Pondok Cabe
+1500024
daryusman@ecampus.ut.ac.id

Decryptor ransom baru

Selamat datang di daryusman.staff.ut.ac.id

Decryptor ransom baru

✅🔓[UPDATE] #STOP_Ransomware Decrypter for .gero | .hese | .kvag | .meds | .moka | .nesa | .peta and .seto

❗ONLY for files crypted by the OFFLINE KEY

ℹ Find the PesonalID.txt file on your infected machine. This file is in the folder C:\ SystemID\PesonalID.txt.

You will be able to check if there is only one or multiple ID.

If one of this ID is ending by t1 there is some chance that some or your files are crypted by the offline key and, when we will find it, you will be able to recover those files for free.

If you find ID not ending by t1 there are some bad chance that somes of your files are crypted by an online key and, for the moment, there are no way to decipher them except by paying the ransom to hackers. We highly recommand to victims not to pay any ransom to these criminal hackers because this is giving them strengh to continue this dirty business.

☑ Download: https://we.tl/t-JpXEaFB3oZ
☑ Backup all your encrypted files to an external drive before start decrypting.
☑ Start decrypter_2.exe
☑ copy and paste the key for your variant below:

You need copy-paste Private key with —–BEGIN PRIVATE KEY—– and —–END PRIVATE KEY—–

.seto = https://pastebin.com/xLM2Xxq2
.gero = https://pastebin.com/xUEq3Axq
.hese = https://pastebin.com/u6Rk8EVN
.kvag = https://pastebin.com/v1XM0Qvm
.meds = https://pastebin.com/VQumz2rC
.moka = https://pastebin.com/vcBS6C9E
.peta = https://pastebin.com/1hRYdvLw
.nesa = https://pastebin.com/T0aVkYnD

☑ Select the button Decrypt file to make a test with one file before selecting Decrypt Folder or Start.

ℹ Many victims have files crypted by both an online key and the offline key so it may not decrypt all your files.

ℹ Credit:
Emmanuel_ADC-Soft, Yousif_Ayman, Demonslay335

Leave a Reply

Your email address will not be published. Required fields are marked *