Wow, I literally awoke this morning with the bad news that my laptop is all encrypted into .cerber files and those # DECRYPT ...# files also. So clearly, if I do not have
a backup of the files, and a giant directory of the original names (such as an index that an operating system might have internally to keep track of stuff), then it will
be a total mess of a turkey-shoot to get the system re-built back to original form. I write software and all my source code is all encrypted. Needless to say, it's time
to buy a new laptop while I try to restore my oldie-but-goodie Vista laptop. It encrypts nearly all of the useful file extensions, like .txt, .cpp, etc.. Perhaps I'm spared
things like .dll, .exe, not sure about this.
I would like to know a good strategy. If I can somehow get into the OS's indexing, I can make a huge list of filenamesover the next month. Then try to find an AES-256
decryptor or some such.
But before I start, does anyone have any advice? I guess I'm talking a week's work here so no big hurry. There are one or two directories that have .txt files that I'd
like to start on first. And also, should I try to find any of the virus's own files and start deleting them - like does it have it's own executables laying on my machine
And help appreciated.
PS In the meantime, I have other machines that I work on that are not on the Internet, so I can rebuild these environments, it's not the end of the world yet. I make sure
I keep extra machines around for the purpose of virus problems. I'll work on those during this crunch.
Edited by PetarSickey, 28 June 2016 - 06:44 AM.