We are sorry that your computer has been infected with alexjer554@gmx.com ransomware. We do not have any good news for you. Data recovery is currently impossible. However, this should not motivate you to pay the ransom and obtain a decryption software from the cyber criminals.
No one can guarantee that authors of the ransomware has actually working software or are willing to keep their word and allow you to use it. Once you pay the ransom, you might be threatened to pay more money. Or criminals might simply disappear.
Therefore, we highly recommend eliminating the virus and trying alternative data recovery methods later. For virus removal, you have to use a reputable antivirus or malware removal tool, for example, Reimage. In order to install and run a full system scan, you have to reboot your PC to Safe Mode with Networking first.
Once the ransomware is terminated, you can use backups or alternative recovery software such as Data Recovery Pro or ShadowExplorer (you can use this tool only if ransomware did not delete Shadow Volume Copies of the targeted files). However, we want to point out that these tools are not official decryptors, so they just MIGHT help you to get back some of the encrypted files.
We are sorry that your computer has been infected with alexjer554@gmx.com ransomware. We do not have any good news for you. Data recovery is currently impossible. However, this should not motivate you to pay the ransom and obtain a decryption software from the cyber criminals.
No one can guarantee that authors of the ransomware has actually working software or are willing to keep their word and allow you to use it. Once you pay the ransom, you might be threatened to pay more money. Or criminals might simply disappear.
Therefore, we highly recommend eliminating the virus and trying alternative data recovery methods later. For virus removal, you have to use a reputable antivirus or malware removal tool, for example, Reimage. In order to install and run a full system scan, you have to reboot your PC to Safe Mode with Networking first.
Once the ransomware is terminated, you can use backups or alternative recovery software such as Data Recovery Pro or ShadowExplorer (you can use this tool only if ransomware did not delete Shadow Volume Copies of the targeted files). However, we want to point out that these tools are not official decryptors, so they just MIGHT help you to get back some of the encrypted files.
Sincerely,
2-spyware tea.