Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
13 views

INFORMATION

Uploaded by

shixuedela
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

INFORMATION

Uploaded by

shixuedela
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

########################################################################

!!!!!!!!!!!!! THE FILES ON YOUR DEVICE HAVE BEEN ENCRYPTED !!!!!!!!!!!!!

########################################################################

Due to a security breach, all files on your computer have been encrypted,

for decryption, send an email to us: BaseData@airmail.cc

Be sure to specify this ID in the header of the letter

when contacting us: yxVoHuhl

To decrypt your files, you will need to pay a certain amount in bitcoins.
The decryption rate depends on the speed of your contact with us.

After payment, you will receive a special tool for decrypting files on your
computer.

#########################################

As a guarantee, we make a free decryption

#########################################

For the test, we can decrypt one small file as proof of decryption.

We do not decrypt important files during testing, such as XLS, databases


and other important files!

We don't consider ourselves criminals! We only show you the problems with
your security and get rewarded for our hard work!

We never cheat and value our reputation!

#########################################

How can I buy Bitcoins?

#########################################

Contact us and we will provide you with instructions for buying Bitcoin.

Please note that by contacting third parties, the cost may increase due to
additional fees.

We will help you to purchase bitcoin without unnecessary difficulties, our


experienced specialists will tell you in detail about the process.

#########################################
This is very important!

#########################################

- Do not rename encrypted files.

- Do not try to decrypt your data using third party software, this may lead
to irreversible data loss.

- No one else will be able to return your files except us!

#########################################################################

You might also like