HKTL_RANSOMSIM

 Analysis by: John Kevin Sanchez

 ALIASES:

W32.Ransomsimulation (WebRoot), Win32:Dropper-gen [Drp] (Avg)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

9,598,464 bytes

File Type:

EXE

Initial Samples Received Date:

30 May 2017

Arrival Details

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Hacking Tool drops the following files:

  • {hacktool filepath}\logs\(year)_(month)_(day)_(time)_(millisecond)_log.csv
  • {hacktool filepath}\datarst.csv
  • {hacktool filepath}\{malware filename}.csv
  • {hacktool filepath}\TestDirectory\TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver\{value}_Archiver.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\{value}_InsideCryptor.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\{value}_LockyVariant.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover\{value}_Mover.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\Mover\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Mover\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover\{value}_Remover.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\Remover\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Remover\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer\{value}_Replacer.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer\{value}_Streamer.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\{value}_StrongCryptor.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\{value}_StrongCryptorFast.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\{value}_StrongCryptorNet.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\{value}_ThorVariant.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles\test3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\{value}_WeakCryptor.dxd
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\datarst.csv
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor\startfolder.log
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c10.png
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c11.png
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\c12.png
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img10.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img11.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img12.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img20.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img21.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img22.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img30.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img31.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\img32.jpg
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.csv
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA1.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.csv
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA2.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.csv
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.pdf
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.pptx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\MOCK_DATA3.xlsx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test1.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test2.docx
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles\test3.docx

It creates the following folders:

  • {hacktool filepath}\logs
  • {hacktool filepath}\TestDirectory
  • {hacktool filepath}\TestDirectory\TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver
  • {hacktool filepath}\TestDirectory\Scenarios\Archiver-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor
  • {hacktool filepath}\TestDirectory\Scenarios\InsideCryptor-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant
  • {hacktool filepath}\TestDirectory\Scenarios\LockyVariant-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\Mover
  • {hacktool filepath}\TestDirectory\Scenarios\Mover-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\Remover
  • {hacktool filepath}\TestDirectory\Scenarios\Remover-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer
  • {hacktool filepath}\TestDirectory\Scenarios\Replacer-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer
  • {hacktool filepath}\TestDirectory\Scenarios\Streamer-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptor-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorFast-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet
  • {hacktool filepath}\TestDirectory\Scenarios\StrongCryptorNet-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant
  • {hacktool filepath}\TestDirectory\Scenarios\ThorVariant-TestFiles
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor
  • {hacktool filepath}\TestDirectory\Scenarios\WeakCryptor-TestFiles