How to remove STOP Ransomware and decrypt .browec, .guvara, .etols, .grovat or .grovas files

Standard

STOP Ransomware (DJVU Ransomware) is high-risk widespread encryption virus, that first appeared near 1 year ago. It experienced several visual and technical changes throughout the time. In this tutorial we will analyse recent versions of this dangerous malware. In April of 2019, STOP Ransomware started to add following extensions to encrypted files: .browec, .guvara, .etols, .grovat or .grovas. They are sometimes called “Browec Ransomware”, “Guvara Ransomware”, “Etols Ransomware”, “Grovas Ransomware” and “Grovat Ransomware” respectively. Virus also modifies the hosts file to block Windows updates, antivirus programs, and sites related to security news or offering security solutions. The process of infection also looks like installing of Windows updates, malware shows fake window, that imitates update process.

How to remove STOP Ransomware and decrypt .raldug, .refols, .roland, .tronas or .trosak files

Standard

STOP Ransomware is large family of encryption viruses with over than a year history. It has undergone multiple visual and technical modifications during the time. This article will describe peculiar properties of latest versions of this malware. Since the end of March, STOP Ransomware started to add following extensions to encrypted files: .raldug, .refols, .roland, .tronas or .trosak. The cost of decryption of files encrypted by STOP Ransomware is $980 (or for $490, if ransom is paid within 72 hours). Hackers should send special decryption tool, that will decode affected files. However, we must warn the victims, that malefactors often don’t keep promises, and don’t send the decoder. We recommend you to remove active infection of STOP Ransomware and use decryption tools available. STOPDecrypter is capable of decryption of .raldug, .refols, .roland, .tronas or .trosak files. You can also try manual guide in this article to attempt restoring files.

How to remove STOP Ransomware and decrypt .kropun, .kropun1, .kroput or .kroput1 files

Standard

Notorious STOP Ransomware continues its distribution with minor modifications. Since the end of February 2019, new extensions appeared: .kropun, .kropun1, .kroput or .kroput1. At the same time, it distributes the AZORult trojan-stealer, which steals confidential information. It is capable of stealing various user data: information from files, browser history, passwords, cookies, online banking credentials, crypto-currency wallets, and more. Virus modifies the hosts file to block Windows updates, antivirus programs, and sites related to security news, selling antivirus software. This version of STOP Ransomware still uses following e-mail addresses: blower@india.com and blower@firemail.cc.

How to remove STOP Ransomware and decrypt .promos, .promoz, .promok and .promorad files

Standard

Promos Ransomware is another generation of STOP Ransomware family from the same authors. This virus aims important user’s files, such as documents, photos, databases, music, mail. Ransomware encodes them with AES encryption and adds .promos, .promoz,.promock, .promorad, .promorad2 or .promok extensions to affected files. All these variations use similar algorithms, however, to this moment only .promos files encrypted by STOP Ransomware can be decrypted using STOPDecrypter (provided below). Authors of Promos Ransomware promise to send decryption tool for encrypted files in exchange for $980 (or for $490, if ransom is paid within 72 hours). We must warn the victims, that malefactors often don’t keep promises, and cheat users without sending a decoder. We recommend you to remove active infection of STOP Ransomware and use decryption tools available for .promos files. Keep encrypted files, that cannot be decrypted yet (.promoz, .promok, .promock, .promorad), to the moment, when decryption tool will be updated. Now you should try manual guide in this article to restore files. Usage of file-recovery software can also help users return some copies of files, that were removed earlier.

How to remove STOP Ransomware and decrypt .adobe or .adobee files

Standard

This particular sample of Adobe Ransomware is, in fact, a continuation of STOP Ransomware family. This virus attacks files, that can be important for average user, like documents, photos, databases, music, enciphers them with AES encryption and adds .adobe (one “e” in the end), .adobee (two “e”s in the end) extensions to affected files. This creates a mess, because there are several different ransomware families using this extension after encryption. All these viruses use different algorithms, however .adobe files encrypted by STOP Ransomware can be deciphered using STOPDecrypter (provided below). Unlike previous versions, this one gives clear information about the cost of decryption, which is $980 (or $490 if it is paid within 72 hours). However, this is just a trick, to encourage people to pay the ransom. Often authors of the ransomware don’t send any decryptor. We recommend you to remove executables of STOP Ransomware and use decryption tools available for .adobe files.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close