Team OS : Your Only Destination To Custom OS !!

Welcome to TeamOS Community, Register or Login to the Community to Download Torrents, Get Access to Shoutbox, Post Replies, Use Search Engine and many more features. Register Today!

Mirkec

Uploader
Power User
Windows Modifier
✅ Verified Member
Member
Downloaded
57.6 GB
Uploaded
16 TB
Ratio
285.11
Seedbonus
329,011
Upload Count
83 (96)
Member for 6 years
PfS6Z8.png


Review
Avast Ransomware Decryption Tools contains all 20 available ransomware decrypters available from Avast. It can help decrypt files encrypted by the following forms of ransomware:
  1. AES_NI: a ransomware strain that first appeared in December 2016. For encrypting files, the ransomware uses AES-256 combined with RSA-2048;
  2. Alcatraz Locker: a ransomware strain that was first observed in the middle of November 2016. The ransomware uses AES 256 encryption combined with Base64 encoding;
  3. Apocalypse: a form of ransomware first spotted in June 2016.
  4. BadBlock: a form of ransomware first spotted in May 2016;
  5. Bart: a form of ransomware first spotted at the end of June 2016;
  6. BTCWare: a ransomware strain that first appeared in March 2017 and since then five variants appeared. The ransomware uses two different encryption methods – RC4 and AES 192;
  7. Crypt888: (also known as Mircop) is a form of ransomware first spotted in June 2016;
  8. CryptoMix (Offline): (also known as CryptFile2 or Zeta) is a ransomware strain that was first spotted in March 2016. In early 2017, a new variant of CryptoMix, called CryptoShield emerged. Both variants encrypt files by using AES256 encryption with a unique encryption key downloaded from a remote server. However, if the server is not available or if the user is not connected to the internet, the ransomware will encrypt files with a fixed key ("offline key");
  9. CrySiS: (JohnyCryptor, Virus-Encode, Aura, Dharma) is a ransomware strain that has been observed since September 2015. It uses AES-256 combined with RSA-1024 asymmetric encryption;
  10. EncrypTile: a ransomware that we first observed in November of 2016. It uses AES-128 encryption, using a key that is constant for a given PC and user;
  11. FindZip: a ransomware strain that was observed at the end of February 2017. This ransomware spreads on Mac OS X (version 10.11 or newer). The encryption is based on creating ZIP files - each encrypted file is a ZIP archive, containing the original document;
  12. Globe: a ransomware strain that has been observed since August 2016. Based on variant, it uses RC4 or Blowfish encryption method;
  13. HiddenTear: one of the first open-sourced ransomware codes hosted on GitHub and dates back to August 2015. Since then, hundreds of HiddenTear variants have been produced by crooks using the original source code. HiddenTear uses AES encryption;
  14. Jigsaw: a ransomware strain that has been around since March 2016. It is named after the movie character "The Jigsaw Killer". Several variants of this ransomware use the Jigsaw Killer’s picture in the ransom screen;
  15. LambdaLocker: a ransomware strain that we first observed in May 2017. It is written in Python programming language and the currently prevalent variant is decryptable;
  16. Legion: a form of ransomware first spotted in June 2016;
  17. NoobCrypt: a ransomware strain that has been observed since the late July 2016. For encrypting user's files, this ransomware uses AES 256 encryption method;
  18. Stampado: a ransomware strain written using the AutoIt script tool. It has been around since August 2016. It is being sold on the dark web, and new variants keep appearing. One of its versions is also called Philadelphia;
  19. SZFLocker: a form of ransomware first spotted in May 2016;
  20. TeslaCrypt: a form of ransomware first spotted in February 2015;
  21. XData: a ransomware strain that was derived from AES_NI and like WannaCry, it uses the Eternal Blue exploit to spread to other machines.


What is new in version 1.0.231.0 (Released on August 24, 2020):
  • The official website does not provide any information about this release at the moment.


System requirements:
OS: Microsoft Windows® XP, Windows® Vista, Windows® 7, Windows® 8, Windows® 8.1, Windows® 10 (both 32 & 64-bit).


Install notes:
1. Extract and run the executable file;
2. Enjoy!


Screenshots:

PfSVTJ.png

PfSwtD.png

PfSDag.png



Virus free! No virus signature! 100% clean!


File: Avast Ransomware Decryption.zip
00/61
MD5: 25BAC2C8276B42FA0A815F91D560A04E
SHA1: 838DA9D4CE7174C10A380A16FC8E19458A518D66
SHA256: 83C010978CC05B7C2D7C99EF91B4BEEAAC042F451DC06D0EFF227A80F6A91388


Kind regards,
@Mirkec
in collaboration with TeamOS ;)


Download links - version 1.0.231.0 (Size: 11.46 MB):


 

pascalwil

✅ Verified Member
Member
Downloaded
1.3 TB
Uploaded
36.2 TB
Ratio
28.55
Seedbonus
23,798
Upload Count
0 (0)
Member for 8 years
Thank you for the post
 
Top