{"id":295,"date":"2023-09-29T19:41:44","date_gmt":"2023-09-30T02:41:44","guid":{"rendered":"http:\/\/improdango.com\/?page_id=295"},"modified":"2023-09-30T08:26:13","modified_gmt":"2023-09-30T15:26:13","slug":"dfir-report","status":"publish","type":"page","link":"http:\/\/improdango.com\/?page_id=295","title":{"rendered":"DFIR Report Dataset"},"content":{"rendered":"\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=268\" data-type=\"page\" data-id=\"268\">&#x2196; Data<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p class=\"has-text-align-center has-extra-small-font-size\"><a href=\"http:\/\/improdango.com\/?page_id=297\" data-type=\"page\" data-id=\"297\">Intrusion Detection Evaluation Dataset &#x2197;<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:25% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/DFIR_Report.jpg\" alt=\"\" class=\"wp-image-279 size-full\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/DFIR_Report.jpg 200w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/DFIR_Report-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<ul class=\"wp-block-list\">\n<li>Accessed DFIR Report data via API&nbsp;to relevant report.\u200b<\/li>\n\n\n\n<li>Inserted results into a table.<\/li>\n\n\n\n<li>Table currently consists of 413 records.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-text-color has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"color:#000000;background-color:#ffffff\">\n<div class=\"wp-block-wpdatatables-wpdatatables-gutenberg-block\">\n<div class=\"wpdt-c\">\n    \n<input type=\"hidden\" id=\"wdtNonceFrontendEdit\" name=\"wdtNonceFrontendEdit\" value=\"f820638e11\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F295\" \/>    <input type=\"hidden\" id=\"table_1_desc\" value='{\"tableId\":\"table_1\",\"tableType\":\"csv\",\"selector\":\"#table_1\",\"responsive\":true,\"responsiveAction\":\"icon\",\"infoBlock\":true,\"pagination\":1,\"paginationAlign\":\"right\",\"paginationLayout\":\"full_numbers\",\"file_location\":\"wp_media_lib\",\"globalSearch\":true,\"showRowsPerPage\":true,\"hideBeforeLoad\":true,\"number_format\":1,\"decimalPlaces\":2,\"spinnerSrc\":\"http:\\\/\\\/improdango.com\\\/wp-content\\\/plugins\\\/wpdatatables\\\/assets\\\/\\\/img\\\/spinner.gif\",\"groupingEnabled\":false,\"tableWpId\":2,\"dataTableParams\":{\"sDom\":\"BT\\u003C\\u0027clear\\u0027\\u003Elf\\u003C\\u0027wdtscroll\\u0027t\\u003Eip\",\"bSortCellsTop\":false,\"bPaginate\":true,\"sPaginationType\":\"full_numbers\",\"aLengthMenu\":[[1,5,10,25,50,100,-1],[1,5,10,25,50,100,\"All\"]],\"iDisplayLength\":10,\"columnDefs\":[{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Description\",\"origHeader\":\"Description\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-description\",\"aTargets\":[0]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Extensions\",\"origHeader\":\"Extensions\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-extensions\",\"aTargets\":[1]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Extension Pattern\",\"origHeader\":\"Extension Pattern\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-extension-pattern\",\"aTargets\":[2]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Ransom Note Filename(s)\",\"origHeader\":\"Ransom Note Filename(s)\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-ransom-note-filenames\",\"aTargets\":[3]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Comment\",\"origHeader\":\"Comment\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-comment\",\"aTargets\":[4]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Encryption Algorithm\",\"origHeader\":\"Encryption Algorithm\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-encryption-algorithm\",\"aTargets\":[5]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Also known as\",\"origHeader\":\"Also known as\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-also-known-as\",\"aTargets\":[6]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Date Added\\\/Modified\",\"origHeader\":\"Date Added\\\/Modified\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-date-addedmodified\",\"aTargets\":[7]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Decryptor\",\"origHeader\":\"Decryptor\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-decryptor\",\"aTargets\":[8]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Info 1\",\"origHeader\":\"Info 1\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-info-1\",\"aTargets\":[9]},{\"sType\":\"string\",\"wdtType\":\"link\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"Info 2\",\"origHeader\":\"Info 2\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-info-2\",\"aTargets\":[10]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"IOCs (Network Based Indicators)\",\"origHeader\":\"IOCs (Network Based Indicators)\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-iocs-network-based-indicators\",\"aTargets\":[11]},{\"sType\":\"string\",\"wdtType\":\"string\",\"bVisible\":true,\"orderable\":true,\"searchable\":true,\"InputType\":\"text\",\"name\":\"IOCs (Host-Based Indicators)\",\"origHeader\":\"IOCs (Host-Based Indicators)\",\"notNull\":false,\"conditionalFormattingRules\":[],\"className\":\" column-iocs-host-based-indicators\",\"aTargets\":[12]}],\"bAutoWidth\":false,\"order\":[[0,\"asc\"]],\"ordering\":true,\"buttons\":[{\"extend\":\"print\",\"exportOptions\":{\"columns\":\":visible\",\"stripHtml\":true},\"className\":\"DTTT_button DTTT_button_print\",\"title\":\"DFIR_Report\",\"text\":\"Print\"},{\"extend\":\"excelHtml5\",\"exportOptions\":{\"columns\":\":visible\",\"stripHtml\":true},\"className\":\"DTTT_button DTTT_button_xls\",\"filename\":\"DFIR_Report\",\"title\":null,\"text\":\"Excel\"},{\"extend\":\"csvHtml5\",\"exportOptions\":{\"columns\":\":visible\",\"stripHtml\":true},\"className\":\"DTTT_button DTTT_button_csv\",\"title\":\"DFIR_Report\",\"text\":\"CSV\"},{\"extend\":\"copyHtml5\",\"exportOptions\":{\"columns\":\":visible\",\"stripHtml\":true},\"className\":\"DTTT_button DTTT_button_copy\",\"filename\":\"DFIR_Report\",\"title\":null,\"text\":\"Copy\"}],\"oSearch\":{\"bSmart\":false,\"bRegex\":false,\"sSearch\":\"\"}},\"currentSkin\":\"skin1\",\"tabletWidth\":\"1024\",\"mobileWidth\":\"480\",\"columnsFixed\":0,\"timeFormat\":\"h:i A\",\"datepickFormat\":\"dd\\\/mm\\\/yy\"}'\/>\n\n    <table id=\"table_1\"\n           class=\"scroll           responsive           display nowrap data-t wpDataTable wpDataTableID-2\"\n           style=\"display: none; \"\n           data-described-by='table_1_desc'\n           data-wpdatatable_id=\"2\">\n        \n        <!-- Table header -->\n        \n<thead>\n<tr>\n                    <th\n        data-class=\"expand\"                class=\" wdtheader sort \"\n        style=\"\">Description<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Extensions<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Extension Pattern<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Ransom Note Filename(s)<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Comment<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Encryption Algorithm<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Also known as<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Date Added\/Modified<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Decryptor<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Info 1<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">Info 2<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">IOCs (Network Based Indicators)<\/th>        <th\n                        class=\" wdtheader sort \"\n        style=\"\">IOCs (Host-Based Indicators)<\/th>    <\/tr>\n<\/thead>\n        <!-- \/Table header -->\n\n        <!-- Table body -->\n        \n<tbody>\n        <tr id=\"table_2_row_0\">\n                    <td style=\"\">.CryptoHasYou.<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR_FILES_ARE_LOCKED.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/CryptoHasYou.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_1\">\n                    <td style=\"\">777<\/td>\n                    <td style=\"\">0.777<\/td>\n                    <td style=\"\">._[timestamp]_$[email]$.777\ne.g. ._14-05-2016-11-59-36_$ninja.gaiver@aol.com$.777<\/td>\n                    <td style=\"\">read_this_file.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">XOR<\/td>\n                    <td style=\"\">Sevleg<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/777<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_2\">\n                    <td style=\"\">7ev3n<\/td>\n                    <td style=\"\">.R4A\n.R5A<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">FILES_BACK.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">7ev3n-HONE$T<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/hasherezade\/malware_analysis\/tree\/master\/7ev3n\nhttps:\/\/www.youtube.com\/watch?v=RDNbH5HDO1E&feature=youtu.be<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/7ev3n-HONE$T.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_3\">\n                    <td style=\"\">7h9r<\/td>\n                    <td style=\"\">.7h9r<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README_.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/7h9r.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_4\">\n                    <td style=\"\">8lock8<\/td>\n                    <td style=\"\">.8lock8<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/614025\/8lock8-help-support-topic-8lock8-read-ittxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_5\">\n                    <td style=\"\">AiraCrop<\/td>\n                    <td style=\"\">._AiraCropEncrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">How to decrypt your files.txt<\/td>\n                    <td style=\"\">related to TeamXRat<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/796079699478900736<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_6\">\n                    <td style=\"\">Al-Namrood<\/td>\n                    <td style=\"\">.unavailable\n.disappeared<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Read_Me.Txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/al-namrood<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_7\">\n                    <td style=\"\">Alcatraz Locker<\/td>\n                    <td style=\"\">.Alcatraz<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ransomed.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/792796055020642304<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_8\">\n                    <td style=\"\">ALFA Ransomware<\/td>\n                    <td style=\"\">.bin<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README HOW TO DECRYPT YOUR FILES.HTML<\/td>\n                    <td style=\"\">Made by creators of Cerber<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-alfa-or-alpha-ransomware-from-the-same-devs-as-cerber\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_9\">\n                    <td style=\"\">Alma Ransomware<\/td>\n                    <td style=\"\">random<\/td>\n                    <td style=\"\">random(x5)<\/td>\n                    <td style=\"\">Unlock_files_randomx5.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/cta-service-cms2.hubspot.com\/ctas\/v2\/public\/cs\/c\/?cta_guid=d4173312-989b-4721-ad00-8308fff353b3&placement_guid=22f2fe97-c748-4d6a-9e1e-ba3fb1060abe&portal_id=326665&redirect_url=APefjpGnqFjmP_xzeUZ1Y55ovglY1y1ch7CgMDLit5GTHcW9N0ztpnIE-ZReqqv8MDj687_4Joou7Cd2rSx8-De8uhFQAD_Len9QpT7Xvu8neW5drkdtTPV7hAaou0osAi2O61dizFXibewmpO60UUCd5OazCGz1V6yT_3UFMgL0x9S1VeOvoL_ucuER8g2H3f1EfbtYBw5QFWeUmrjk-9dGzOGspyn303k9XagBtF3SSX4YWSyuEs03Vq7Fxb04KkyKc4GJx-igK98Qta8iMafUam8ikg8XKPkob0FK6Pe-wRZ0QVWIIkM&hsutk=34612af1cd87864cf7162095872571d1&utm_referrer=https%3A%2F%2Finfo.phishlabs.com%2Fblog%2Falma-ransomware-analysis-of-a-new-ransomware-threat-and-a-decrypter&canon=https%3A%2F%2Finfo.phishlabs.com%2Fblog%2Falma-ransomware-analysis-of-a-new-ransomware-threat-and-a-decrypter&__hstc=61627571.34612af1cd87864cf7162095872571d1.1472135921345.1472140656779.1472593507113.3&__hssc=61627571.1.1472593507113&__hsfp=1114323283<\/td>\n                    <td style=\"\">https:\/\/info.phishlabs.com\/blog\/alma-ransomware-analysis-of-a-new-ransomware-threat-and-a-decrypter<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/new-alma-locker-ransomware-being-distributed-via-the-rig-exploit-kit\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/new-alma-locker-ransomware-being-distributed-via-the-rig-exploit-kit\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_10\">\n                    <td style=\"\">Alpha Ransomware<\/td>\n                    <td style=\"\">.encrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Read Me (How Decrypt) !!!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">AlphaLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/download.bleepingcomputer.com\/demonslay335\/AlphaDecrypter.zip<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/decrypted-alpha-ransomware-continues-the-trend-of-accepting-amazon-cards\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwarebread\/status\/804714048499621888' rel='' target=''>https:\/\/twitter.com\/malwarebread\/status\/804714048499621888<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_11\">\n                    <td style=\"\">Alphabet<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Doesn't encrypt any files \/ provides you the key<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/812331918633172992<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_12\">\n                    <td style=\"\">AMBA<\/td>\n                    <td style=\"\">.amba<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\u041f\u0420\u041e\u0427\u0422\u0418_\u041c\u0415\u041d\u042f.txt\nREAD_ME.txt<\/td>\n                    <td style=\"\">Websites only\namba@riseup.net<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/benkow_\/status\/747813034006020096<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_13\">\n                    <td style=\"\">Angela Merkel<\/td>\n                    <td style=\"\">.angelamerkel<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/798268218364358656<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_14\">\n                    <td style=\"\">AngleWare<\/td>\n                    <td style=\"\">.AngleWare<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_ME.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/844531418474708993<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_15\">\n                    <td style=\"\">Angry Duck<\/td>\n                    <td style=\"\">.adk<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Demands 10 BTC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/790334746488365057<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_16\">\n                    <td style=\"\">Anony<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear\nngocanh<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/842047409446387714<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_17\">\n                    <td style=\"\">Anubis<\/td>\n                    <td style=\"\">.coded<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Decryption Instructions.txt<\/td>\n                    <td style=\"\">EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/nyxbone.com\/malware\/Anubis.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_18\">\n                    <td style=\"\">Apocalypse<\/td>\n                    <td style=\"\">.encrypted\n.SecureCrypted\n.FuckYourData\n.unavailable\n.bleepYourFiles\n.Where_my_files.txt<\/td>\n                    <td style=\"\">[filename].ID-*8characters+countrycode[cryptservice@inbox.ru].[random7characters]\n*filename*.ID-[A-F0-9]{8}+countrycode[cryptcorp@inbox.ru].[a-z0-9]{13}<\/td>\n                    <td style=\"\">*.How_To_Decrypt.txt\n*.Contact_Here_To_Recover_Your_Files.txt\n*.Where_my_files.txt\n*.Read_Me.Txt\n*md5*.txt<\/td>\n                    <td style=\"\">decryptionservice@mail.ru\nrecoveryhelp@bk.ru\nransomware.attack@list.ru\nesmeraldaencryption@mail.ru\ndr.compress@bk.ru<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Fabiansomeware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/apocalypse<\/td>\n                    <td style=\"\">http:\/\/blog.emsisoft.com\/2016\/06\/29\/apocalypse-ransomware-which-targets-companies-through-insecure-rdp\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_19\">\n                    <td style=\"\">ApocalypseVM<\/td>\n                    <td style=\"\">.encrypted\n.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">*.How_To_Get_Back.txt<\/td>\n                    <td style=\"\">Apocalypse ransomware version which uses VMprotect<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/decrypter.emsisoft.com\/download\/apocalypsevm<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_20\">\n                    <td style=\"\">ASN1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!!!!readme!!!!!.htm<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/malwarebreakdown.com\/2017\/03\/02\/rig-ek-at-92-53-105-43-drops-asn1-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_21\">\n                    <td style=\"\">AutoLocky<\/td>\n                    <td style=\"\">.locky<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">info.txt\ninfo.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/autolocky<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_22\">\n                    <td style=\"\">Aw3s0m3Sc0t7<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/828902907668000770<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_23\">\n                    <td style=\"\">BadBlock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Help Decrypt.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/badblock<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/BadBlock.