Videos

Check out our video library AppCheck defending against newest ransomware, automatic recovery and real-time backup.

  • Distribution Method : Unknown
 
  • MD5 : 023c7e4d56905e9be212f304d89248a8
 
  • Major Detection Name : Trojan-Ransom.Win32.Blocker.kqwh (Kaspersky), Ransom:Win32/GandCrab.A (Microsoft)
 
  • Encrypted File Pattern : <Random Filename>.SYSTEM
 
  • Malicious File Creation Location : C:\ProgramData\<Random>.exe
 
  • Payment Instruction File : _HELP_INSTRUCTION.TXT
 
  • Major Characteristics :
         - Offline Encryption
         - CryptFile2 / CryptoShield / HydraCrypt / Mole / Revenge / Zeta Ransomware series

List

위로