Sihai network

Can extortion virus recover in 2017

Can extortion virus recover in 2017

4hw.org: blackmail virus has spread wildly all over the world recently. Up to now, there is no way to kill the virus. In China, college students are the worst victims of blackmail virus. As graduation season is coming, it's time to hand in papers, so the emergence of blackmail virus causes many students' papers to be locked directly by the virus. Can blackmail virus recover after being blackmailed What are the methods of file recovery?

I. how to remove the virus after blackmail

Blackmail virus, a new type of computer virus, is mainly spread in the form of mail, program Trojan horse and webpage mount horse. The virus is bad and harmful. Once infected, it will bring incalculable loss to users. This virus uses various encryption algorithms to encrypt the files. The infected people can't decrypt the files. They have to get the decrypted private key to be able to decrypt the files.

Middle blackmail virus removal steps:

1. Open the tools & rarr; options & rarr; Folder Options & rarr; and select show all files and folders to remove the & Radio; before Hide protected operating system files.

2. Compress the hidden folder named 'control panel' in the root directory with WinRAR, then start WinRAR, switch to the folder's parent folder, right-click the folder, and select 'rename' in the pop-up menu.

3. Remove the ID number {21ec2020-3aea-1069-a2dd-08002b30309d} after the folder name 'control panel', and it will become a common folder. You can also directly enter the folder to retrieve the lost files.

4. It will modify the registry key value to hide the user file, run regedit, and modify the registry key value damaged by the virus, so that the hidden file and system file can be displayed.

II. Blackmail virus file recovery

Rakhni decryptor is a very good tool to decrypt Tesla crypt. Let's download this kill tool first.

Run the kill software and click 'change parameters' to modify the scanning range of the software to' hard drives'. Do not select 'network drive' otherwise it will affect the scanning and decryption speed.

Click 'start scan' to select the directory where the encrypted document is located. You only need to select one document for multiple documents.

The software will automatically start scanning and decrypting. If the process is fast, it will take more than ten seconds. If it is slow, it will take several minutes. The decrypted document will appear under the directory you just selected. My encrypted image has been successfully restored.