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_24\">\n                    <td style=\"\">BadEncript<\/td>\n                    <td style=\"\">.bript<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">More.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/813064189719805952<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_25\">\n                    <td style=\"\">BaksoCrypt<\/td>\n                    <td style=\"\">.adr<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on my-Little-Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/760482299007922176<\/td>\n                    <td style=\"\"><a href='https:\/\/0xc1r3ng.wordpress.com\/2016\/06\/24\/bakso-crypt-simple-ransomware\/' rel='' target=''>https:\/\/0xc1r3ng.wordpress.com\/2016\/06\/24\/bakso-crypt-simple-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_26\">\n                    <td style=\"\">Bandarchor<\/td>\n                    <td style=\"\">.id-1235240425_help@decryptservice.info<\/td>\n                    <td style=\"\">.id-[ID]_[EMAIL_ADDRESS]<\/td>\n                    <td style=\"\">HOW TO DECRYPT.txt<\/td>\n                    <td style=\"\">Files might be partially encrypted<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Rakhni<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/reaqta.com\/2016\/03\/bandarchor-ransomware-still-active\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/new-bandarchor-ransomware-variant-spreads-via-malvertising-on-adult-sites\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/new-bandarchor-ransomware-variant-spreads-via-malvertising-on-adult-sites\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_27\">\n                    <td style=\"\">BarRax<\/td>\n                    <td style=\"\">.BarRax<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/835668540367777792<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_28\">\n                    <td style=\"\">Bart<\/td>\n                    <td style=\"\">.bart.zip\n.bart\n.perl<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">recover.txt\nrecover.bmp<\/td>\n                    <td style=\"\">Possible affiliations with RockLoader, Locky and Dridex<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">BaCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/now.avg.com\/barts-shenanigans-are-no-match-for-avg\/<\/td>\n                    <td style=\"\">http:\/\/phishme.com\/rockloader-downloading-new-ransomware-bart\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/New-Bart-Ransomware-from-Threat-Actors-Spreading-Dridex-and-Locky' rel='' target=''>https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/New-Bart-Ransomware-from-Threat-Actors-Spreading-Dridex-and-Locky<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_29\">\n                    <td style=\"\">BitCryptor<\/td>\n                    <td style=\"\">.clf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Has a GUI.\nCryptoGraphic Locker family. Newer CoinVault variant.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/noransom.kaspersky.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_30\">\n                    <td style=\"\">BitStak<\/td>\n                    <td style=\"\">.bitstak<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Base64 + String Replacement<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/BitStakDecrypter.zip<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_31\">\n                    <td style=\"\">BlackShades Crypter<\/td>\n                    <td style=\"\">.Silent<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Hacked_Read_me_to_decrypt_files.html\nYourID.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">SilentShade<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/nyxbone.com\/malware\/BlackShades.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_32\">\n                    <td style=\"\">Blocatto<\/td>\n                    <td style=\"\">.blocatto<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/614456\/bloccato-ransomware-bloccato-help-support-leggi-questo-filetxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_33\">\n                    <td style=\"\">Booyah<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">EXE was replaced to neutralize threat<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Salam!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_34\">\n                    <td style=\"\">Brazilian<\/td>\n                    <td style=\"\">.lock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">MENSAGEM.txt<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/brazilianRansom.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_35\">\n                    <td style=\"\">Brazilian Globe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">.id-%ID%_garryweber@protonmail.ch<\/td>\n                    <td style=\"\">HOW_OPEN_FILES.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/821831437884211201<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_36\">\n                    <td style=\"\">BrLock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/ransomware-explosion-continues-cryptflle2-brlock-mm-locker-discovered<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_37\">\n                    <td style=\"\">Browlock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no local encryption, browser only<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_38\">\n                    <td style=\"\">BTCWare<\/td>\n                    <td style=\"\">.btcware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">#_HOW_TO_FIX_!.hta<\/td>\n                    <td style=\"\">Related to \/ new version of CryptXXX<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/845199679340011520<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_39\">\n                    <td style=\"\">Bucbi<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no file name change, no extension<\/td>\n                    <td style=\"\">GOST<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/researchcenter.paloaltonetworks.com\/2016\/05\/unit42-bucbi-ransomware-is-back-with-a-ukrainian-makeover\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_40\">\n                    <td style=\"\">BuyUnlockCode<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">(.*).encoded.([A-Z0-9]{9})<\/td>\n                    <td style=\"\">BUYUNLOCKCODE.txt<\/td>\n                    <td style=\"\">Does not delete Shadow Copies<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_41\">\n                    <td style=\"\">Central Security Treatment Organization<\/td>\n                    <td style=\"\">.cry<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!Recovery_[random_chars].html\n!Recovery_[random_chars].txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/625820\/central-security-treatment-organization-ransomware-help-topic-cry-extension\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_42\">\n                    <td style=\"\">Cerber<\/td>\n                    <td style=\"\">.cerber\n.cerber2\n.cerber3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"># DECRYPT MY FILES #.html\n# DECRYPT MY FILES #.txt\n# DECRYPT MY FILES #.vbs\n# README.hta\n_{RAND}_README.jpg\n_{RAND}_README.hta\n_HELP_DECRYPT_[A-Z0-9]{4-8}_.jpg\n_HELP_DECRYPT_[A-Z0-9]{4-8}_.hta\n_HELP_HELP_HELP_%random%.jpg\n_HELP_HELP_HELP_%random%.hta\n_HOW_TO_DECRYPT_[A-Z0-9]{4-8}_.jpg\n_HOW_TO_DECRYPT_[A-Z0-9]{4-8}_.hta<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/03\/cerber-ransomware-new-but-mature\/<\/td>\n                    <td style=\"\"><a href='https:\/\/community.rsa.com\/community\/products\/netwitness\/blog\/2016\/11\/04\/the-evolution-of-cerber-v410' rel='' target=''>https:\/\/community.rsa.com\/community\/products\/netwitness\/blog\/2016\/11\/04\/the-evolution-of-cerber-v410<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_43\">\n                    <td style=\"\">CerberTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/795630452128227333<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_44\">\n                    <td style=\"\">Chimera<\/td>\n                    <td style=\"\">.crypt\n4 random characters, e.g., .PzZs, .MKJL<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR_FILES_ARE_ENCRYPTED.HTML\nYOUR_FILES_ARE_ENCRYPTED.TXT\n<random>.gif<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/chimera-ransomware-decryption-keys-released-by-petya-devs\/<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2015\/12\/inside-chimera-ransomware-the-first-doxingware-in-wild\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_45\">\n                    <td style=\"\">CHIP<\/td>\n                    <td style=\"\">.CHIP\n.DALE<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CHIP_FILES.txt\nDALE_FILES.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/malware-traffic-analysis.net\/2016\/11\/17\/index.html<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/rig-e-exploit-kit-now-distributing-new-chip-ransomware\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/rig-e-exploit-kit-now-distributing-new-chip-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_46\">\n                    <td style=\"\">Click Me Game<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.youtube.com\/watch?v=Xe30kV4ip8w<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_47\">\n                    <td style=\"\">Clock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Does not encrypt anything<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/794956809866018816<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_48\">\n                    <td style=\"\">CloudSword<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Warning\u8b66\u544a.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/822653335681593345<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_49\">\n                    <td style=\"\">Cockblocker<\/td>\n                    <td style=\"\">.hannah<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/801910919739674624<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_50\">\n                    <td style=\"\">CoinVault<\/td>\n                    <td style=\"\">.clf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">wallpaper.jpg<\/td>\n                    <td style=\"\">CryptoGraphic Locker family. \nHas a GUI.\nDo not confuse with CrypVault!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/noransom.kaspersky.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_51\">\n                    <td style=\"\">Coverton<\/td>\n                    <td style=\"\">.coverton\n.enigma\n.czvxce<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!!-WARNING-!!!.html\n!!!-WARNING-!!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/paying-the-coverton-ransomware-may-not-get-your-data-back\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_52\">\n                    <td style=\"\">Crptxxx<\/td>\n                    <td style=\"\">.crptxxx<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_TO_FIX_!.txt<\/td>\n                    <td style=\"\">Uses @enigma0x3's UAC bypass<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/839467168760725508<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_53\">\n                    <td style=\"\">Cryaki<\/td>\n                    <td style=\"\">.{CRYPTENDBLACKDC}<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_54\">\n                    <td style=\"\">Crybola<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_55\">\n                    <td style=\"\">CryFile<\/td>\n                    <td style=\"\">.criptiko\n.criptoko\n.criptokod\n.cripttt\n.aga<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">SHTODELATVAM.txt\nInstructionaga.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Moves bytes<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/virusinfo.info\/showthread.php?t=185396<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_56\">\n                    <td style=\"\">CryLocker<\/td>\n                    <td style=\"\">.cry<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!Recovery_[random_chars].html\n!Recovery_[random_chars].txt<\/td>\n                    <td style=\"\">Identifies victim locations w\/Google Maps API<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Cry, CSTO, Central Security Treatment Organization<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-crylocker-ransomware-communicates-using-udp-and-stores-data-on-imgur-com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_57\">\n                    <td style=\"\">CrypMIC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README.TXT\nREADME.HTML\nREADME.BMP<\/td>\n                    <td style=\"\">CryptXXX clone\/spinoff<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/crypmic-ransomware-wants-to-follow-cryptxxx\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_58\">\n                    <td style=\"\">Crypren<\/td>\n                    <td style=\"\">.ENCRYPTED<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_THIS_TO_DECRYPT.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/pekeinfo\/DecryptCrypren<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Crypren.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_59\">\n                    <td style=\"\">Crypt38<\/td>\n                    <td style=\"\">.crypt38<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/Crypt38Keygen.zip<\/td>\n                    <td style=\"\">https:\/\/blog.fortinet.com\/2016\/06\/17\/buggy-russian-ransomware-inadvertently-allows-free-decryption<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_60\">\n                    <td style=\"\">CryptConsole<\/td>\n                    <td style=\"\">random<\/td>\n                    <td style=\"\">decipher_ne@outlook.com_[encrypted_filename]\nunCrypte@outlook.com_[encrypted_filename]<\/td>\n                    <td style=\"\">How decrypt files.hta<\/td>\n                    <td style=\"\">Impersonates the Globe Ransomware\nWill not actually encrypt files<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/638344\/cryptconsole-uncrypteoutlookcom-support-topic-how-decrypt-fileshta\/<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/824705553201057794<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_61\">\n                    <td style=\"\">Cryptear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Hidden Tear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.utkusen.com\/blog\/dealing-with-script-kiddies-cryptear-b-incident.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_62\">\n                    <td style=\"\">Crypter<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Does not actually encrypt the files, but simply renames them<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/802554159564062722<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_63\">\n                    <td style=\"\">CryptFIle2<\/td>\n                    <td style=\"\">.scl<\/td>\n                    <td style=\"\">id[_ID]email_xerx@usa.com.scl<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RSA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/ransomware-explosion-continues-cryptflle2-brlock-mm-locker-discovered<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_64\">\n                    <td style=\"\">CryptInfinite<\/td>\n                    <td style=\"\">.crinf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_65\">\n                    <td style=\"\">CryptoBit<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">OKSOWATHAPPENDTOYOURFILES.TXT<\/td>\n                    <td style=\"\">sekretzbel0ngt0us.KEY\ndo not confuse with CryptorBit<\/td>\n                    <td style=\"\">AES and RSA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.pandasecurity.com\/mediacenter\/panda-security\/cryptobit\/<\/td>\n                    <td style=\"\"><a href='http:\/\/news.softpedia.com\/news\/new-cryptobit-ransomware-could-be-decryptable-503239.shtml' rel='' target=''>http:\/\/news.softpedia.com\/news\/new-cryptobit-ransomware-could-be-decryptable-503239.shtml<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_66\">\n                    <td style=\"\">CryptoBlock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RaaS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/drProct0r\/status\/810500976415281154<\/td>\n                    <td style=\"\"><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/cryptoblock-and-its-c2\/' rel='' target=''>https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/cryptoblock-and-its-c2\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_67\">\n                    <td style=\"\">CryptoDefense<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_DECRYPT.TXT\nHOW_DECRYPT.HTML\nHOW_DECRYPT.URL<\/td>\n                    <td style=\"\">no extension change<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_68\">\n                    <td style=\"\">CryptoDevil<\/td>\n                    <td style=\"\">.devil<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/843527738774507522<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_69\">\n                    <td style=\"\">CryptoFinancial<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Ranscam<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/blog.talosintel.com\/2016\/07\/ranscam.html<\/td>\n                    <td style=\"\"><a href='https:\/\/nakedsecurity.sophos.com\/2016\/07\/13\/ransomware-that-demands-money-and-gives-you-back-nothing\/' rel='' target=''>https:\/\/nakedsecurity.sophos.com\/2016\/07\/13\/ransomware-that-demands-money-and-gives-you-back-nothing\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_70\">\n                    <td style=\"\">CryptoFortress<\/td>\n                    <td style=\"\">.frtrss<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ IF YOU WANT YOUR FILES BACK.html<\/td>\n                    <td style=\"\">Mimics Torrentlocker. Encrypts only 50% of each file up to 5 MB<\/td>\n                    <td style=\"\">AES(256), RSA (1024)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_71\">\n                    <td style=\"\">CryptoGraphic Locker<\/td>\n                    <td style=\"\">.clf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">wallpaper.jpg<\/td>\n                    <td style=\"\">Has a GUI.