
This is because the Avast Store is unable to load and function correctly without these settings enabled. When you make a purchase via the Avast Store, you may be notified that you need to enable JavaScript and / or cookies in your web browser. Even if the decryption keys are released to the public, using a decryption tool created by a reputable security company is the way to go.Enabling JavaScript and cookies in your web browser The Avast Decryption Tool for HermeticRansom allows victims of the Hermetic ransomware strain to unlock their files securely. Evidently, you should opt to do so to allow the Avast Decryption Tool for HermeticRansom to find all the encrypted files on your PC. There is also an option to run the decryption tool as an administrator. In other words, a backup should be created for encrypted files to avoid data loss. You are advised to backup the encrypted files, just in case anything goes wrong, especially since the tool cannot guarantee 100% compatibility between the original file and the decrypted one. Once you select the locations to scan, there is only one more step you need to go through before the scan begins. Backup encrypted files to avoid data loss

Drag and drop is supported, which makes everything even easier. The local drives are automatically detected and added to the list, but you can also add new locations, be they network drives or individual folders. The first step requires you to select the files and locations to scan.

Select local and network drives or single foldersĪs is usually the case with Avast’s ransomware decryption tools, the application is extremely easy to use, especially due to its wizard-based approach. Due to a vulnerability in the crypto schema, the Avast specialists were able to find the decryption keys and create the Avast Decryption Tool for HermeticRansom. The same happened with the ransomware strain that accompanies the Hermetic Wiper, first spotted in Ukraine by the ESET team. Avast is one of the security companies that fights ransomware by releasing dedicated decryption tools whenever they have the chance.
