affected in the same period of time……I have some doubts on this….This can’t be a mere coincidence

    Reply
    1. AvatarMilena Dimitrova

      Unfortunately, most ransomware variants today are spread in massive malspam (malicious spam) campaigns. This method ensures the large number of infected victims. Another distribution technique is the use of exploit kits, which also guarantees a massive impact on users.

      Reply
  3. AvatarSai Karthik

    How did u restore data tell me ASAP

    Reply
    1. AvatarVentsislav Krastev (Post author)

      One way to do it is via backup if you have it. Another way is to save your .meds files somewhere else (flash drive, etc.) and wait for researchers to come up with a decryptor. When a decryptor comes out, we will update here: https://sensorstechforum.com/decrypt-files-stop-ransomware/

      Third way is to try and use the following data recovery tool – https://sensorstechforum.com/decrypt-files-stop-ransomware/
      but there is little chance it will restore all of the files. But still, you can still try it.

      Reply
  4. AvatarTunMin

    Dear bro,

    How tor attack ransomware.meds and getting back your data.
    Looking forward your kindness reply.

    Reply
  5. AvatarJohn Ripper

    I am not able to restore data Help me ASAP

    Reply
  6. AvatarVentsislav Krastev (Post author)

    One way to do it is via backup if you have it. Another way is to save your .meds files somewhere else (flash drive, etc.) and wait for researchers to come up with a decryptor. When a decryptor comes out, we will update here: https://sensorstechforum.com/decrypt-files-stop-ransomware/

    Third way is to try and use the following data recovery tool – https://sensorstechforum.com/decrypt-files-stop-ransomware/
    but there is little chance it will restore all of the files. But still, you can still try it.

    Reply
  7. AvatarSheraz Alam

    STOPDecrypter v2.2.0.0
    OS Microsoft Windows NT 6.2.9200.0, .NET Framework Version 4.0.30319.42000
    —————————————-

    No key for ID: AXG1SsHyUPofTPpbtfJYHl9DhtX6pi3HH3daxlFc (.moka )
    No key for ID: PAbgTJXVUc1AJqXP03yXKlnZW2lJ7W9al5G8h3m9 (.meds )
    No key for ID: AXG1SsHyUPofTPpbtfJYHl9DhtX6pi3HH3daxlFc (.mp4 )

    Please help me….i need to recover my PhD research data

    Reply
  8. AvatarRajasimha

    dear sir ,
    my self rajasimha ,yesterday my windows 7 pc have been attacked by .meds ransomware .
    then i installed windows 10 but my files are still in .meds file format ?
    please help me sir,
    my hard drive also have been attacked by .meds ransomware

    Reply
  9. AvatarShark Trager

    jeez. I feel for you guys. My computer was infected as well. Luckily it only contains some documents and letters which I already have made hard copies and some videos downloaded from youtube. I reformat the whole thing.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...