Severity scale:  

Remove ransomware (Removal Guide) - Decryption Steps Included

removal by Alice Woods - - | Type: Ransomware ransomware is one of the Matrix ransomware variants that appends .FASTA extension to encrypted files ransomware virus ransomware – the cryptovirus that is using both, AES and RSA, algorithms in data encryption. Alternatively, this virus is known as Fasta ransomware. Once this malware infiltrates the system, it finds files for the encryption and then demands the payment for an alleged decryption key. Virus developers have even been offering to test their recovery service by sending them 3 encrypted files, but you shouldn't trust these cybercriminals because virus is one of Matrix ransomware that has been active for more than three years now. Developers have been slightly altering the primary version by releasing updated variants to make more profit from inexperienced victims. The ransom note placed in #README_FASTA#.rtf is typically stating that your files will be automatically deleted after seven days, but paying shouldn't be considered because it may lead to permanent data loss anyway. You need thorough virus removal and data recovery instead. 

Name ransomware / Fasta ransomware
Type  Cryptovirus
Ransom note #README_FASTA#.rtf 
File extension


Encryption methods  AES 128 and RSA 2048
Family  Matrix ransomware
Contact email
Elimination Remove ransomware with antivirus and clean the system from virus damage with Reimage Reimage Cleaner Intego virus is the malware that can be called most dangerous because the ransomware attack involves cryptocurrency and can lead to permanent money or data loss. People behind this threat are not trustworthy. Cybercriminals only care about the payment and your files may get deleted no matter if you pay or not.[1]

However, ransomware is not only encrypting your files. File encoding makes your audio files, documents, photos or archives affected but there is a huge possibility of system alterations that include:

  • added system files;
  • altered registry;
  • deleted files;
  • disabled functions or programs.

If ransomware adds or alters Windows Registry entries, it makes sure that the malicious process is launched every time your device is rebooted, this ensures persistence and difficult termination. Also, for that purpose ransomware is set to disable antivirus programs or security features on the device.

But these features are secondary and you cannot notice any of the alterations besides the main Fasta ransomware process – encryption. When the process is done, and your files get marked with the appendix, a ransom note is delivered in every folder containing encoded data. #README_FASTA#.rtf reads the following: 


We are realy sorry to inform you that ALL YOUR FILES WERE ENCRYP‘I‘ED
by our automatic software. it became possible because of bad server security.
Please don‘t worry. we can help you to RESTORE your server to original
state and decrypt all your files quickly and safely!

Files are not broken!!!
Files were encrypted with AES-128+RSA-2048 crypto algorithms.
There is no way to decrypt your files without unique decryption key and special software. Your unique
decryption key is securely stored on our server. For our safety, all information about your server and your
decryption key will be automaticaly DELETED AFTER 7 DAYS! You will irrevocably lose all your data!
Please note that all the attempts to recover your files by yourself or using third party tools will result only in
irrevocable loss of your data!
Please note that you can recover files only with your unique decryption key, which stored on our side. If you
will use the help of third parties, you will only add a middleman.

Please write us to the e-mail (write on English or use professional translator):

You have to send your message on each of our 3 emails due to the fact that the message may not reach
their intended recipient for a variety of reasons!

In subject line write your personal ID:

We recommed you to attach 3 encrypted files to your message. We will demonstrate that we can recover your
Please note that files must not contain any valuable information and their total size must be less than 5Mb.

Please be sure that we will find common languge. We will restore all the data and give you recommedations
how to configure the protection of your server.

We will definitely reach an agreement 😉 !!!


if you dld not receive the answer from the aforecited emails for more then 24 hours please send us Bltmessages from a web browser
through the webpage Below is a tutorial on how to send bitmessage via web browser:
1. Open in your browser the link and make the registration by entering name email and password.
2. You must confirm the registration, return to your email and follow the instructions that were sent to you.
3. Return to site and click “Login” label or use link, enter your email and password and click the “Sign in“ button
4. Click the ‘Create Random address“ button.
5. Click the ‘New massage” button.
6. Sending message:
To: Enter address: BM-2cXRWRW5Jv5hxbhgu2HJSJrtPf92iKshhm
Subject: Enter your ID: [Redacted] Message: Describe what you think necessary.
Click the “Send message” button.