\nSubvariants: CoinVault\nBitCryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_72\">\n                    <td style=\"\">CryptoHost<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RAR's victim's files\nhas a GUI<\/td>\n                    <td style=\"\">AES(256) (RAR implementation)<\/td>\n                    <td style=\"\">Manamecrypt, Telograph, ROI Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/cryptohost-decrypted-locks-files-in-a-password-protected-rar-file\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_73\">\n                    <td style=\"\">CryptoJacky<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/838779371750031360<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_74\">\n                    <td style=\"\">CryptoJoker<\/td>\n                    <td style=\"\">.crjoker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README!!!.txt\nGetYouFiles.txt\ncrjoker.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES-256<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_75\">\n                    <td style=\"\">CryptoLocker<\/td>\n                    <td style=\"\">.encrypted \n.ENC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no longer relevant<\/td>\n                    <td style=\"\">RSA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.fireeye.com\/blog\/executive-perspective\/2014\/08\/your-locker-of-information-for-cryptolocker-decryption.html<\/td>\n                    <td style=\"\">https:\/\/reaqta.com\/2016\/04\/uncovering-ransomware-distribution-operation-part-2\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_76\">\n                    <td style=\"\">CryptoLocker 1.0.0<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/839747940122001408<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_77\">\n                    <td style=\"\">CryptoLocker 5.1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/782890104947867649<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_78\">\n                    <td style=\"\">CryptoLuck \/ YafunnLocker<\/td>\n                    <td style=\"\">.[victim_id]_luck<\/td>\n                    <td style=\"\">[A-F0-9]{8}_luck<\/td>\n                    <td style=\"\">%AppData%\\@WARNING_FILES_ARE_ENCRYPTED.[victim_id].txt.<\/td>\n                    <td style=\"\">via RIG EK<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/cryptoluck-ransomware-being-malvertised-via-rig-e-exploit-kits\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwareforme\/status\/798258032115322880' rel='' target=''>https:\/\/twitter.com\/malwareforme\/status\/798258032115322880<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_79\">\n                    <td style=\"\">CryptoMix<\/td>\n                    <td style=\"\">.code\n.scl\n.rmd\n.lesli\n.rdmk\n.CRYPTOSHIELD\n.CRYPTOSHIEL<\/td>\n                    <td style=\"\">.id_(ID_MACHINE)_email_xoomx@dr.com_.code\n.id_*_email_zeta@dr.com\n.id_(ID_MACHINE)_email_anx@dr.com_.scl\n.email[supl0@post.com]id[\\[[a-z0-9]{16}\\]].lesli\n*filename*.email[*email*]_id[*id*].rdmk<\/td>\n                    <td style=\"\">HELP_YOUR_FILES.html (CryptXXX)\nHELP_YOUR_FILES.txt (CryptoWall 3.0, 4.0)\nINSTRUCTION RESTORE FILE.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Zeta<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/CryptoMix.html<\/td>\n                    <td style=\"\"><a href='https:\/\/www.cert.pl\/en\/news\/single\/technical-analysis-of-cryptomixcryptfile2-ransomware\/' rel='' target=''>https:\/\/www.cert.pl\/en\/news\/single\/technical-analysis-of-cryptomixcryptfile2-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_80\">\n                    <td style=\"\">CryptON<\/td>\n                    <td style=\"\">_crypt\n.id-_locked\n.id-_locked_by_krec\n.id-_locked_by_perfect\n.id-_x3m\n.id-_r9oj\n.id-_garryweber@protonmail.ch\n.id-_steaveiwalker@india.com_\n.id-_julia.crown@india.com_\n.id-_tom.cruz@india.com_\n.id-_CarlosBoltehero@india.com_\n.id-_maria.lopez1@india.com_<\/td>\n                    <td style=\"\">name_crypt..extension<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RSA, AES-256 and SHA-256<\/td>\n                    <td style=\"\">Nemesis\nX3M<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/crypton<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/crypton-ransomware-is-here-and-its-not-so-bad-\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/JakubKroustek\/status\/829353444632825856' rel='' target=''>https:\/\/twitter.com\/JakubKroustek\/status\/829353444632825856<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_81\">\n                    <td style=\"\">CryptoRansomeware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/817672617658347521<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_82\">\n                    <td style=\"\">Cryptorium<\/td>\n                    <td style=\"\">.ENC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Only renames files and does not encrypt them<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_83\">\n                    <td style=\"\">CryptoRoger<\/td>\n                    <td style=\"\">.crptrgr<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!Where_are_my_files!.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-ransomware-called-cryptoroger-that-appends-crptrgr-to-encrypted-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_84\">\n                    <td style=\"\">CryptoShadow<\/td>\n                    <td style=\"\">.doomed<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">LEER_INMEDIATAMENTE.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/821992610164277248<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_85\">\n                    <td style=\"\">CryptoShield<\/td>\n                    <td style=\"\">.CRYPTOSHIELD<\/td>\n                    <td style=\"\">grfg.wct.CRYPTOSHIELD<\/td>\n                    <td style=\"\"># RESTORING FILES #.HTML\n# RESTORING FILES #.TXT<\/td>\n                    <td style=\"\">CryptoMix Variant<\/td>\n                    <td style=\"\">AES(256) \/ ROT-13<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/cryptomix-variant-named-cryptoshield-1-0-ransomware-distributed-by-exploit-kits\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_86\">\n                    <td style=\"\">CryptoShocker<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ATTENTION.url<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/617601\/cryptoshocker-ransomware-help-and-support-topic-locked-attentionurl\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_87\">\n                    <td style=\"\">CryptoTorLocker2015<\/td>\n                    <td style=\"\">.CryptoTorLocker2015!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW TO DECRYPT FILES.txt\n%Temp%\\<random>.bmp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/565020\/new-cryptotorlocker2015-ransomware-discovered-and-easily-decrypted\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_88\">\n                    <td style=\"\">CryptoTrooper<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/news.softpedia.com\/news\/new-open-source-linux-ransomware-shows-infosec-community-divide-508669.shtml<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_89\">\n                    <td style=\"\">CryptoWall 1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no filename change<\/td>\n                    <td style=\"\">DECRYPT_INSTRUCTION.HTML\nDECRYPT_INSTRUCTION.TXT\nDECRYPT_INSTRUCTION.URL\nINSTALL_TOR.URL<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_90\">\n                    <td style=\"\">CryptoWall 2<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no filename change<\/td>\n                    <td style=\"\">HELP_DECRYPT.TXT\nHELP_DECRYPT.PNG\nHELP_DECRYPT.URL\nHELP_DECRYPT.HTML<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_91\">\n                    <td style=\"\">CryptoWall 3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no filename change<\/td>\n                    <td style=\"\">HELP_DECRYPT.TXT\nHELP_DECRYPT.PNG\nHELP_DECRYPT.URL\nHELP_DECRYPT.HTML<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blogs.technet.microsoft.com\/mmpc\/2015\/01\/13\/crowti-update-cryptowall-3-0\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.virustotal.com\/en\/file\/45317968759d3e37282ceb75149f627d648534c5b4685f6da3966d8f6fca662d\/analysis\/' rel='' target=''>https:\/\/www.virustotal.com\/en\/file\/45317968759d3e37282ceb75149f627d648534c5b4685f6da3966d8f6fca662d\/analysis\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_92\">\n                    <td style=\"\">CryptoWall 4<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><random>.<random>, e.g.,\n27p9k967z.x1nep<\/td>\n                    <td style=\"\">HELP_YOUR_FILES.HTML\nHELP_YOUR_FILES.PNG<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_93\">\n                    <td style=\"\">CryptoWire<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/791554654664552448<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/-proof-of-concept-cryptowire-ransomware-spawns-lomix-and-ultralocker-families\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/-proof-of-concept-cryptowire-ransomware-spawns-lomix-and-ultralocker-families\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_94\">\n                    <td style=\"\">CryptXXX<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">de_crypt_readme.bmp, .txt, .html<\/td>\n                    <td style=\"\">Comes with Bedep<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptProjectXXX<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/virus-removal\/cryptxxx-ransomware-help-information<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_95\">\n                    <td style=\"\">CryptXXX 2.0<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><personal-ID>.txt, .html, .bmp<\/td>\n                    <td style=\"\">Locks screen. Ransom note names are an ID.\nComes with Bedep.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptProjectXXX<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/cryptxxx2-ransomware-authors-strike-back-against-free-decryption-tool<\/td>\n                    <td style=\"\"><a href='http:\/\/blogs.cisco.com\/security\/cryptxxx-technical-deep-dive' rel='' target=''>http:\/\/blogs.cisco.com\/security\/cryptxxx-technical-deep-dive<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_96\">\n                    <td style=\"\">CryptXXX 3.0<\/td>\n                    <td style=\"\">.crypt\n.cryp1\n.crypz\n.cryptz\nrandom<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Comes with Bedep<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">UltraDeCrypter\nUltraCrypter<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/cryptxxx-updated-to-version-3-0-decryptors-no-longer-work\/<\/td>\n                    <td style=\"\"><a href='http:\/\/blogs.cisco.com\/security\/cryptxxx-technical-deep-dive' rel='' target=''>http:\/\/blogs.cisco.com\/security\/cryptxxx-technical-deep-dive<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_97\">\n                    <td style=\"\">CryptXXX 3.1<\/td>\n                    <td style=\"\">.cryp1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">StilerX credential stealing<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/cryptxxx-ransomware-learns-samba-other-new-tricks-with-version3100<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_98\">\n                    <td style=\"\">CryPy<\/td>\n                    <td style=\"\">.cry<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README_FOR_DECRYPT.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_99\">\n                    <td style=\"\">Crysis<\/td>\n                    <td style=\"\">.bip<\/td>\n                    <td style=\"\">.id-[id].[email].bip<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Locks screen. Ransom note ask to contact 888@cock.email. Attack timeline shows machine was compromised by RDP bruteforce first then implant the ransomware as final step<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-arena-crysis-ransomware-variant-released\/<\/td>\n                    <td style=\"\"><a href='https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/brute-force-rdp-attacks-plant-crysis-ransomware\/' rel='' target=''>https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/brute-force-rdp-attacks-plant-crysis-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_100\">\n                    <td style=\"\">CTB-Faker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/ctb-faker-ransomware-does-a-poor-job-imitating-ctb-locker\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_101\">\n                    <td style=\"\">CTB-Locker<\/td>\n                    <td style=\"\">.ctbl<\/td>\n                    <td style=\"\">.([a-z]{6,7})<\/td>\n                    <td style=\"\">AllFilesAreLocked <user_id>.bmp\nDecryptAllFiles <user_id>.txt\n<random>.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RSA(2048)<\/td>\n                    <td style=\"\">Citroni<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_102\">\n                    <td style=\"\">CTB-Locker WEB<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">websites only<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/thisissecurity.net\/2016\/02\/26\/a-lockpicking-exercise\/<\/td>\n                    <td style=\"\"><a href='https:\/\/github.com\/eyecatchup\/Critroni-php' rel='' target=''>https:\/\/github.com\/eyecatchup\/Critroni-php<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_103\">\n                    <td style=\"\">CuteRansomware<\/td>\n                    <td style=\"\">.\u5df2\u52a0\u5bc6\n.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\u4f60\u7684\u6a94\u6848\u88ab\u6211\u5011\u52a0\u5bc6\u5566!!!.txt\nYour files encrypted by our friends !!! txt<\/td>\n                    <td style=\"\">Based on my-Little-Ransomware<\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\">my-Little-Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/aaaddress1\/my-Little-Ransomware\/tree\/master\/decryptoTool<\/td>\n                    <td style=\"\">https:\/\/github.com\/aaaddress1\/my-Little-Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_104\">\n                    <td style=\"\">Cyber SpLiTTer Vbs<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CyberSplitter<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/778871886616862720<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/struppigel\/status\/806758133720698881' rel='' target=''>https:\/\/twitter.com\/struppigel\/status\/806758133720698881<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_105\">\n                    <td style=\"\">Damage<\/td>\n                    <td style=\"\">.damage<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Written in Delphi<\/td>\n                    <td style=\"\">Combination of SHA-1 and Blowfish<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/damage<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/835664067843014656<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_106\">\n                    <td style=\"\">Dharma<\/td>\n                    <td style=\"\">.dharma\n.wallet\n.zzzzz\n.adobe<\/td>\n                    <td style=\"\">.<email>.(dharma|wallet|zzzzz)\n.id-%ID%.[moneymaker2@india.com].wallet<\/td>\n                    <td style=\"\">README.txt\nREADME.jpg\nInfo.hta<\/td>\n                    <td style=\"\">CrySiS variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/kaspersky-releases-decryptor-for-the-dharma-ransomware\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/632389\/dharma-ransomware-filenameemailwalletbipcmbarena-support-topic\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_107\">\n                    <td style=\"\">Deadly for a Good Purpose<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Encrypts in 2017<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/785533373007728640<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_108\">\n                    <td style=\"\">Death Bitches<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JaromirHorejsi\/status\/815555258478981121<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_109\">\n                    <td style=\"\">DeCrypt Protect<\/td>\n                    <td style=\"\">.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.malwareremovalguides.info\/decrypt-files-with-decrypt_mblblock-exe-decrypt-protect\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_110\">\n                    <td style=\"\">DEDCryptor<\/td>\n                    <td style=\"\">.ded<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/617395\/dedcryptor-ded-help-support-topic\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.nyxbone.com\/malware\/DEDCryptor.html' rel='' target=''>http:\/\/www.nyxbone.com\/malware\/DEDCryptor.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_111\">\n                    <td style=\"\">Demo<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_YOUR_FILES.txt<\/td>\n                    <td style=\"\">only encrypts .jpg files<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/798573300779745281<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_112\">\n                    <td style=\"\">Depsex<\/td>\n                    <td style=\"\">.Locked-by-Mafia<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_ME.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">MafiaWare<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/817069320937345024<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_113\">\n                    <td style=\"\">DeriaLock<\/td>\n                    <td style=\"\">.deria<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">unlock-everybody.