Ehm, as far as I'm aware the globeimposter 2 variant is pretty well known and near-complete decryption should be doable with a little effort. It's a variant of the origional Globeimposter with, as far as i can tell, little real changes. The encryption isn't total, and probably only a few mb's of each file actually is encrypted. So if there's large files involved, they should be recoverable for the most part.
Have a look through some of the result here:
(
https://duckduckgo.com/?q=GlobeImpos...=v295-3&ia=web)
I'd hold off on the full system wipe and look into it a bit before throwing in the towel. Regardless of that you do have to assume that everything you had access to that wasn't protected by 2-factor authentication (and possibly even some that did) is now in the hands of the script kidz that infected you.
So the very first focus should be to make a list of every account you use, their method of authentication and then (from a liveboot machine) go to each one of them, try to access and if successful download everything you can, and close those accounts, and after you've got everything you could assess the damage.
You also should keep the infected system off the net (period, no exceptions or excuses) recover everything you can (decrypt it perhaps) and then do a thorough wipe regardless of anything. I'm talking about writing the storage with 1's and then writing 0's (every single bit, even if its empty) before finally repartitioning and using the storage again.
Only then should you consider connecting that machine back to anything that resembles a network.
If you're looking for the cleanest and safe procedure to follow after the recovery process I would advise deleting every single account you've ever accessed from that machine. Not just changing passwords, and or email addresses, not just switching on 2fa, none of that.
DELETE IT ALL!
The email addresses used in those accounts should also be considered a liability from now on, and also be deleted.
They only need one overlooked file or something they were able to hide a backdoor in/under/on and you're right back where you started, or even worse: motivating them to keep you as an active target for a while because you're a bit more challenging than a computer illiterate.
Create new accounts for everything you NEED access to but do not use email adresses, naming or protection that's similar to the old ones and if possible use 2fa at all times.
I know i sound overreacting but trust me i have been in your shoes myself and i can tell you they can hide trigger script or code in a document, music file, video file or even in a simple cookie.
If like you mentioned the machine infected didn't contain financial or other things that you need for survival or income or whatever, especially if its only mp3's, avi's and the like, It's not worth the risk, destroy it!
Keep in mind that EVERYTHING you did before you got infected is now a potential source of re-infection. you cannot use that ever again, without risking a repeat.
Best of luck my friend, I do not envy you. But I found having to go through that process is in a way therapeutic. It also forces you to realize how much you accumulate across the net in the sense of no longer used accounts, and information/data that is useless, obsolete but not deleted and removed.
Good luck!