mlzsmg wrote: ↑Fri Jan 20, 2023 3:43 am
I paid to bc1qdzylfqnezqme4xtkx8un8s7eg49c82fhwlfhnt 6 days ago, 0.03BTC exactly. This was what was requested via the page once restored. As yet I've only had my 1 transaction recorded. I paid via coinbase. Have I screwed this up? Has anyone else had success after a week of waiting?
Thanks in advance
OP_RETURN is 6a2a9c90d775640031df6b36f1c10a3f
Regards
Thanks everyone. The OP_RETURN indeed came through on Friday and everything I needed is now recovered.
i revisited the link and i see transactions there, can you please help me identify the key ? i have also got the below instructions and have no idea how to use them in my Nas, Can i use this decrypter to go into windows command prompt of my files in Nas to do something ? also i paid through the cash app page set by the ransomware people. and it is showing as paid. but i am unable to get the key from the transactions.
Status: Paid
Instruction
After download unpack archive and upload decryptor_linux* file to your NAS.
After upload run command in terminal: chmod +x ./decryptor_linux && ./decryptor_linux
Or copy crypted files to another device and start decryptor program with start directory paramether.
Example in linux: chmod +x ./decryptor_linux* && ./decryptor_linux* -s /destination/dir
Example in windows(command line): decryptor_windows.exe -s C:\destination\dir
Star symbol replace to your processor architecture. Before decrypting make sure you have at least 1-2 gigabytes of free space.
lostmyNas wrote: ↑Mon Jan 23, 2023 8:23 pm
...also i paid through the cash app page set by the ransomware people. and it is showing as paid. but i am unable to get the key from the transactions.
Status: Paid
Instruction
...
Please provide the hash key you used for the payment. It starts with bc1 (b-c-one) and is your individual key for the ransom.
Regards
Edit: This was already told you on Dec. 30th, 2022!
Without the hash - no OP_Return.
i tried to find the output with op_return but can't. my transaction id 83a39d8b7ce13d54061340cde7bef2c021c25b1956cf8491043b1e45b818a920 paid for hash bc1qc0s086cgqjp4m3v7dsym7pyeqwzw6vvfj0gv5a
who can i get the decryption key?
After looong journey with QNAP Support I'm done. They were unable to find or even recover the Deadbolt page. Only things I have now are encrypted files without knowing address where I could pay to get decryption key. Is there any possibility to retreive the BTC addres using encrypted file?
That's the point I'm not sure when infection took place. I tried using the "tool" and received same result with every file with deadbolt extension "bc1qy547gt8hc7ahnuh60l0pukmh0amlxvz8wmrz4q". If my QNAP was encrypted before September would the tool even work with infected file or it will not return anything?
On random files I tested, it would display random bitcoin addresses with random ransom amounts, if the ransom amount is correct (0.05BTC) and the address is always the same, you found your information
I had a QNAP drive encrypted with deadbolt but teh actual device stopped working. I have another QNAP now but despite QNAP support trying to help they cannot get the original ransom note. I've used the tool described earlier and have a payment address: bc1qesp2u4s8wdxskyjyfyqaskfepwdkpq2nr6f3wf
payment amount : 0.05 BTC
But i'm afraid i have no idea how to actually pay the ransom. I understand i have to pay this address and then get an op_return with the decrypt key and then use the Emisoft tool to decrypt my files. But i've no idea how to make the payment and make sure that after any charges I do pay 0.05 BTC. If i setup a Blockchain account how do i pay from this to the payment address.
Would somebody help me out either on this page or by messaging me privately. I'm worried that as this is quite a lot of money i'll get it wrong and not being that good with this type of thing i'd prefer to ask for help.