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-derialock-ransomware-active-on-christmas-includes-an-unlock-all-command\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-derialock-ransomware-active-on-christmas-includes-an-unlock-all-command\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_114\">\n                    <td style=\"\">DetoxCrypto<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\">Based on Detox:\nCalipso\nWe are all Pokemons\nNullbyte<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-detoxcrypto-ransomware-pretends-to-be-pokemongo-or-uploads-a-picture-of-your-screen\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_115\">\n                    <td style=\"\">Digisom<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Digisom Readme0.txt (0 to 9)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/829727052316160000<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_116\">\n                    <td style=\"\">DirtyDecrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/752586334527709184<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_117\">\n                    <td style=\"\">DMALocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">cryptinfo.txt\ndecrypting.txt\nstart.txt<\/td>\n                    <td style=\"\">no extension change\nEncrypted files have prefix:\nVersion 1: ABCXYZ11\nVersion 2: !DMALOCK\nVersion 3: !DMALOCK3.0\nVersion 4: !DMALOCK4.0<\/td>\n                    <td style=\"\">AES(256) in ECB mode, \nVersion 2-4 also RSA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/\nhttps:\/\/github.com\/hasherezade\/dma_unlocker\nhttps:\/\/drive.google.com\/drive\/folders\/0Bzb5kQFOXkiSMm94QzdyM3hCdDg<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/02\/dma-locker-a-new-ransomware-but-no-reason-to-panic\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_118\">\n                    <td style=\"\">DMALocker 3.0<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no extension change<\/td>\n                    <td style=\"\">AES(256)\nXPTLOCK5.0<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/drive.google.com\/drive\/folders\/0Bzb5kQFOXkiSMm94QzdyM3hCdDg<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/02\/dma-locker-strikes-back\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_119\">\n                    <td style=\"\">DNRansomware<\/td>\n                    <td style=\"\">.fucked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Code to decrypt: 83KYG9NW-3K39V-2T3HJ-93F3Q-GT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/822500056511213568<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_120\">\n                    <td style=\"\">Domino<\/td>\n                    <td style=\"\">.domino<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README_TO_RECURE_YOUR_FILES.txt<\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Domino.html<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/the-curious-case-of-the-domino-ransomware-a-windows-crack-and-a-cow\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/the-curious-case-of-the-domino-ransomware-a-windows-crack-and-a-cow\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_121\">\n                    <td style=\"\">Donald Trump<\/td>\n                    <td style=\"\">.ENCRYPTED<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/the-donald-trump-ransomware-tries-to-build-walls-around-your-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_122\">\n                    <td style=\"\">DoNotChange<\/td>\n                    <td style=\"\">.id-7ES642406.cry\n.Do_not_change_the_filename<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW TO DECODE FILES!!!.txt\n\u041a\u0410\u041a \u0420\u0410\u0421\u0428\u0418\u0424\u0420\u041e\u0412\u0410\u0422\u042c \u0424\u0410\u0419\u041b\u042b!!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/643330\/donotchange-ransomware-id-7es642406cry-do-not-change-the-file-namecryp\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_123\">\n                    <td style=\"\">DummyLocker<\/td>\n                    <td style=\"\">.dCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/794108322932785158<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_124\">\n                    <td style=\"\">DXXD<\/td>\n                    <td style=\"\">.dxxd<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ReadMe.TxT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/627831\/dxxd-ransomware-dxxd-help-support-readmetxt\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/the-dxxd-ransomware-displays-legal-notice-before-users-login\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_125\">\n                    <td style=\"\">DynA-Crypt<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/dyna-crypt-not-only-encrypts-your-files-but-also-steals-your-info\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_126\">\n                    <td style=\"\">EDA2 \/ HiddenTear<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Open sourced C#<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Cryptear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_127\">\n                    <td style=\"\">EdgeLocker<\/td>\n                    <td style=\"\">.edgel<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/815392891338194945<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_128\">\n                    <td style=\"\">EduCrypt<\/td>\n                    <td style=\"\">.isis\n.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README.txt<\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">EduCrypter<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.filedropper.com\/decrypter_1<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/747031171347910656<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_129\">\n                    <td style=\"\">EiTest<\/td>\n                    <td style=\"\">.crypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BroadAnalysis\/status\/845688819533930497<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwrhunterteam\/status\/845652520202616832' rel='' target=''>https:\/\/twitter.com\/malwrhunterteam\/status\/845652520202616832<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_130\">\n                    <td style=\"\">El-Polocker<\/td>\n                    <td style=\"\">.ha3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">qwer.html\nqwer2.html \nlocked.bmp<\/td>\n                    <td style=\"\">Has a GUI<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Los Pollos Hermanos<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_131\">\n                    <td style=\"\">Encoder.xxxx<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Instructions.html<\/td>\n                    <td style=\"\">Coded in GO<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Trojan.Encoder.6491<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-october-14-2016-exotic-lockydump-comrade-and-more\/<\/td>\n                    <td style=\"\"><a href='http:\/\/vms.drweb.ru\/virus\/?_is=1&i=8747343' rel='' target=''>http:\/\/vms.drweb.ru\/virus\/?_is=1&i=8747343<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_132\">\n                    <td style=\"\">encryptoJJS<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">How to recover.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_133\">\n                    <td style=\"\">Enigma<\/td>\n                    <td style=\"\">.enigma\n.1txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">enigma.hta\nenigma_encr.txt\nenigma_info.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-enigma-ransomware-targets-russian-speaking-users\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_134\">\n                    <td style=\"\">Enjey<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on RemindMe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/839022018230112256<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_135\">\n                    <td style=\"\">EnkripsiPC<\/td>\n                    <td style=\"\">.fucked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">The encryption password is based on the computer name<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">IDRANSOMv3\nManifestus<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/811343914712100872<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/811264254481494016<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/struppigel\/status\/811587154983981056' rel='' target=''>https:\/\/twitter.com\/struppigel\/status\/811587154983981056<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_136\">\n                    <td style=\"\">Erebus<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Encrypt the extension using ROT-23<\/td>\n                    <td style=\"\">README.HTML<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/erebus-ransomware-utilizes-a-uac-bypass-and-request-a-90-ransom-payment\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_137\">\n                    <td style=\"\">Evil<\/td>\n                    <td style=\"\">.file0locked\n.evillock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Coded in Javascript<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/818443491713884161<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/PolarToffee\/status\/826508611878793219' rel='' target=''>https:\/\/twitter.com\/PolarToffee\/status\/826508611878793219<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_138\">\n                    <td style=\"\">Exotic<\/td>\n                    <td style=\"\">.exotic<\/td>\n                    <td style=\"\">random.exotic<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Also encrypts executables<\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/eviltwins-exotic-ransomware-targets-executable-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_139\">\n                    <td style=\"\">FabSysCrypto<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/837565766073475072<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_140\">\n                    <td style=\"\">Fadesoft<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/829768819031805953<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwrhunterteam\/status\/838700700586684416' rel='' target=''>https:\/\/twitter.com\/malwrhunterteam\/status\/838700700586684416<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_141\">\n                    <td style=\"\">Fairware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Target Linux O.S.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-fairware-ransomware-targeting-linux-computers\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_142\">\n                    <td style=\"\">Fakben<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ ME FOR DECRYPT.txt<\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.fortinet.com\/post\/fakben-team-ransomware-uses-open-source-hidden-tear-code<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_143\">\n                    <td style=\"\">FakeGlobe aka GlobeImposter<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_OPEN_FILES.hta<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/globeimposter<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/809795402421641216<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_144\">\n                    <td style=\"\">FakeCryptoLocker<\/td>\n                    <td style=\"\">.cryptolocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/812312402779836416<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_145\">\n                    <td style=\"\">Fantom<\/td>\n                    <td style=\"\">.fantom\n.comrade<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_YOUR_FILES.HTML\nRESTORE-FILES![id]<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\">Variants:\nComrade Circle<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/fantom-ransomware-encrypts-your-files-while-pretending-to-be-windows-update\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_146\">\n                    <td style=\"\">FenixLocker<\/td>\n                    <td style=\"\">.FenixIloveyou!!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Help to decrypt.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/fenixlocker<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/fwosar\/status\/777197255057084416<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_147\">\n                    <td style=\"\">FILE FROZR<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RaaS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/rommeljoven17\/status\/846973265650335744<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_148\">\n                    <td style=\"\">FileLocker<\/td>\n                    <td style=\"\">.ENCR<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/836616468775251968<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_149\">\n                    <td style=\"\">FireCrypt<\/td>\n                    <td style=\"\">.firecrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">[random_chars]-READ_ME.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/firecrypt-ransomware-comes-with-a-ddos-component\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_150\">\n                    <td style=\"\">Flyper<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on EDA2 \/ HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/773771485643149312<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_151\">\n                    <td style=\"\">Fonco<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">help-file-decrypt.enc\n<startupfolder>\/pronk.txt<\/td>\n                    <td style=\"\">contact email safefiles32@mail.ru also as prefix in encrypted file contents<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_152\">\n                    <td style=\"\">FortuneCookie<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/842302481774321664<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_153\">\n                    <td style=\"\">Free-Freedom<\/td>\n                    <td style=\"\">.madebyadam<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Unlock code is: adam or adamdude9<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Roga<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/812135608374226944<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_154\">\n                    <td style=\"\">FSociety<\/td>\n                    <td style=\"\">.fs0ciety\n.dll<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">fs0ciety.html\nDECRYPT_YOUR_FILES.HTML<\/td>\n                    <td style=\"\">Based on EDA2\nBased on RemindMe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/628199\/fs0ciety-locker-ransomware-help-support-fs0cietyhtml\/<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-fsociety-ransomware-pays-homage-to-mr-robot\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/siri_urz\/status\/795969998707720193' rel='' target=''>https:\/\/twitter.com\/siri_urz\/status\/795969998707720193<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_155\">\n                    <td style=\"\">Fury<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_156\">\n                    <td style=\"\">GhostCrypt<\/td>\n                    <td style=\"\">.Z81928819<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/GhostCryptDecrypter.zip<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/614197\/ghostcrypt-z81928819-help-support-topic-read-this-filetxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_157\">\n                    <td style=\"\">Gingerbread<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/ni_fi_70\/status\/796353782699425792<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_158\">\n                    <td style=\"\">Globe v1<\/td>\n                    <td style=\"\">.purge<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">How to restore files.hta<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Blowfish<\/td>\n                    <td style=\"\">Purge<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/success.trendmicro.com\/portal_kb_articledetail?solutionid=1114221<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-globe-ransomware-wants-to-purge-your-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_159\">\n                    <td style=\"\">Globe v2<\/td>\n                    <td style=\"\">.lovewindows\n.openforyou@india.com<\/td>\n                    <td style=\"\">.<email>.<random>\ne.g.: .7076.docx.okean-1955@india.com.!dsvgdfvdDVGR3SsdvfEF75sddf#xbkNY45fg6}P{cg<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Blowfish<\/td>\n                    <td style=\"\">Purge<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/success.trendmicro.com\/portal_kb_articledetail?solutionid=1114221<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_160\">\n                    <td style=\"\">Globe v3<\/td>\n                    <td style=\"\">.[random].blt\n.[random].encrypted\n.[random].raid10\n.[mia.kokers@aol.com]\n.[random].globe\n.unlockvt@india.com\n.rescuers@india.com.3392cYAn548QZeUf.lock\n.locked\n.decrypt2017\n.hnumkhotep<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Extesion depends on the config file. It seems Globe is a ransomware kit.<\/td>\n                    <td style=\"\">RC4\nAES(256)<\/td>\n                    <td style=\"\">Purge<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/globe3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_161\">\n                    <td style=\"\">GNL Locker<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><ID>.locked, e.g.,\nbill.!ID!8MMnF!ID!.locked<\/td>\n                    <td style=\"\">UNLOCK_FILES_INSTRUCTIONS.html and .txt<\/td>\n                    <td style=\"\">Only encrypts DE or NL country<\/td>\n                    <td style=\"\">AES (256)<\/td>\n                    <td style=\"\">Variants, from old to latest:\nZyklon Locker\nWildFire locker\nHades Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/611342\/gnl-locker-support-and-help-topic-locked-and-unlock-files-instructionshtml\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_162\">\n                    <td style=\"\">GOG<\/td>\n                    <td style=\"\">.L0CKED<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DecryptFile.