This lengthy Fasta ransomware developers' message states that you should contact them via and discover the ransom amount for your files. Researchers[2] always note that cybercriminals offers test decryption and encourages you to contact them to create a feeling of trust. 

Unfortunately, ransomware developers are well known for previous activity with Matrix ransomware and other versions. Cybercriminals can disappear immediately after the transfer and forget about the promise to restore your data.

You should remove Fasta ransomware from the system as soon as you get the ransom note or notice files marked with suspicious extension. Waiting for more than a week can lead to deleted files permanently. If ransomware does so, data recovery using software or tools becomes barely possible.

The best tip for data recovery is to do that only after the initial ransomware removal. When you are sure that malware is deleted from the device, you can plug in the external device to your PC or use tools for file restoring. ransomware removal should be performed using anti-malware programs because this type of PC security tool can detect malicious programs, infected files or malware like this cyber threat. During a full system scan program searches all parts of the system and indicates what needs to be fixed.

Then you can remove ransomware with the same anti-malware program and proceed with file recovery. However, when you add recovered files to the infected device, your data can get permanently damaged, so check for malware additionally and remove virus damage using Reimage Reimage Cleaner Intego or similar PC repair program. ransomware ransomware is the malware type that encrypts data using RSA and AES algorithms and then demands ransom from victims.

Your computer system can get infected from a malicious email attachment

Email spam campaigns get even more clever these days.[3] Phishing campaigns can be set to deliver various malware directly or also distribute different attacks and a cocktail of malicious cyber threats. Spam emails often don't even go to the spam email box and look legitimate enough, so people open them and download attached files.

Once the document, archive or PDF is downloaded and opened on the device, malicious content can get enabled either automatically, or you press some button and allow the malicious script to launch its designed functionality. The direct ransomware can get on your device this way, or payload dropper infects the system with the virus.

The only solution when you want to avoid these infections is to clean the email box more frequent and pay more attention to emails that you receive. Well-known companies or services are not sending Order information or Invoice marked emails to people that are not using their products.

Terminate ransomware when you notice the malicious presence

If you wait too long before performing ransomware removal, you can risk getting additional malware infections or even permanently losing your important files due to the second encryption round or deletion. So make sure to react as soon as possible to avoid these consequences.

Make sure to remove ransomware using reputable anti-malware tools like Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner, or Malwarebytes, so you can be sure that the program is not affecting your device in other ways. Also, since the virus can alter or disable some functions, you may benefit from Safe Mode before the system scan. You can find how to enter this mode in our instructions down below. 

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove virus, follow these steps:

Remove using Safe Mode with Networking

Reboot the device in Safe Mode with Networking before running the antivirus on the system

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove using System Restore

System Restore feature helps to recover the system to the previous point

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by, you can use several methods to restore them:

Use Data Recovery Pro for encrypted or accidentally deleted files

Try this software as a method to recover your files instead of file backups

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by ransomware;
  • Restore them.

Windows Previous Versions feature as a data recovery method ransomware encrypts files, and if you use System Restore to eliminate the virus, you can restore data using Windows Previous Versions

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer as a file recovery feature

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Decryption tool is not available

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Do not let government spy on you

The government has many issues in regards to tracking users' data and spying on citizens, so you should take this into consideration and learn more about shady information gathering practices. Avoid any unwanted government tracking or spying by going totally anonymous on the internet. 

You can choose a different location when you go online and access any material you want without particular content restrictions. You can easily enjoy internet connection without any risks of being hacked by using Private Internet Access VPN.

Control the information that can be accessed by government any other unwanted party and surf online without being spied on. Even if you are not involved in illegal activities or trust your selection of services, platforms, be suspicious for your own security and take precautionary measures by using the VPN service.

Backup files for the later use, in case of the malware attack

Computer users can suffer from data losses due to cyber infections or their own faulty doings. Ransomware can encrypt and hold files hostage, while unforeseen power cuts might cause a loss of important documents. If you have proper up-to-date backups, you can easily recover after such an incident and get back to work. It is also equally important to update backups on a regular basis so that the newest information remains intact – you can set this process to be performed automatically.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware strikes out of nowhere. Use Data Recovery Pro for the data restoration process.

About the author
Alice Woods
Alice Woods - Likes to teach users about virus prevention

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Alice Woods
About the company Esolutions


Your opinion regarding ransomware