Information:

  • Detailed Reports that clearly defines any backdoor and/or potential loopholes to prevent future Ransomware Attack occurrences
  • Quick, Efficient and Effective – Data are recovered quickly using advanced technology and other cutting-edge methods.
  • Experienced Security Researchers and White-hat hackers to ensure optimal success and results.
  • NO DATA,  No charges unless we help you recover your data

SUBMIT:

to decrypt files compromised by a Trojan.Encoder (Cryptolocker, Cryptowall, Reveton, ExPetya, DejaVu, Proton, THOTH, CandGrab) program that has demanded a ransom from you to decrypt them.

Send us at least 5 Samples of you are files encrypted and we will figure out a way, to decrypt it

INFORMATION NEEDED:

  • Your Full Name
  • Company Name
  • Email
  • Public PGP if Possible
  • At least 5 samples of encrypted data
  • the name of ransomware

Everything most send to recovery@maliciouscomputerservices.com

—–BEGIN PGP PUBLIC KEY BLOCK—–
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=XLCs
—–END PGP PUBLIC KEY BLOCK—–

X