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/816112218815266816<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_163\">\n                    <td style=\"\">Gomasom<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\">!___[EMAILADDRESS]_.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no ransom note<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_164\">\n                    <td style=\"\">Goopic<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Your files have been crypted.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/angler-shift-ek-landscape-new-crytpo-ransomware-activity\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_165\">\n                    <td style=\"\">Gopher<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">OS X ransomware (PoC)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_166\">\n                    <td style=\"\">Gremit<\/td>\n                    <td style=\"\">.rnsmwr<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/794444032286060544<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_167\">\n                    <td style=\"\">Guster<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/812131324979007492<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_168\">\n                    <td style=\"\">Hacked<\/td>\n                    <td style=\"\">.versiegelt\n.encrypted\n.payrmts\n.locked\n.Locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Jigsaw Ransomware variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/806878803507101696<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_169\">\n                    <td style=\"\">HappyDayzz<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">3DES\nAES(128)\nAES(192)\nAES(256)\nDES\nRC2\nRC4<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/847114064224497666<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_170\">\n                    <td style=\"\">Harasom<\/td>\n                    <td style=\"\">.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_171\">\n                    <td style=\"\">HDDCryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Uses https:\/\/diskcryptor.net for full disk encryption<\/td>\n                    <td style=\"\">Custom (net shares), XTS-AES (disk)<\/td>\n                    <td style=\"\">Mamba<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.linkedin.com\/pulse\/mamba-new-full-disk-encryption-ransomware-family-member-marinho<\/td>\n                    <td style=\"\"><a href='blog.trendmicro.com\/trendlabs-security-intelligence\/bksod-by-ransomware-hddcryptor-uses-commercial-tools-to-encrypt-network-shares-and-lock-hdds\/' rel='' target=''>blog.trendmicro.com\/trendlabs-security-intelligence\/bksod-by-ransomware-hddcryptor-uses-commercial-tools-to-encrypt-network-shares-and-lock-hdds\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_172\">\n                    <td style=\"\">Heimdall<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">File marker: \"Heimdall---\"<\/td>\n                    <td style=\"\">AES-128-CBC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/heimdall-open-source-php-ransomware-targets-web-servers\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_173\">\n                    <td style=\"\">Help_dcfile<\/td>\n                    <td style=\"\">.XXX<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">help_dcfile.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_174\">\n                    <td style=\"\">Herbst<\/td>\n                    <td style=\"\">.herbst<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.fortinet.com\/2016\/06\/03\/cooking-up-autumn-herbst-ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_175\">\n                    <td style=\"\">Hermes<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_INFORMATION.html\nUNIQUE_ID_DO_NOT_REMOVE<\/td>\n                    <td style=\"\">Filemarker: \"HERMES\"<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/642019\/hermes-ransomware-help-support-decrypt-informationhtml\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/hermes-ransomware-decrypted-in-live-video-by-emsisofts-fabian-wosar\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_176\">\n                    <td style=\"\">Hi Buddy!<\/td>\n                    <td style=\"\">.cry<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/hibuddy.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_177\">\n                    <td style=\"\">Hitler<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">removes extensions<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Deletes files<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/development-version-of-the-hitler-ransomware-discovered\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/jiriatvirlab\/status\/825310545800740864' rel='' target=''>https:\/\/twitter.com\/jiriatvirlab\/status\/825310545800740864<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_178\">\n                    <td style=\"\">HolyCrypt<\/td>\n                    <td style=\"\">(encrypted)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-python-ransomware-called-holycrypt-discovered\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_179\">\n                    <td style=\"\">HTCryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Includes a feature to disable the victim's windows firewall\nModified in-dev HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/803288396814839808<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_180\">\n                    <td style=\"\">Hucky<\/td>\n                    <td style=\"\">.locky<\/td>\n                    <td style=\"\">[a-zA-Z0-9+_-]{1,}.[a-z0-9]{3,4}.locky<\/td>\n                    <td style=\"\">_Adatok_visszaallitasahoz_utasitasok.txt\n_locky_recover_instructions.txt<\/td>\n                    <td style=\"\">Based on Locky<\/td>\n                    <td style=\"\">AES, RSA (hardcoded)<\/td>\n                    <td style=\"\">Hungarian Locky (Hucky)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.avast.com\/hucky-ransomware-a-hungarian-locky-wannabe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_181\">\n                    <td style=\"\">HydraCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">hydracrypt_ID_[\\w]{8}<\/td>\n                    <td style=\"\">README_DECRYPT_HYRDA_ID_[ID number].txt<\/td>\n                    <td style=\"\">CrypBoss Family<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\">http:\/\/www.malware-traffic-analysis.net\/2016\/02\/03\/index2.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_182\">\n                    <td style=\"\">IFN643<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/791576159960072192<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_183\">\n                    <td style=\"\">iLock<\/td>\n                    <td style=\"\">.crime<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/817085367144873985<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_184\">\n                    <td style=\"\">iLockLight<\/td>\n                    <td style=\"\">.crime<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_185\">\n                    <td style=\"\">International Police Association<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><6 random characters><\/td>\n                    <td style=\"\">%Temp%\\<random>.bmp<\/td>\n                    <td style=\"\">CryptoTorLocker2015 variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/download.bleepingcomputer.com\/Nathan\/StopPirates_Decrypter.exe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_186\">\n                    <td style=\"\">iRansom<\/td>\n                    <td style=\"\">.Locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/796134264744083460<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_187\">\n                    <td style=\"\">Jack.Pot<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/791639214152617985<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_188\">\n                    <td style=\"\">JagerDecryptor<\/td>\n                    <td style=\"\">!ENC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Important_Read_Me.html<\/td>\n                    <td style=\"\">Prepends filenames<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/757873976047697920<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_189\">\n                    <td style=\"\">JapanLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Base64 encoding, ROT13, and top-bottom swapping<\/td>\n                    <td style=\"\">shc Ransomware\nSyNcryption<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/fortiguard-lion\/schRansomwareDecryptor\/blob\/master\/schRansomwarev1_decryptor.php<\/td>\n                    <td style=\"\">https:\/\/blog.fortinet.com\/2016\/10\/19\/japanlocker-an-excavation-to-its-indonesian-roots<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_190\">\n                    <td style=\"\">Jeiphoos<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">readme_liesmich_encryptor_raas.txt<\/td>\n                    <td style=\"\">Windows, Linux. Campaign stopped. Actor claimed he deleted the master key.<\/td>\n                    <td style=\"\">RC6 (files), RSA 2048 (RC6 key)<\/td>\n                    <td style=\"\">Encryptor RaaS, Sarento<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/RaaS.html<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-rise-and-fall-of-encryptor-raas\/' rel='' target=''>http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-rise-and-fall-of-encryptor-raas\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_191\">\n                    <td style=\"\">Jhon Woddy<\/td>\n                    <td style=\"\">.killedXXX<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Same codebase as DNRansomware\nLock screen password is M3VZ>5BwGGVH<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/DoNotOpenDecrypter.zip<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/822509105487245317<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_192\">\n                    <td style=\"\">Jigsaw<\/td>\n                    <td style=\"\">.btc\n.kkk\n.fun\n.gws\n.porno\n.payransom\n.payms\n.paymst\n.AFD\n.paybtcs\n.epic\n.xyz\n.encrypted\n.hush\n.paytounlock\n.uk-dealer@sigaint.org\n.gefickt\n.nemo-hacks.at.sigaint.org<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Has a GUI<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">CryptoHitMan (subvariant)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/jigsaw-ransomware-decrypted-will-delete-your-files-until-you-pay-the-ransom\/<\/td>\n                    <td style=\"\">https:\/\/www.helpnetsecurity.com\/2016\/04\/20\/jigsaw-crypto-ransomware\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/demonslay335\/status\/795819556166139905' rel='' target=''>https:\/\/twitter.com\/demonslay335\/status\/795819556166139905<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_193\">\n                    <td style=\"\">Job Crypter<\/td>\n                    <td style=\"\">.locked\n.css<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Comment d\u00e9bloquer mes fichiers.txt\nReadme.txt<\/td>\n                    <td style=\"\">Based on HiddenTear, but uses TripleDES, decrypter is PoC<\/td>\n                    <td style=\"\">TripleDES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/jobcrypter.html\nhttp:\/\/forum.malekal.com\/jobcrypter-geniesanstravaille-extension-locked-crypto-ransomware-t54381.html<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwrhunterteam\/status\/828914052973858816' rel='' target=''>https:\/\/twitter.com\/malwrhunterteam\/status\/828914052973858816<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_194\">\n                    <td style=\"\">JohnyCryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_195\">\n                    <td style=\"\">Kaandsona<\/td>\n                    <td style=\"\">.kencf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Crashes before it encrypts<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">K\u00e4\u00e4nds\u00f5na\nRansomTroll<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/819927858437099520<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_196\">\n                    <td style=\"\">Kangaroo<\/td>\n                    <td style=\"\">.crypted_file<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">filename.Instructions_Data_Recovery.txt<\/td>\n                    <td style=\"\">From the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/the-kangaroo-ransomware-not-only-encrypts-your-data-but-tries-to-lock-you-out-of-windows\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_197\">\n                    <td style=\"\">Karma<\/td>\n                    <td style=\"\">.karma<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"># DECRYPT MY FILES #.html\n# DECRYPT MY FILES #.txt<\/td>\n                    <td style=\"\">pretends to be a Windows optimization program called Windows-TuneUp<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/researcher-finds-the-karma-ransomware-being-distributed-via-pay-per-install-network\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_198\">\n                    <td style=\"\">Karmen<\/td>\n                    <td style=\"\">.grt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RaaS\nBased on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/841747002438361089<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_199\">\n                    <td style=\"\">Kasiski<\/td>\n                    <td style=\"\">[KASISKI]<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">INSTRUCCIONES.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/MarceloRivero\/status\/832302976744173570<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_200\">\n                    <td style=\"\">KawaiiLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">How Decrypt Files.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/safezone.cc\/resources\/kawaii-decryptor.195\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_201\">\n                    <td style=\"\">KeRanger<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">OS X Ransomware<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/news.drweb.com\/show\/?i=9877&lng=en&c=5<\/td>\n                    <td style=\"\">http:\/\/www.welivesecurity.com\/2016\/03\/07\/new-mac-ransomware-appears-keranger-spread-via-transmission-app\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_202\">\n                    <td style=\"\">KeyBTC<\/td>\n                    <td style=\"\">keybtc@inbox_com<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_YOUR_FILES.txt\nREAD.txt\nreadme.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_203\">\n                    <td style=\"\">KEYHolder<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">how_decrypt.gif\nhow_decrypt.html<\/td>\n                    <td style=\"\">via remote attacker.\ntuyuljahat@hotmail.com contact address<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/559463\/keyholder-ransomware-support-and-help-topic-how-decryptgifhow-decrypthtml<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_204\">\n                    <td style=\"\">KillDisk<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/cyberx-labs.com\/en\/blog\/new-killdisk-malware-brings-ransomware-into-industrial-domain\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.welivesecurity.com\/2017\/01\/05\/killdisk-now-targeting-linux-demands-250k-ransom-cant-decrypt\/' rel='' target=''>http:\/\/www.welivesecurity.com\/2017\/01\/05\/killdisk-now-targeting-linux-demands-250k-ransom-cant-decrypt\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_205\">\n                    <td style=\"\">KillerLocker<\/td>\n                    <td style=\"\">.rip<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Possibly Portuguese dev<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/782232299840634881<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_206\">\n                    <td style=\"\">KimcilWare<\/td>\n                    <td style=\"\">.kimcilware\n.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">websites only<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.fortinet.com\/post\/kimcilware-ransomware-how-to-decrypt-encrypted-files-and-who-is-behind-it<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-kimcilware-ransomware-targets-web-sites-running-the-magento-platform\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_207\">\n                    <td style=\"\">Kirk<\/td>\n                    <td style=\"\">.Kirked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RANSOM_NOTE.txt<\/td>\n                    <td style=\"\">Payments in Monero<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.virustotal.com\/en\/file\/39a2201a88f10d81b220c973737f0becedab2e73426ab9923880fb0fb990c5cc\/analysis\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/star-trek-themed-kirk-ransomware-brings-us-monero-and-a-spock-decryptor\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_208\">\n                    <td style=\"\">Koolova<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">With Italian text that only targets the Test folder on the user's desktop<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/koolova-ransomware-decrypts-for-free-if-you-read-two-articles-about-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_209\">\n                    <td style=\"\">Korean<\/td>\n                    <td style=\"\">.\uc554\ud638\ud654\ub428<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ReadMe.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/koreanRansom.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_210\">\n                    <td style=\"\">Kostya<\/td>\n                    <td style=\"\">.kostya<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-october-14-2016-exotic-lockydump-comrade-and-more\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_211\">\n                    <td style=\"\">Kozy.Jozy<\/td>\n                    <td style=\"\">.31392E30362E32303136_[ID-KEY]_LSBJ1<\/td>\n                    <td style=\"\">.