A new tool analyses the ransom note and the encrypted file in order to offer the appropriate decryption tool – if it exists.

Leave a Reply