List of notes

HOW_TO_RECOVER_FILES_no_personal_id.txt

--------------------------------------------------------------------------------
>>>>>>>>>>>>>>>>>> H O W T O R E C O V E R F I L E S <<<<<<<<<<<<<<<<<<
--------------------------------------------------------------------------------


$$\ $$\ $$$$$$$$\
$$$\ $$ | $$ _____|
$$$$\ $$ | $$$$$$\ $$ | $$$$$$$\ $$$$$$$\ $$$$$$\ $$$$$$\ $$$$$$\
$$ $$\$$ |$$ __$$\ $$$$$\ $$ _____|$$ _____| \____$$\ $$ __$$\ $$ __$$\
$$ \$$$$ |$$ / $$ |$$ __| \$$$$$$\ $$ / $$$$$$$ |$$ / $$ |$$$$$$$$ |
$$ |\$$$ |$$ | $$ |$$ | \____$$\ $$ | $$ __$$ |$$ | $$ |$$ ____|
$$ | \$$ |\$$$$$$ |$$$$$$$$\ $$$$$$$ |\$$$$$$$\ \$$$$$$$ |$$$$$$$ |\$$$$$$$\
\__| \__| \______/ \________|\_______/ \_______| \_______|$$ ____/ \_______|
$$ |
$$ |
\__|


WHAT HAPPEND?
Your network has been hacked and infected by NoEscape.
All your company documents, databases and other important files have been encrypted.
Your confidential documents, personal data and sensitive info has been downloaded to our servers.


WHAT'S NEXT?
You need to contact us:
1. Download and install TOR browser https://www.torproject.org/
2. Open link in TOR browser noescaperjh3gg6oy7rck57fiefyuzmj7kmvojxgvlmwd5pdzizrb7ad.onion/[snip]
3. Follow the instructions


If you don't contact us soon we will publish the news of your company being hacked on our leak blog.
And then we will publish all the data that we have downloaded from your servers.


BLOG TO LEAK: noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion


DO NOT MODIFY OR ATTEMPT TO RECOVER ENCRYPTED FILES YOURSELF.
YOU CAN DAMAGE THE FILES AND THEN NO ONE CAN RESTORE THEM.
ONLY WE CAN RECOVER YOUR FILES WITH OUR DEDICATED TOOL.

HOW_TO_RECOVER_FILES.txt

--------------------------------------------------------------------------------
>>>>>>>>>>>>>>>>>> H O W T O R E C O V E R F I L E S <<<<<<<<<<<<<<<<<<
--------------------------------------------------------------------------------


$$\ $$\ $$$$$$$$\
$$$\ $$ | $$ _____|
$$$$\ $$ | $$$$$$\ $$ | $$$$$$$\ $$$$$$$\ $$$$$$\ $$$$$$\ $$$$$$\
$$ $$\$$ |$$ __$$\ $$$$$\ $$ _____|$$ _____| \____$$\ $$ __$$\ $$ __$$\
$$ \$$$$ |$$ / $$ |$$ __| \$$$$$$\ $$ / $$$$$$$ |$$ / $$ |$$$$$$$$ |
$$ |\$$$ |$$ | $$ |$$ | \____$$\ $$ | $$ __$$ |$$ | $$ |$$ ____|
$$ | \$$ |\$$$$$$ |$$$$$$$$\ $$$$$$$ |\$$$$$$$\ \$$$$$$$ |$$$$$$$ |\$$$$$$$\
\__| \__| \______/ \________|\_______/ \_______| \_______|$$ ____/ \_______|
$$ |
$$ |
\__|


WHAT HAPPEND?
Your network has been hacked and infected by NoEscape .DHFGGEDADE
All your company documents, databases and other important files have been encrypted
Your confidential documents, personal data and sensitive info has been downloaded


WHAT'S NEXT?
You have to pay to get a our special recovery tool for all your files
And avoid publishing all the downloaded info for sale in darknet


WHAT IF I DON'T PAY?
All your files will remain encrypted forever
There is no other way to recover yours files, except for our special recovery tool
All the downloaded info will publishing for sale in darknet
Your colleagues, competitors, lawyers, media and whole world will see it


I WILL TO PAY. WHAT SHOULD I DO?
You need to contact us:
1. Download and install TOR browser https://www.torproject.org/
2. Open link in TOR browser noescaperjh3gg6oy7rck57fiefyuzmj7kmvojxgvlmwd5pdzizrb7ad.onion
3. Enter your personal ID and follow the instructions

Your personal ID:
[snip]

-------------------------------------------------------------------------------------------------

WHAT GUARANTEES DO WE GIVE?
We are not a politically company and we are not interested in your private affairs
We are a commercial company, and we are only interested in money
We value our reputation and keep our promise


WHAT SHOULD I NOT DO?
! Don't try modify or recover encrypted files at yourself !
! Only we can restore your files, the rest lie to you !

HOW_TO_RECOVER_FILES_no_personal_id2.txt

> WHAT HAPPEND?

Important files on your network have been ENCRYPTED and now have the extension {ext}.
To recover your files, you need to follow the instructions below.

> SENSITIVE DATA

Sensitive data from your network has been DOWNLOADED.
If you DON'T WANT to your sensitive data PUBLISHED on our leak blog, you must act quickly.

LEAK BLOG: noescapemsqxvizdxyl7f7rmg5cdjwp33pg2wpmiaaibilb4btwzttad.onion

Data includes:
- Personal data of employees, resume, DL, SSN.
- Complete network map, including credentials for local and remote services.
- Private financial information including: customer data, accounts, budgets, annual reports, bank statements.
- Production documentation, including: datagrams, diagrams, drawings.
- And much more...

Sample DOWNLOADED FILES are available in your user panel.

> CAUTION

DO NOT MODIFY ENCRYPTED FILES BY YOURSELF.
DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA.
YOU MAY DAMAGE YOUR FILES, THIS WILL RESULT IN PERMANENT DATA LOSS.

> WHAT SHOULD I DO NEXT?

You need to contact us:
1. Download and install TOR browser: https://www.torproject.org/
2. Go to your user panel: bwjbbpbcihglahwxxusmyy2nxqdc4oqy4rvyhayn4dxhqzji4qi7taid.onion/[snip]