([0-9A-Z]{20})_([0-9]{2})_([A-Z0-9]{4,5})<\/td>\n                    <td style=\"\">w.jpg<\/td>\n                    <td style=\"\">Potential Kit\nselectedkozy.jozy@yahoo.com\nkozy.jozy@yahoo.com\nunlock92@india.com<\/td>\n                    <td style=\"\">RSA(2048)<\/td>\n                    <td style=\"\">QC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/KozyJozy.html<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/forums\/t\/617802\/kozyjozy-ransomware-help-support-wjpg-31392e30362e32303136-num-lsbj1\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/forums\/t\/617802\/kozyjozy-ransomware-help-support-wjpg-31392e30362e32303136-num-lsbj1\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_212\">\n                    <td style=\"\">Kraken<\/td>\n                    <td style=\"\">.kraken<\/td>\n                    <td style=\"\">[base64].kraken<\/td>\n                    <td style=\"\">_HELP_YOUR_FILES.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_213\">\n                    <td style=\"\">KratosCrypt<\/td>\n                    <td style=\"\">.kratos<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README_ALL.html<\/td>\n                    <td style=\"\">kratosdimetrici@gmail.com<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/746090483722686465<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_214\">\n                    <td style=\"\">KRider<\/td>\n                    <td style=\"\">.kr3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/836995570384453632<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_215\">\n                    <td style=\"\">KryptoLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">KryptoLocker_README.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_216\">\n                    <td style=\"\">LambdaLocker<\/td>\n                    <td style=\"\">.lambda_l0cked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.hTmL<\/td>\n                    <td style=\"\">Python Ransomware<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_217\">\n                    <td style=\"\">LanRan<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">@__help__@<\/td>\n                    <td style=\"\">Variant of open-source MyLittleRansomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/847689644854595584<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_218\">\n                    <td style=\"\">LeChiffre<\/td>\n                    <td style=\"\">.LeChiffre<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">How to decrypt LeChiffre files.html<\/td>\n                    <td style=\"\">Encrypts first 0x2000 and last 0x2000 bytes.\nVia remote attacker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/lechiffre<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/01\/lechiffre-a-manually-run-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_219\">\n                    <td style=\"\">Lick<\/td>\n                    <td style=\"\">.Licked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RANSOM_NOTE.txt<\/td>\n                    <td style=\"\">Variant of Kirk<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/842404866614038529<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_220\">\n                    <td style=\"\">Linux.Encoder<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Linux Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Linux.Encoder.{0,3}<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/labs.bitdefender.com\/2015\/11\/linux-ransomware-debut-fails-on-predictable-encryption-key\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_221\">\n                    <td style=\"\">LK Encryption<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/845183290873044994<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_222\">\n                    <td style=\"\">LLTP Locker<\/td>\n                    <td style=\"\">.ENCRYPTED_BY_LLTP\n.ENCRYPTED_BY_LLTPp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">LEAME.txt<\/td>\n                    <td style=\"\">Targeting Spanish speaking victims<\/td>\n                    <td style=\"\">AES-256<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-lltp-ransomware-appears-to-be-a-rewritten-venus-locker\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_223\">\n                    <td style=\"\">LockCrypt<\/td>\n                    <td style=\"\">.lock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ReadMe.TxT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">09\/29\/2017<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/648384\/lockcrypt-lock-support-topic-readmetxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_224\">\n                    <td style=\"\">Locked-In<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RESTORE_CORUPTED_FILES.HTML<\/td>\n                    <td style=\"\">Based on RemindMe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/634754\/locked-in-ransomware-help-support-restore-corupted-fileshtml\/<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/807169774098796544<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_225\">\n                    <td style=\"\">Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no extension change\nhas GUI<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/577246\/locker-ransomware-support-and-help-topic\/page-32#entry3721545<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_226\">\n                    <td style=\"\">LockLock<\/td>\n                    <td style=\"\">.locklock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_ME.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/626750\/locklock-ransomware-locklock-help-support\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_227\">\n                    <td style=\"\">Locky<\/td>\n                    <td style=\"\">.locky\n.zepto\n.odin\n.shit\n.thor\n.aesir\n.zzzzz\n.osiris\n.DIABLO6\n.lukitus<\/td>\n                    <td style=\"\">([A-F0-9]{32}).locky\n([A-F0-9]{32}).zepto\n([A-F0-9]{32}).odin\n([A-F0-9]{32}).shit\n([A-F0-9]{32}).thor\n([A-F0-9]{32}).aesir\n([A-F0-9]{32}).zzzzz\n([A-F0-9]{32}).osiris<\/td>\n                    <td style=\"\">_Locky_recover_instructions.txt\n_Locky_recover_instructions.bmp\n_HELP_instructions.txt\n_HELP_instructions.bmp\n_HOWDO_text.html\n_WHAT_is.html\n_INSTRUCTION.html\nDesktopOSIRIS.(bmp|htm)\nOSIRIS-[0-9]{4}.htm<\/td>\n                    <td style=\"\">Affiliations with Dridex and Necurs botnets\nIOCs: https:\/\/ghostbin.com\/paste\/7jm4j<\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">08\/08\/2017 - Diablo6 Locky variant added\n09\/28\/2017 - Lukitus Locky varinat added<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-locky-version-adds-the-zepto-extension-to-encrypted-files\/<\/td>\n                    <td style=\"\"><a href='WSF variant:\nhttp:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-locky-ransomware-spotted-in-the-brazilian-underground-market-uses-windows-script-files\/\n\nOdin:\nhttps:\/\/nakedsecurity.sophos.com\/2016\/10\/06\/odin-ransomware-takes-over-from-zepto-and-locky\/\n\nOSIRIS:\nhttps:\/\/www.bleepingcomputer.com\/news\/security\/locky-ransomware-switches-to-egyptian-mythology-with-the-osiris-extension\/' rel='' target=''>WSF variant:\nhttp:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-locky-ransomware-spotted-in-the-brazilian-underground-market-uses-windows-script-files\/\n\nOdin:\nhttps:\/\/nakedsecurity.sophos.com\/2016\/10\/06\/odin-ransomware-takes-over-from-zepto-and-locky\/\n\nOSIRIS:\nhttps:\/\/www.bleepingcomputer.com\/news\/security\/locky-ransomware-switches-to-egyptian-mythology-with-the-osiris-extension\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_228\">\n                    <td style=\"\">Lock93<\/td>\n                    <td style=\"\">.lock93<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/789882488365678592<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_229\">\n                    <td style=\"\">Lomix<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on the idiotic open-source ransomware called CryptoWire<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/siri_urz\/status\/801815087082274816<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_230\">\n                    <td style=\"\">Lortok<\/td>\n                    <td style=\"\">.crime<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_231\">\n                    <td style=\"\">LowLevel04<\/td>\n                    <td style=\"\">oor.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Prepends filenames<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_232\">\n                    <td style=\"\">M4N1F3STO<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Does not encrypt\nUnlock code=suckmydicknigga<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/808015275367002113<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_233\">\n                    <td style=\"\">Mabouia<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">OS X ransomware (PoC)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_234\">\n                    <td style=\"\">MacAndChess<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_235\">\n                    <td style=\"\">Magic<\/td>\n                    <td style=\"\">.magic<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_ReadMe1.TXT\nDECRYPT_ReadMe.TXT<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_236\">\n                    <td style=\"\">MaktubLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">[a-z]{4,6}<\/td>\n                    <td style=\"\">_DECRYPT_INFO_[extension pattern].html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256), RSA (2048)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/03\/maktub-locker-beautiful-and-dangerous\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_237\">\n                    <td style=\"\">Marlboro<\/td>\n                    <td style=\"\">.oops<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">_HELP_Recover_Files_.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">XOR<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/marlboro<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/marlboro-ransomware-defeated-in-one-day\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_238\">\n                    <td style=\"\">MarsJoke<\/td>\n                    <td style=\"\">.a19\n.ap19<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!! Readme For Decrypt !!!.txt\nReadMeFilesDecrypt!!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/securelist.ru\/blog\/issledovaniya\/29376\/polyglot-the-fake-ctb-locker\/<\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/MarsJoke-Ransomware-Mimics-CTB-Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_239\">\n                    <td style=\"\">MasterBuster<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CreatesReadThisFileImportant.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/791943837874651136<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_240\">\n                    <td style=\"\">Matrix<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">[5 numbers]-MATRIX-README.RTF<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">GnuPG<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/rommeljoven17\/status\/804251901529231360<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_241\">\n                    <td style=\"\">Meister<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Targeting French victims<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/siri_urz\/status\/840913419024945152<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_242\">\n                    <td style=\"\">Merry X-Mas!<\/td>\n                    <td style=\"\">.PEGS1\n.MRCR1\n.RARE1\n.MERRY\n.RMCM1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR_FILES_ARE_DEAD.HTA\nMERRY_I_LOVE_YOU_BRUCE.HTA<\/td>\n                    <td style=\"\">Written in Delphi<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">MRCR<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/mrcr<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/merry-christmas-ransomware-and-its-dev-comodosecurity-not-bringing-holiday-cheer\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/-merry-christmas-ransomware-now-steals-user-private-data-via-diamondfox-malware\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/-merry-christmas-ransomware-now-steals-user-private-data-via-diamondfox-malware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_243\">\n                    <td style=\"\">Meteoritan<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">where_are_your_files.txt\nreadme_your_files_have_been_encrypted.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/844614889620561924<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_244\">\n                    <td style=\"\">MIRCOP<\/td>\n                    <td style=\"\">Lock.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Prepends files\nDemands 48.48 BTC<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\">Crypt888<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/618457\/microcop-ransomware-help-support-lock-mircop\/\nhttps:\/\/www.avast.com\/ransomware-decryption-tools#!<\/td>\n                    <td style=\"\">http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/instruction-less-ransomware-mircop-channels-guy-fawkes\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.nyxbone.com\/malware\/Mircop.html' rel='' target=''>http:\/\/www.nyxbone.com\/malware\/Mircop.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_245\">\n                    <td style=\"\">MireWare<\/td>\n                    <td style=\"\">.fucked\n.fuck<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_246\">\n                    <td style=\"\">Mischa<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">.([a-zA-Z0-9]{4})<\/td>\n                    <td style=\"\">YOUR_FILES_ARE_ENCRYPTED.HTML\nYOUR_FILES_ARE_ENCRYPTED.TXT<\/td>\n                    <td style=\"\">Packaged with Petya\nPDFBewerbungsmappe.exe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\"Petya's little brother\"<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/petya-is-back-and-with-a-friend-named-mischa-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_247\">\n                    <td style=\"\">MM Locker<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.txt<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Booyah<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/ransomware-explosion-continues-cryptflle2-brlock-mm-locker-discovered<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_248\">\n                    <td style=\"\">Mobef<\/td>\n                    <td style=\"\">.KEYZ\n.KEYH0LES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">4-14-2016-INFECTION.TXT\nIMPORTANT.README<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Yakes\nCryptoBit<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/nyxbone.com\/malware\/Mobef.html<\/td>\n                    <td style=\"\"><a href='http:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-cryptobit-another-ransomware-family-gets-an-update\/' rel='' target=''>http:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-cryptobit-another-ransomware-family-gets-an-update\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_249\">\n                    <td style=\"\">Mole<\/td>\n                    <td style=\"\">.mole\n.mole02<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">INSTRUCTION_FOR_HELPING_FILE_RECOVERY.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptoMix<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/decryptor-released-for-the-mole02-cryptomix-ransomware-variant\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_250\">\n                    <td style=\"\">Monument<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Use the DarkLocker 5 porn screenlocker\nJigsaw variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/844826339186135040<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_251\">\n                    <td style=\"\">MOTD<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">motd.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/642409\/motd-ransomware-help-support-topics-motdtxt-and-enc-extension\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_252\">\n                    <td style=\"\">MSN CryptoLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RESTORE_YOUR_FILES.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/810766686005719040<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_253\">\n                    <td style=\"\">n1n1n1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">decrypt explanations.html<\/td>\n                    <td style=\"\">Filemaker: \"333333333333\"<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/790608484303712256<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/demonslay335\/status\/831891344897482754' rel='' target=''>https:\/\/twitter.com\/demonslay335\/status\/831891344897482754<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_254\">\n                    <td style=\"\">N-Splitter<\/td>\n                    <td style=\"\">.