Hello, Jsan
At the present moment I do not see any viable direct solution. It is unfortunate that you have deleted this virus, because you could have used a method also known as network sniffing to try and intercept any information that can be sent out to the cyber-criminals, like the decryption keys, for example. Either way, you may want to give a try to some of Kaspersky's decrypters. But bear in mind that this is a risky thing because you tamper directly with the files and If they have a so called CBC mode, sort of "file protection", that breaks the files when you try to decrypt them, you may lose your files forever. Either way, you can try using Kaspersky's decryptors, starting with Rannoh decryptor - here is the link for download:
Kaspersky UtilitiesBut if you are going to try using the decryptors, I advise you to set your PC to stay turned on and not automatically shut down. This is how to do it:
Step 1: Click on the battery icon in your system tray (next to the digital clock) in Windows and then click on
More Power Options.
Step 2:The mighty Power options menu will appear. In your power plan click on Change Plan Settings.
Step 3: In your plan’s settings make sure you set
“Turn off the display” and
“Put computer to sleep” to
“Never” from the drop down minutes menu.
Step 4: Click on
“Change Advanced Plan Settings” and click to expand the
“Hard Disk” option in the list there.
Step 5: From there, set the power settings (On Battery and Powered On) to “Never”.
Now, you should configure your PC to start decrypting Cerber ransomware’s files. Bear in mind that the process may take a lot of time so arm yourself with patience.