ransomware (Removal Guide) - Decryption Steps Included virus Removal Guide

What is ransomware? ransomware is one of the Matrix ransomware variants that appends .FASTA extension to encrypted files ransomware ransomware is the cyber threat that focuses on file-locking processes to have the reason for a ransom demand. ransomware – the cryptovirus that is using both, AES and RSA, algorithms in data encryption. Alternatively, this virus is known as Fasta ransomware. Once this malware infiltrates the system, it finds files for the encryption and then demands the payment for an alleged decryption key. Virus developers have even been offering to test their recovery service by sending them 3 encrypted files, but you shouldn't trust these cybercriminals because virus is one of Matrix ransomware that has been active for more than three years now. Developers have been slightly altering the primary version by releasing updated variants to make more profit from inexperienced victims. The ransom note placed in #README_FASTA#.rtf is typically stating that your files will be automatically deleted after seven days, but paying shouldn't be considered because it may lead to permanent data loss anyway. You need thorough virus removal and data recovery instead.

Name ransomware / Fasta ransomware
Type Cryptovirus
Ransom note #README_FASTA#.rtf
File extension


Encryption methods AES 128 and RSA 2048
Family Matrix ransomware
Contact email
Elimination Remove ransomware with antivirus and clean the system from virus damage with FortectIntego virus is the malware that can be called most dangerous because the ransomware attack involves cryptocurrency and can lead to permanent money or data loss. People behind this threat are not trustworthy. Cybercriminals only care about the payment and your files may get deleted no matter if you pay or not.[1]

However, ransomware is not only encrypting your files. File encoding makes your audio files, documents, photos or archives affected but there is a huge possibility of system alterations that include:

  • added system files;
  • altered registry;
  • deleted files;
  • disabled functions or programs.

If ransomware adds or alters Windows Registry entries, it makes sure that the malicious process is launched every time your device is rebooted, this ensures persistence and difficult termination. Also, for that purpose ransomware is set to disable antivirus programs or security features on the device.

But these features are secondary and you cannot notice any of the alterations besides the main Fasta ransomware process – encryption. When the process is done, and your files get marked with the appendix, a ransom note is delivered in every folder containing encoded data. #README_FASTA#.rtf reads the following:


We are realy sorry to inform you that ALL YOUR FILES WERE ENCRYP‘I‘ED
by our automatic software. it became possible because of bad server security.
Please don‘t worry. we can help you to RESTORE your server to original
state and decrypt all your files quickly and safely!

Files are not broken!!!
Files were encrypted with AES-128+RSA-2048 crypto algorithms.
There is no way to decrypt your files without unique decryption key and special software. Your unique
decryption key is securely stored on our server. For our safety, all information about your server and your
decryption key will be automaticaly DELETED AFTER 7 DAYS! You will irrevocably lose all your data!
Please note that all the attempts to recover your files by yourself or using third party tools will result only in
irrevocable loss of your data!
Please note that you can recover files only with your unique decryption key, which stored on our side. If you
will use the help of third parties, you will only add a middleman.

Please write us to the e-mail (write on English or use professional translator):

You have to send your message on each of our 3 emails due to the fact that the message may not reach
their intended recipient for a variety of reasons!

In subject line write your personal ID:

We recommed you to attach 3 encrypted files to your message. We will demonstrate that we can recover your
Please note that files must not contain any valuable information and their total size must be less than 5Mb.

Please be sure that we will find common languge. We will restore all the data and give you recommedations
how to configure the protection of your server.

We will definitely reach an agreement 😉 !!!


if you dld not receive the answer from the aforecited emails for more then 24 hours please send us Bltmessages from a web browser
through the webpage Below is a tutorial on how to send bitmessage via web browser:
1. Open in your browser the link and make the registration by entering name email and password.
2. You must confirm the registration, return to your email and follow the instructions that were sent to you.
3. Return to site and click “Login” label or use link, enter your email and password and click the “Sign in“ button
4. Click the ‘Create Random address“ button.
5. Click the ‘New massage” button.
6. Sending message:
To: Enter address: BM-2cXRWRW5Jv5hxbhgu2HJSJrtPf92iKshhm
Subject: Enter your ID: [Redacted] Message: Describe what you think necessary.
Click the “Send message” button.

This lengthy Fasta ransomware developers' message states that you should contact them via and discover the ransom amount for your files. Researchers[2] always note that cybercriminals offers test decryption and encourages you to contact them to create a feeling of trust.

Unfortunately, ransomware developers are well known for previous activity with Matrix ransomware and other versions. Cybercriminals can disappear immediately after the transfer and forget about the promise to restore your data.

You should remove Fasta ransomware from the system as soon as you get the ransom note or notice files marked with suspicious extension. Waiting for more than a week can lead to deleted files permanently. If ransomware does so, data recovery using software or tools becomes barely possible.

The best tip for data recovery is to do that only after the initial ransomware removal. When you are sure that malware is deleted from the device, you can plug in the external device to your PC or use tools for file restoring. ransomware removal should be performed using anti-malware programs because this type of PC security tool can detect malicious programs, infected files or malware like this cyber threat. During a full system scan program searches all parts of the system and indicates what needs to be fixed.

Then you can remove ransomware with the same anti-malware program and proceed with file recovery. However, when you add recovered files to the infected device, your data can get permanently damaged, so check for malware additionally and remove virus damage using FortectIntego or similar PC repair program. ransomware ransomware is the malware type that encrypts data using RSA and AES algorithms and then demands ransom from victims.

Your computer system can get infected from a malicious email attachment

Email spam campaigns get even more clever these days.[3] Phishing campaigns can be set to deliver various malware directly or also distribute different attacks and a cocktail of malicious cyber threats. Spam emails often don't even go to the spam email box and look legitimate enough, so people open them and download attached files.

Once the document, archive or PDF is downloaded and opened on the device, malicious content can get enabled either automatically, or you press some button and allow the malicious script to launch its designed functionality. The direct ransomware can get on your device this way, or payload dropper infects the system with the virus.

The only solution when you want to avoid these infections is to clean the email box more frequent and pay more attention to emails that you receive. Well-known companies or services are not sending Order information or Invoice marked emails to people that are not using their products.

Terminate ransomware when you notice the malicious presence

If you wait too long before performing ransomware removal, you can risk getting additional malware infections or even permanently losing your important files due to the second encryption round or deletion. So make sure to react as soon as possible to avoid these consequences.

Make sure to remove ransomware using reputable anti-malware tools like FortectIntego, SpyHunter 5Combo Cleaner, or Malwarebytes, so you can be sure that the program is not affecting your device in other ways. Also, since the virus can alter or disable some functions, you may benefit from Safe Mode before the system scan. You can find how to enter this mode in our instructions down below.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of virus. Follow these steps

Manual removal using Safe Mode

Reboot the device in Safe Mode with Networking before running the antivirus on the system

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove using System Restore

System Restore feature helps to recover the system to the previous point

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by security experts.

If your files are encrypted by, you can use several methods to restore them:

Use Data Recovery Pro for encrypted or accidentally deleted files

Try this software as a method to recover your files instead of file backups

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by ransomware;
  • Restore them.

Windows Previous Versions feature as a data recovery method ransomware encrypts files, and if you use System Restore to eliminate the virus, you can restore data using Windows Previous Versions

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

ShadowExplorer as a file recovery feature

  • Download Shadow Explorer (;
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

Decryption tool is not available

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting ransomware

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Alice Woods
Alice Woods - Likes to teach users about virus prevention

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Alice Woods
About the company Esolutions