\u043a\u0438\u0431\u0435\u0440 \u0440\u0430\u0437\u0432\u0435\u0442\u0432\u0438\u0442\u0435\u043b\u044c<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Russian Koolova Variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/815961663644008448<\/td>\n                    <td style=\"\"><a href='https:\/\/www.youtube.com\/watch?v=dAVMgX8Zti4&feature=youtu.be&list=UU_TMZYaLIgjsdJMwurHAi4Q' rel='' target=''>https:\/\/www.youtube.com\/watch?v=dAVMgX8Zti4&feature=youtu.be&list=UU_TMZYaLIgjsdJMwurHAi4Q<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_255\">\n                    <td style=\"\">Nagini<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Looks for C:\\Temp\\voldemort.horcrux<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-nagini-ransomware-sics-voldemort-on-your-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_256\">\n                    <td style=\"\">NanoLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ATTENTION.RTF<\/td>\n                    <td style=\"\">no extension change\nhas a GUI<\/td>\n                    <td style=\"\">AES (256), RSA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/github.com\/Cyberclues\/nanolocker-decryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_257\">\n                    <td style=\"\">Nemucod<\/td>\n                    <td style=\"\">.crypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Decrypted.txt<\/td>\n                    <td style=\"\">7zip (a0.exe) variant cannot be decrypted\nEncrypts the first 2048 Bytes<\/td>\n                    <td style=\"\">XOR(255)\n7zip<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/nemucod\nhttps:\/\/github.com\/Antelox\/NemucodFR\nhttp:\/\/www.bleepingcomputer.com\/news\/security\/decryptor-released-for-the-nemucod-trojans-crypted-ransomware\/<\/td>\n                    <td style=\"\">https:\/\/blog.cisecurity.org\/malware-analysis-report-nemucod-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_258\">\n                    <td style=\"\">Netix<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">RANSOM_NETIX.A<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/netflix-scam-delivers-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_259\">\n                    <td style=\"\">NETWALKER<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_260\">\n                    <td style=\"\">Nhtnwcuf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!_RECOVERY_HELP_!.txt\nHELP_ME_PLEASE.txt<\/td>\n                    <td style=\"\">Does not encrypt the files \/ Files are destroyed<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/839221457360195589<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_261\">\n                    <td style=\"\">NMoreira<\/td>\n                    <td style=\"\">.maktub\n.__AiraCropEncrypted!\n.aac<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Recupere seus arquivos. Leia-me!.txt\nLearn how to recover your files.txt<\/td>\n                    <td style=\"\">.aac is the extension used by the new version seen in July, 2017<\/td>\n                    <td style=\"\">mix of RSA and AES-256<\/td>\n                    <td style=\"\">XRatTeam\nXPan\nAiraCrop<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/nmoreira<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/fwosar\/status\/803682662481174528<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_262\">\n                    <td style=\"\">NoobCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/757267550346641408<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/noobcrypt-ransomware-dev-shows-noobness-by-using-same-password-for-everyone\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/noobcrypt-ransomware-dev-shows-noobness-by-using-same-password-for-everyone\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_263\">\n                    <td style=\"\">Nuke<\/td>\n                    <td style=\"\">.nuclear55<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!_RECOVERY_instructions_!!.html\n!!_RECOVERY_instructions_!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_264\">\n                    <td style=\"\">Nullbyte<\/td>\n                    <td style=\"\">_nullbyte<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/NullByteDecrypter.zip<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/the-nullbyte-ransomware-pretends-to-be-the-necrobot-pokemon-go-application\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_265\">\n                    <td style=\"\">Ocelot<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Does not encrypt anything<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/817648547231371264<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_266\">\n                    <td style=\"\">ODCODC<\/td>\n                    <td style=\"\">.odcodc<\/td>\n                    <td style=\"\">C-email-abennaki@india.com-(NOMBRE_ARCHIVO.ext).odcodc<\/td>\n                    <td style=\"\">HOW_TO_RESTORE_FILES.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">XOR<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/download.bleepingcomputer.com\/BloodDolly\/ODCODCDecoder.zip<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/odcodc.html<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/PolarToffee\/status\/813762510302183424' rel='' target=''>https:\/\/twitter.com\/PolarToffee\/status\/813762510302183424<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_267\">\n                    <td style=\"\">Offline ransomware<\/td>\n                    <td style=\"\">.cbf<\/td>\n                    <td style=\"\">email-[params].cbf<\/td>\n                    <td style=\"\">desk.bmp\ndesk.jpg<\/td>\n                    <td style=\"\">email addresses overlap with .777 addresses<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Vipasana, Cryakl<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\">http:\/\/bartblaze.blogspot.com.co\/2016\/02\/vipasana-ransomware-new-ransom-on-block.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_268\">\n                    <td style=\"\">OMG! Ransomware<\/td>\n                    <td style=\"\">.LOL!\n.OMG!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">how to get data.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">GPCode<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_269\">\n                    <td style=\"\">Onyx<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Georgian ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/791557636164558848<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_270\">\n                    <td style=\"\">Operation Global III<\/td>\n                    <td style=\"\">.EXE<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Is a file infector (virus)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/news.thewindowsclub.com\/operation-global-iii-ransomware-decryption-tool-released-70341\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_271\">\n                    <td style=\"\">Owl<\/td>\n                    <td style=\"\">dummy_file.encrypted<\/td>\n                    <td style=\"\">dummy_file.encrypted.[extension]<\/td>\n                    <td style=\"\">log.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptoWire<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/842342996775448576<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_272\">\n                    <td style=\"\">OzozaLocker<\/td>\n                    <td style=\"\">.Locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW TO DECRYPT YOU FILES.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/ozozalocker<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/801503401867673603<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_273\">\n                    <td style=\"\">PadCrypt<\/td>\n                    <td style=\"\">.padcrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">IMPORTANT READ ME.txt\nFile Decrypt Help.html<\/td>\n                    <td style=\"\">has a live support chat<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/padcrypt-the-first-ransomware-with-live-support-chat-and-an-uninstaller\/<\/td>\n                    <td style=\"\"><a href='https:\/\/twitter.com\/malwrhunterteam\/status\/798141978810732544' rel='' target=''>https:\/\/twitter.com\/malwrhunterteam\/status\/798141978810732544<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_274\">\n                    <td style=\"\">Padlock Screenlocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Unlock code is: ajVr\/G\\RJz0R<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/811635075158839296<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_275\">\n                    <td style=\"\">Patcher<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README!.txt<\/td>\n                    <td style=\"\">Targeting macOS users<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/02\/decrypting-after-a-findzip-ransomware-infection\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-macos-patcher-ransomware-locks-data-for-good-no-way-to-recover-your-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_276\">\n                    <td style=\"\">PayDay<\/td>\n                    <td style=\"\">.sexy<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!!!!ATEN\u00c7\u00c3O!!!!!.html<\/td>\n                    <td style=\"\">Based off of Hidden-Tear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/808316635094380544<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_277\">\n                    <td style=\"\">PayDOS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Batch file\nPasscode: AES1014DW256<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Serpent<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-goes-retro-with-paydos-and-serpent-written-as-batch-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_278\">\n                    <td style=\"\">Paysafecard Generator 2016<\/td>\n                    <td style=\"\">.cry_<\/td>\n                    <td style=\"\">test.cry_jpg<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/796083768155078656<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_279\">\n                    <td style=\"\">PClock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Your files are locked !.txt\nYour files are locked !!.txt\nYour files are locked !!!.txt\nYour files are locked !!!!.txt\n%AppData%\\WinCL\\winclwp.jpg<\/td>\n                    <td style=\"\">CryptoLocker Copycat<\/td>\n                    <td style=\"\">XOR<\/td>\n                    <td style=\"\">CryptoLocker clone\nWinPlock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/old-cryptolocker-copycat-named-pclock-resurfaces-with-new-attacks\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_280\">\n                    <td style=\"\">PetrWrap<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/securelist.com\/blog\/research\/77762\/petrwrap-the-new-petya-based-ransomware-used-in-targeted-attacks\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_281\">\n                    <td style=\"\">Petya<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR_FILES_ARE_ENCRYPTED.TXT\nYOUR_FILES_ARE_ENCRYPTED.HTML\nREADME.TXT<\/td>\n                    <td style=\"\">- overwrites MBR\n- encrypts MFT\n- PDFBewerbungsmappe.exe\n- Symantec & FireEye have confirmed that the initial attack vector is MEDoc (tax account software)<\/td>\n                    <td style=\"\">Modified Salsa20<\/td>\n                    <td style=\"\">Goldeneye<\/td>\n                    <td style=\"\">29.09.2023<\/td>\n                    <td style=\"\">http:\/\/www.thewindowsclub.com\/petya-ransomware-decrypt-tool-password-generator\nhttps:\/\/www.youtube.com\/watch?v=mSqxFjZq_z4<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/04\/petya-ransomware\/ \nhttps:\/\/www.fireeye.com\/blog\/threat-research\/2017\/06\/petya-ransomware-spreading-via-eternalblue-exploit.html<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme\/\nhttps:\/\/symantec-blogs.broadcom.com\/blogs\/threat-intelligence\/petya-ransomware-wiper?om_ext_cid=biz_social_NAM_twitter_Asset%2520Type%2520%2520-%2520Blog,Petya' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/petya-ransomware-returns-with-goldeneye-version-continuing-james-bond-theme\/\nhttps:\/\/symantec-blogs.broadcom.com\/blogs\/threat-intelligence\/petya-ransomware-wiper?om_ext_cid=biz_social_NAM_twitter_Asset%2520Type%2520%2520-%2520Blog,Petya<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_282\">\n                    <td style=\"\">Philadelphia<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><file_hash>.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Coded by \"The_Rainmaker\"<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/philadelphia<\/td>\n                    <td style=\"\">www.bleepingcomputer.com\/news\/security\/the-philadelphia-ransomware-offers-a-mercy-button-for-compassionate-criminals\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_283\">\n                    <td style=\"\">Phobos<\/td>\n                    <td style=\"\">.phobos<\/td>\n                    <td style=\"\">file name[ID-000QQQ.hacker@AOL.com].phobos<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Rebranded Dharma Ransom Note<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.coveware.com\/blog\/phobos-ransomware-distributed-dharma-crew<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/forums\/t\/688649\/phobos-ransomware-help-topic-phobos-phoboshta\/page-2' rel='' target=''>https:\/\/www.bleepingcomputer.com\/forums\/t\/688649\/phobos-ransomware-help-topic-phobos-phoboshta\/page-2<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_284\">\n                    <td style=\"\">Phoenix<\/td>\n                    <td style=\"\">.R.i.P<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Important!.txt<\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/804810315456200704<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_285\">\n                    <td style=\"\">Pickles<\/td>\n                    <td style=\"\">.EnCrYpTeD<\/td>\n                    <td style=\"\">%random%.EnCrYpTeD<\/td>\n                    <td style=\"\">READ_ME_TO_DECRYPT.txt<\/td>\n                    <td style=\"\">Python Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/834821166116327425<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_286\">\n                    <td style=\"\">PizzaCrypts<\/td>\n                    <td style=\"\">.id-[victim_id]-maestro@pizzacrypts.info<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/download.bleepingcomputer.com\/BloodDolly\/JuicyLemonDecoder.zip<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_287\">\n                    <td style=\"\">PokemonGO<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/pokemonGO.html<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/pokemongo-ransomware-installs-backdoor-accounts-and-spreads-to-other-drives\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/pokemongo-ransomware-installs-backdoor-accounts-and-spreads-to-other-drives\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_288\">\n                    <td style=\"\">Popcorn Time<\/td>\n                    <td style=\"\">.filock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">restore_your_files.html\nrestore_your_files.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-scheme-spread-popcorn-time-ransomware-get-chance-of-free-decryption-key\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_289\">\n                    <td style=\"\">Polyglot<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Immitates CTB-Locker<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/8547<\/td>\n                    <td style=\"\">https:\/\/securelist.com\/blog\/research\/76182\/polyglot-the-fake-ctb-locker\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_290\">\n                    <td style=\"\">Potato<\/td>\n                    <td style=\"\">.potato<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README.png\nREADME.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_291\">\n                    <td style=\"\">PowerWare<\/td>\n                    <td style=\"\">.locky<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Open-sourced PowerShell<\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\">PoshCoder<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/pan-unit42\/public_tools\/blob\/master\/powerware\/powerware_decrypt.py\nhttps:\/\/download.bleepingcomputer.com\/demonslay335\/PowerLockyDecrypter.zip<\/td>\n                    <td style=\"\">https:\/\/www.carbonblack.com\/2016\/03\/25\/threat-alert-powerware-new-ransomware-written-in-powershell-targets-organizations-via-microsoft-word\/<\/td>\n                    <td style=\"\"><a href='http:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-powerware-ransomware-spoofing-locky-malware-family\/' rel='' target=''>http:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-powerware-ransomware-spoofing-locky-malware-family\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_292\">\n                    <td style=\"\">PowerWorm<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_INSTRUCTION.html\nlooks like CryptoWall 3, but with additional warnings at the bottom that ransom price will go up after some time<\/td>\n                    <td style=\"\">no decryption possible<\/td>\n                    <td style=\"\">AES, but throws key away, destroys the files<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_293\">\n                    <td style=\"\">Princess Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">[a-z]{4,6},[0-9]<\/td>\n                    <td style=\"\">!_HOW_TO_RESTORE_[extension].TXT\n!_HOW_TO_RESTORE_[extension].html\n!_HOW_TO_RESTORE_*id*.txt\n.*id*\n@_USE_TO_FIX_JJnY.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/hshrzd.wordpress.com\/2016\/11\/17\/princess-locker-decryptor\/<\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/introducing-her-royal-highness-the-princess-locker-ransomware\/<\/td>\n                    <td style=\"\"><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/11\/princess-ransomware\/' rel='' target=''>https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/11\/princess-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_294\">\n                    <td style=\"\">PRISM<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.enigmasoftware.com\/prismyourcomputerhasbeenlockedransomware-removal\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_295\">\n                    <td style=\"\">Project34<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\u041f\u0410\u0420\u041e\u041b\u042c.