HKTL_RANSOMSIM
Publish Date: 29 Juni 2017
W32.Ransomsimulation (WebRoot), Win32:Dropper-gen [Drp] (Avg)
Plattform:
Windows
Risikobewertung (gesamt):
Schadenspotenzial::
Verteilungspotenzial::
reportedInfection:
Trend Micro Lösungen:
Niedrig
Mittel
Hoch
Kritisch
Malware-Typ:
Hacking Tool
Zerstrerisch?:
Nein
Verschlsselt?:
In the wild::
Ja
Überblick
Technische Details
Dateigröße: 9,598,464 bytes
Dateityp: EXE
Erste Muster erhalten am: 30 Mai 2017
Installation
Schleust die folgenden Dateien ein:
- {hacktool filepath}\logs\(year)_(month)_(day)_(time)_(millisecond)_log.csv
- {hacktool filepath}\datarst.csv
- {hacktool filepath}\{malware filename}.csv
- {hacktool filepath}\TestDirectory\TestFiles\c10.png
- {hacktool filepath}\TestDirectory\TestFiles\c11.png
- {hacktool filepath}\TestDirectory\TestFiles\c12.png
- {hacktool filepath}\TestDirectory\TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver\{value}_Archiver.dxd
- {hacktool filepath}\TestDirectory\Scenarios\Archiver\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\Archiver\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\{value}_InsideCryptor.dxd
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\{value}_LockyVariant.dxd
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover\{value}_Mover.dxd
- {hacktool filepath}\TestDirectory\Scenarios\Mover\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\Mover\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover\{value}_Remover.dxd
- {hacktool filepath}\TestDirectory\Scenarios\Remover\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\Remover\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer\{value}_Replacer.dxd
- {hacktool filepath}\TestDirectory\Scenarios\Replacer\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\Replacer\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer\{value}_Streamer.dxd
- {hacktool filepath}\TestDirectory\Scenarios\Streamer\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\Streamer\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\{value}_StrongCryptor.dxd
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\{value}_StrongCryptorFast.dxd
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\{value}_StrongCryptorNet.dxd
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\{value}_ThorVariant.dxd
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test3.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\{value}_WeakCryptor.dxd
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\datarst.csv
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\startfolder.log
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c10.png
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c11.png
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c12.png
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img10.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img11.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img12.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img20.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img21.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img22.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img30.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img31.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img32.jpg
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.csv
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.pdf
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.pptx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.csv
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.pdf
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.pptx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.csv
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.pdf
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.pptx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.xlsx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test1.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test2.docx
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test3.docx
Erstellt die folgenden Ordner:
- {hacktool filepath}\logs
- {hacktool filepath}\TestDirectory
- {hacktool filepath}\TestDirectory\TestFiles
- {hacktool filepath}\TestDirectory\Scenarios
- {hacktool filepath}\TestDirectory\Scenarios\Archiver
- {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor
- {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant
- {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\Mover
- {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\Remover
- {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\Replacer
- {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\Streamer
- {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet
- {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant
- {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor
- {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles