- Distribution Method : Unknown
 
 - MD5 : 7af95ce95ce7f2bbccfea8358dc50bf5
 
 - Major Detection Name : Ransom:Win32/Cryck (Microsoft), Ransom.Win32.XCRY.SMTH (Trend Micro)
 
 - Encrypted File Pattern : .boooam@cock_li
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT_FILES.html
 - C:\Users\%UserName%\AppData\Roaming\encryption_key
 - C:\Users\%UserName%\AppData\Roaming\lock_file
 - C:\Users\%UserName%\AppData\Roaming\<Random>.exe 
 - Payment Instruction File : HOW_TO_DECRYPT_FILES.html
 
 - Major Characteristics :
 - Offline Encryption
 - Cypher Ransomware series 
 
					List