TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: BUFFALO
date: 2015-01-30 01:50:00
subject: Re: Help_Decrypt.xxxx

"David H. Lipman"  wrote in message 
news:p9KdnRTbR_tvEFTJnZ2dnUU7-e2dnZ2d@giganews.com...
>
>From: "Buffalo" 
>
>> "FromTheRafters"  wrote in message 
>> news:ma98km$e8r$1@news2.open-news-network.org...
>>>
>>> Buffalo laid this down on his screen :
>>>> Any method of restoring any of those files?
>>>
>>> Restore them from the backups. I know, I know, but it has to be said.
>>>
>>> No Vista OS disc might mean it has a restore to factory/recovery 
>>> partition instead.
>>>
>> Yes, it has a Recovery partition.
>> He didn't even have System Restore turned on, let alone any backups. :)
>> I just posted in case someone found a 'new' way to recover those files.
>
>This is a Crypto Trojan, not a virus, and uses the MS Crypto API. 
>Decrypting is not possibe; without a key.
>
>System Restore would not help.  It works on EXE, DLL, the Registry and OS 
>constructs.  It does not work on data files which is what ransomware 
>targets.
>
>
>
I did a factory recovery and it worked.
Now I'm back to around 2007.  :)
-- 
Buffalo 

--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.