Demonslay335

revil.readme.txt

Dec 14th, 2021
1,775
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.11 KB | None | 0 0
  1. ::: Greetings :::
  2.  
  3.  
  4. Little FAQ:
  5.  
  6. .1.
  7. Q: What Happened?
  8. A: Your files have been encrypted and now have the "revil" extension. The file structure was not damaged, we did everything possible so that this could not happen.
  9. !!!Also, we have stolen very important information from your servers !!!
  10.  
  11. .2.
  12. Q: How to recover files?
  13. A: If you wish to decrypt your files you will need to buy our decrypt software.
  14.  
  15. .3.
  16. Q: How much does your decrypt software cost?
  17. A: Our decrypt software costs "70 BTC" withing next 72 hours, after that it will cost "140 BTC".
  18.  
  19. .4.
  20. Q: What about guarantees?
  21. A: It's just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. It's not in our interests.
  22. To check the ability of decrypting files, you can send us any 2 files with SIMPLE extensions(jpg,txt,doc, etc. no databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.
  23.  
  24. .5.
  25. Q: How to contact you or to buy your decrypt software?
  26. A: You can use our 24/7 Live Chat (NEED TO INSTALL LATEST VERSION OF TOR BROWSER):
  27.  
  28. [redacted]
  29.  
  30. or write us by email: [redacted] or [redacted]
  31.  
  32.  
  33. .5.
  34. Q: How will the decryption process proceed after payment?
  35. A: After payment we will send you our decrypt software and detailed instructions for use. With this program you will be able to decrypt all your encrypted files automatically.
  36.  
  37. .6.
  38. Q: If I don�t want to cooperate?
  39. A: Just google: Revil ransomware . If you don't contact us within 72 hours, we'll publish part of your information. Then, price will double and after 7 days if no steps from you, we'll publish all the exfiltrated information and share it on social media, to your clients, partners, competitors and government agencies.
  40.  
  41.  
  42. :::BEWARE:::
  43. DON'T try to change encrypted files by yourself!
  44. If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup of all encrypted files!
  45. Any changes in encrypted files may entail damage of the private key and, as result, the loss of all data.
  46.  
Advertisement
Add Comment
Please, Sign In to add comment