Your best chance of recovering your files lies with another forum .... https://www.bleepingcomputer.com/forums ... try4449966
.... Bleeping Computer are the experts with your Ransomware and have a number of decryption specialists who may be able to help you. So I advise you to post to the topic there that I've linked you to.
However, if you've already removed the infection, it may now be impossible to decrypt the files, since one or more of the infection files you've removed will have contained the decryption key needed to decrypt your files, and there may not be another way to get that key.
The experts at BC will be able to tell you if that is the case or not, so I advise you to let them know what you have done.
I include below a copy of the relevant section on Rumba from the article I linked you to (the actual one has live links, this copy does not).
STOPDecrypter v220.127.116.11.has been updated to include support for the .rumba variant and the new encrypted file format if you were hit by the OFFLINE KEY as explained in Post #451. As of now there is a new OFFLINE KEY embedded in the decrypter tool along with the previous key.
--Note: The decrypter will be able to decrypt files if your personal ID is D02NfEP94dKUO3faH1jwqqo5f9uqRw2Etn2lP3VB. If the decrypter skips your files and your personal ID is different than the one above, then we will not be able to help you at this time.
If STOPDecrypter indicates "No keys were found for the ID" you entered or "Unidentified ID", archive (save) the ID and MAC addresses in case of future decryption.
Victims of the .rumba variant who have NOT already posted their info in this support topic, contact Demonslay335 via PM with your personal ID from the ransom note and MAC address(es). Preferably, he wants victims to grab the information STOPDecrypter gives them and copy/paste it in the PM as explained in Post #467. We also do not need encrypted & original file pairs for this variant at the current time. If we find a way to use them, we will ask for them on an individual basis.