News
Its a command line tool, and comes with a set of options you will have to apply to decrypt the files. Best part, they are simple, and anyone can use it with basic knowledge of using a computer.
It is not known how this ransomware is currently being distributed, but as long as victims have an unencrypted version of an encrypted file, they can use them to brute force the decryption key.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results