Virus Attention: 288,708 Posts: 1,143,073
  • ten Reply post, total one page

Unname1989 Extortion virus decryption tool (feature, collection QR code)

Just look at the owner Collection reply

A ransomware virus named Unname1989 quickly became red. Several security companies claimed that it could be decrypted, but some users lost their keys due to reinstalling the system or other reasons, and only backed up the encrypted files. At this time, some manufacturers' decryption tools will fail to decrypt. The Tencent computer housekeeper team launched an emergency response against the blackmail virus, and successfully cracked it in a short time. The developed non key decryption tool can perfectly recover the encrypted file even if the system is reinstalled or the key is lost for other reasons.


IP territory: Gansu 1st floor 2018-12-04 13:14 reply
    Suspected violation of this floor has been folded by the system View this building


    IP territory: Gansu 2nd floor 2018-12-04 13:15
    reply
      Operation steps:
      1) First of all, the first step is the key step. You need to be able to find the original version of any encrypted file (before encryption, such as photos, you can find it through your mobile phone, other devices, friends or backup data). This file is larger than 500KB. If you cannot find a file larger than 500KB, we can only help you recover other files smaller than 500KB


      IP territory: Gansu 3rd floor 2018-12-04 13:16
      reply
        2) Double click to run the decryption tool provided by Tencent Computer Manager, and the prompt is as follows:


        IP territory: Gansu 4th floor 2018-12-04 13:17
        reply

          3) Enter the path of the encrypted file found and press Enter

          4) Enter the original file path of the encrypted file found and press Enter

          5) Confirm that the key search is successful

          6) Enter the path of other files to be recovered, and press Enter to continue decryption.

          7) After decrypting a directory, you can enter another directory or file to continue decryption.

          8) Repeat the above operations to decrypt and recover all encrypted files


          IP territory: Gansu 5F 2018-12-04 13:19
          reply
            Suspected violation of this floor has been folded by the system View this building


            IP territory: Gansu 6th floor 2018-12-04 13:20
            reply
              The important thing is that this virus does not use any well-known algorithm for encryption, but a simple XOR algorithm


              IP territory: Shandong come from Android client 7th floor 2018-12-04 13:25
              reply
                Just saw the news on Weibo, come to the virus and see the baby's post


                IP Territory: Chongqing come from Android client 8th floor 2018-12-04 15:06
                reply


                  come from Android client 9th floor 2018-12-06 00:09
                  reply
                    Suspected violation of this floor has been folded by the system View this building


                    IP territory: Beijing come from Android client 10th floor 2018-12-06 17:45
                    reply
                      Top one, ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah ah


                      IP territory: Hubei come from Android client 11th floor 2020-05-09 20:49
                      reply

                        Scan QR code to download the post bar client

                        Download the post bar APP
                        Watch HD live broadcast and video!
                        Hot discussion list of post bar