zoltor

Member
  • Content Count

    2
  • Joined

  • Last visited

  • Days Won

    1

zoltor last won the day on June 11 2017

zoltor had the most liked content!

Community Reputation

1 Neutral

About zoltor

  • Rank
    New Member
  1. Thank you for what you are doing. We sent the files to the drweb lab, but they are also powerless at the moment. Also the problem is considered on the virusinfo.info. If there will be any news I will necessarily write in the topic that I created in the thread about BTCware. Although this is a very small chance. Thank you.
  2. Good afternoon. We are located in Kazakhstan, Aktobe. In our organization there was an encryption of files 06/06/2017. This computer was granted access to RDP. Through this protocol, encryption was carried out. The files have the extension of the form [[email protected]] .blocking. The requirements of extortionists and several files I attach. If necessary, I can provide any files and reports. Ransomware is BTCWare. If payment is required, write how much. Thank you in advance. These two decrypters do not fit, the wrong type of encrypted file https://decrypter.emsisoft.com/amnesia2 https://download.bleepingcomputer.com/demonslay335/BTCWareDecrypter.zip attached avacrypt.rar - password Qwer123$ - exe file of ransomware !#_RESTORE_FILES_#!.inf - Demands of extortionists "Files" folder - Original and encrypted files all archive password - Qwer123$ https://sabercathost.com/4V5o/ransomware.rar ransomware.rar