Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Your network has been penetrated.
- All files on each host in the network have been encrypted with a strong algorithm.
- Backups were either encrypted or deleted or backup disks were formatted.
- Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover.
- We exclusively have decryption software for your situation
- No decryption software is available in the public.
- DO NOT RESET OR SHUTDOWN – files may be damaged.
- DO NOT RENAME OR MOVE the encrypted and readme files.
- DO NOT DELETE readme files.
- This may lead to the impossibility of recovery of the certain files.
- Photorec, RannohDecryptor etc. repair tools are useless and can destroy your files irreversibly.
- If you want to restore your files write to emails (contacts are at the bottom of the sheet) and attach 2-3 encrypted files
- (Less than 5 Mb each, non-archived and your files should not contain valuable information
- (Databases, backups, large excel sheets, etc.)).
- You will receive decrypted samples and our conditions how to get the decoder.
- Attention!!!
- Your warranty - decrypted samples.
- Do not rename encrypted files.
- Do not try to decrypt your data using third party software.
- We don`t need your files and your information.
- But after 2 weeks all your files and keys will be deleted automatically.
- Contact emails:
- servicedigilogos@protonmail.com
- or
- managersmaers@tutanota.com
- The final price depends on how fast you write to us.
- Clop
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement