
A decryption tool for the TargetCompany ransomware Once you have the password, you can use it to unlock all the other locked files securely using this tool as well. To run the brute force attack and find the encryption key, the application requires you to provide an encrypted file. You can use the Avast Decryption Tool for TargetCompany to scan both drives and individual folders in batch. While the first targets the source of the infection and tries to block future actions of the ransomware, the latter is designed to help you decrypt locked files safely. If you suspect an infection with the TargetCompany ransomware, you can act using the power of a reliable antivirus tool and the Avast Decryption Tool for TargetCompany. You should be able to recognize the a TargetCompany attack by one of the following extensions: mallox, exploit, architek, carone, brg. A text ransom note is added on any valid drive and files are encrypted afterwards using the Chacha20 algorithm. Moreover, the booting configuration is reconfigured, and a few reporting services are killed.Īfter that, it is time for the malware to encrypt the content of your drives. It continues by deleting special file execution options and quietly removing shadow copies on all the machine’s drives. First, it blocks ownership actions and debugging processes, which can betray its presence.

Once it reaches a computer, the TargetCompany ransomware initiates its takeover work. Suggestively called the Avast Decryption Tool for TargetCompany, this application makes it possible to run a brute force attack and find the key that offers access to the all the encrypted files.

Avast released a dedicated decryption tool for the TargetCompany in the attempt to allow victims of the aforementioned ransomware to unlock their files securely, without having to pay a dime as a ransom to get the encryption key.