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_296\">\n                    <td style=\"\">ProposalCrypt<\/td>\n                    <td style=\"\">.crypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/demonslay335\/status\/812002960083394560<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/811613888705859586<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_297\">\n                    <td style=\"\">Ps2exe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/803297700175286273<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_298\">\n                    <td style=\"\">PyL33T<\/td>\n                    <td style=\"\">.d4nk<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Python Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/Jan0fficial\/status\/834706668466405377<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_299\">\n                    <td style=\"\">R<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Ransomware.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/846705481741733892<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_300\">\n                    <td style=\"\">R980<\/td>\n                    <td style=\"\">.crypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPTION INSTRUCTIONS.txt\nrtext.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/otx.alienvault.com\/pulse\/57976b52b900fe01376feb01\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_301\">\n                    <td style=\"\">RAA encryptor<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!!README!!![id].rtf<\/td>\n                    <td style=\"\">Possible affiliation with Pony<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RAA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/reaqta.com\/2016\/06\/raa-ransomware-delivering-pony\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/the-new-raa-ransomware-is-created-entirely-using-javascript\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/the-new-raa-ransomware-is-created-entirely-using-javascript\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_302\">\n                    <td style=\"\">Rabion<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RaaS\nCopy of Ranion RaaS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/CryptoInsane\/status\/846181140025282561<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_303\">\n                    <td style=\"\">Radamant<\/td>\n                    <td style=\"\">.RDM\n.RRK\n.RAD\n.RADAMANT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR_FILES.url<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/decrypter.emsisoft.com\/radamant<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/new-radamant-ransomware-kit-adds-rdm-extension-to-encrypted-files\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.nyxbone.com\/malware\/radamant.html' rel='' target=''>http:\/\/www.nyxbone.com\/malware\/radamant.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_304\">\n                    <td style=\"\">Rakhni<\/td>\n                    <td style=\"\">.locked\n.kraken\n.darkness\n.nochance\n.oshit\n.oplata@qq_com\n.relock@qq_com\n.crypto\n.helpdecrypt@ukr.net\n.pizda@qq_com\n.dyatel@qq_com\n_ryp\n.nalog@qq_com\n.chifrator@qq_com\n.gruzin@qq_com\n.troyancoder@qq_com\n.encrypted\n.cry\n.AES256\n.enc\n.hb15<\/td>\n                    <td style=\"\">.coderksu@gmail_com_id[0-9]{2,3}\n.crypt@india.com.[\\w]{4,12}<\/td>\n                    <td style=\"\"><startup folder>\\fud.bmp\n<startup folder>\\paycrypt.bmp\n<startup folder>\\strongcrypt.bmp\n<startup folder>\\maxcrypt.bmp\nor a similar named bmp in the startup folder\n%APPDATA%\\Roaming\\<random name>.bmp is set as wallpaper<\/td>\n                    <td style=\"\">Files might be partially encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Agent.iih \nAura \nAutoit \nPletor \nRotor \nLamer \nIsda\nCryptokluchen\nBandarchor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/us\/viruses\/disinfection\/10556<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_305\">\n                    <td style=\"\">Ramsomeer<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on the DUMB ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_306\">\n                    <td style=\"\">Ranion<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RaaS service<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/ranion-ransomware-as-a-service-available-on-the-dark-web-for-educational-purposes\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_307\">\n                    <td style=\"\">Rannoh<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">locked-<original name>.[a-zA-Z]{4}<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/8547<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_308\">\n                    <td style=\"\">RanRan<\/td>\n                    <td style=\"\">.zXz<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">VictemKey_0_5\nVictemKey_5_30\nVictemKey_30_100\nVictemKey_100_300\nVictemKey_300_700\nVictemKey_700_2000\nVictemKey_2000_3000\nVictemKey_3000\nzXz.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/github.com\/pan-unit42\/public_tools\/tree\/master\/ranran_decryption<\/td>\n                    <td style=\"\">http:\/\/researchcenter.paloaltonetworks.com\/2017\/03\/unit42-targeted-ransomware-attacks-middle-eastern-government-organizations-political-purposes\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/new-ranran-ransomware-uses-encryption-tiers-political-messages\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/new-ranran-ransomware-uses-encryption-tiers-political-messages\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_309\">\n                    <td style=\"\">Ransoc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Doesn't encrypt user files<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/ransoc-desktop-locking-ransomware-ransacks-local-files-social-media-profiles<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/ransoc-ransomware-extorts-users-who-accessed-questionable-content\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/ransoc-ransomware-extorts-users-who-accessed-questionable-content\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_310\">\n                    <td style=\"\">Ransom32<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no extension change, Javascript Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_311\">\n                    <td style=\"\">RansomLock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Locks the desktop<\/td>\n                    <td style=\"\">Asymmetric 1024<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2009-041513-1400-99&tabid=2<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_312\">\n                    <td style=\"\">RansomPlus<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/825411602535088129<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_313\">\n                    <td style=\"\">RarVault<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RarVault.htm<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_314\">\n                    <td style=\"\">Razy<\/td>\n                    <td style=\"\">.razy\n.fear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(128)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Razy(German).html<\/td>\n                    <td style=\"\"><a href='http:\/\/nyxbone.com\/malware\/Razy.html' rel='' target=''>http:\/\/nyxbone.com\/malware\/Razy.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_315\">\n                    <td style=\"\">Rector<\/td>\n                    <td style=\"\">.vscrypt\n.infected\n.bloc\n.korrektor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/4264<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_316\">\n                    <td style=\"\">Red Alert<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on Hidden Tear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JaromirHorejsi\/status\/815557601312329728<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_317\">\n                    <td style=\"\">RektLocker<\/td>\n                    <td style=\"\">.rekt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Readme.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/4264<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_318\">\n                    <td style=\"\">RemindMe<\/td>\n                    <td style=\"\">.remind\n.crashed<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">decypt_your_files.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/RemindMe.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_319\">\n                    <td style=\"\">Revenge<\/td>\n                    <td style=\"\">.REVENGE<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"># !!!HELP_FILE!!! #.txt<\/td>\n                    <td style=\"\">CryptoMix \/ CryptFile2 Variant<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/revenge-ransomware-a-cryptomix-variant-being-distributed-by-rig-exploit-kit\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_320\">\n                    <td style=\"\">Rokku<\/td>\n                    <td style=\"\">.rokku<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README_HOW_TO_UNLOCK.TXT\nREADME_HOW_TO_UNLOCK.HTML<\/td>\n                    <td style=\"\">possibly related with Chimera<\/td>\n                    <td style=\"\">Curve25519 + ChaCha<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.org\/threat-analysis\/2016\/04\/rokku-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_321\">\n                    <td style=\"\">RoshaLock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Stores your files in a password protected RAR file<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/siri_urz\/status\/842452104279134209<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_322\">\n                    <td style=\"\">RozaLocker<\/td>\n                    <td style=\"\">.ENC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/jiriatvirlab\/status\/840863070733885440<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_323\">\n                    <td style=\"\">Runsomewere<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HT\/EDA2\nUtilizes the Jigsaw Ransomware background<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/801812325657440256<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_324\">\n                    <td style=\"\">RussianRoulette<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Variant of the Philadelphia ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/823925410392080385<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_325\">\n                    <td style=\"\">SADStory<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Variant of CryPy<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/845356853039190016<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_326\">\n                    <td style=\"\">Sage 2.0<\/td>\n                    <td style=\"\">.sage<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!Recovery_[3_random_chars].html<\/td>\n                    <td style=\"\">Predecessor CryLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/sage-2-0-ransomware-gearing-up-for-possible-greater-distribution\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.govcert.admin.ch\/blog\/27\/sage-2.0-comes-with-ip-generation-algorithm-ipga' rel='' target=''>https:\/\/www.govcert.admin.ch\/blog\/27\/sage-2.0-comes-with-ip-generation-algorithm-ipga<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_327\">\n                    <td style=\"\">Sage 2.2<\/td>\n                    <td style=\"\">.sage<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Sage 2.2 deletes volume snapshots through vssadmin.exe, disables startup repair, uses process wscript.exe to execute a VBScript, and coordinates the execution of scheduled tasks via schtasks.exe.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/malwarebreakdown.com\/2017\/03\/16\/sage-2-2-ransomware-from-good-man-gate<\/td>\n                    <td style=\"\"><a href='https:\/\/malwarebreakdown.com\/2017\/03\/10\/finding-a-good-man\/' rel='' target=''>https:\/\/malwarebreakdown.com\/2017\/03\/10\/finding-a-good-man\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_328\">\n                    <td style=\"\">Samas-Samsam<\/td>\n                    <td style=\"\">.encryptedAES\n.encryptedRSA\n.encedRSA\n.justbtcwillhelpyou\n.btcbtcbtc\n.btc-help-you\n.only-we_can-help_you\n.iwanthelpuuu\n.notfoundrans\n.encmywork\n.VforVendetta\n.theworldisyours\n.Whereisyourfiles\n.helpmeencedfiles\n.powerfulldecrypt\n.noproblemwedecfiles\n.weareyourfriends\n.otherinformation\n.letmetrydecfiles\n.encryptedyourfiles\n.weencedufiles\n.iaufkakfhsaraf\n.cifgksaffsfyghd<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_DECRYPT_YOUR_FILES.html\n###-READ-FOR-HELLPP.html\n000-PLEASE-READ-WE-HELP.html\nCHECK-IT-HELP-FILES.html\nWHERE-YOUR-FILES.html\nHELP-ME-ENCED-FILES.html\nWE-MUST-DEC-FILES.html\n000-No-PROBLEM-WE-DEC-FILES.html\nTRY-READ-ME-TO-DEC.html\n000-IF-YOU-WANT-DEC-FILES.html\nLET-ME-TRY-DEC-FILES.html\n001-READ-FOR-DECRYPT-FILES.html\nREAD-READ-READ.html\nIF_WANT_FILES_BACK_PLS_READ.html\nREAD_READ_DEC_FILES.html<\/td>\n                    <td style=\"\">Targeted attacks\n-Jexboss\n-PSExec\n-Hyena<\/td>\n                    <td style=\"\">AES(256) + RSA(2096)<\/td>\n                    <td style=\"\">samsam.exe\nMIKOPONI.exe\nRikiRafael.exe\nshowmehowto.exe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/SamSamStringDecrypter.zip<\/td>\n                    <td style=\"\">http:\/\/blog.talosintel.com\/2016\/03\/samsam-ransomware.html<\/td>\n                    <td style=\"\"><a href='http:\/\/www.intelsecurity.com\/advanced-threat-research\/content\/Analysis_SamSa_Ransomware.pdf' rel='' target=''>http:\/\/www.intelsecurity.com\/advanced-threat-research\/content\/Analysis_SamSa_Ransomware.pdf<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_329\">\n                    <td style=\"\">Sanction<\/td>\n                    <td style=\"\">.sanction<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPT_YOUR_FILES.HTML<\/td>\n                    <td style=\"\">Based on HiddenTear, but heavily modified keygen<\/td>\n                    <td style=\"\">AES(256) + RSA(2096)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_330\">\n                    <td style=\"\">Sanctions<\/td>\n                    <td style=\"\">.wallet<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RESTORE_ALL_DATA.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256) + RSA(2048)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/sanctions-ransomware-makes-fun-of-usa-sanctions-against-russia\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_331\">\n                    <td style=\"\">Sardoninir<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/835955409953357825<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_332\">\n                    <td style=\"\">Satan<\/td>\n                    <td style=\"\">.stn<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_DECRYPT_FILES.html<\/td>\n                    <td style=\"\">RaaS<\/td>\n                    <td style=\"\">AES(256) + RSA(2096)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-satan-ransomware-available-through-a-ransomware-as-a-service-\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_333\">\n                    <td style=\"\">Satana<\/td>\n                    <td style=\"\">Sarah_G@ausi.com___<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!satana!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/06\/satana-ransomware\/<\/td>\n                    <td style=\"\"><a href='https:\/\/blog.kaspersky.com\/satana-ransomware\/12558\/' rel='' target=''>https:\/\/blog.kaspersky.com\/satana-ransomware\/12558\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_334\">\n                    <td style=\"\">Saturn<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">#DECRYPT_MY_FILES#.txt\n#DECRYPT_MY_FILES#.vbs\n#DECRYPT_MY_FILES.BMP<\/td>\n                    <td style=\"\">VM aware, deletes volume shadow copies, disables windows startup repair, clears windows backup catalog.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">02\/19\/2018<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_335\">\n                    <td style=\"\">Scarab<\/td>\n                    <td style=\"\">.scarab<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Post encryption, text file is dropped w\/personal identifier and email to contact as well as a Bitmessage account. Email = suupport[@]protonmail[.]com and Bitmessage = BM-2cTu8prUGDS6XmXqPrZiYXXeqyFw5dXEba<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_336\">\n                    <td style=\"\">Scraper<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">no extension change<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/securelist.com\/blog\/research\/69481\/a-flawed-ransomware-encryptor\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_337\">\n                    <td style=\"\">SerbRansom<\/td>\n                    <td style=\"\">.velikasrbija<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/830116190873849856<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/ultranationalist-developer-behind-serbransom-ransomware\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/ultranationalist-developer-behind-serbransom-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_338\">\n                    <td style=\"\">Serpent<\/td>\n                    <td style=\"\">.serpent<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_TO_DECRYPT_YOUR_FILES_[random_3_chars].html\nHOW_TO_DECRYPT_YOUR_FILES_[random_3_chars].txt<\/td>\n                    <td style=\"\">Batch file\nPasscode: RSA1014DJW2048<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">PayDOS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-goes-retro-with-paydos-and-serpent-written-as-batch-files\/<\/td>\n                    <td style=\"\"><a href='https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/new-serpent-ransomware-targets-danish-speakers' rel='' target=''>https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/new-serpent-ransomware-targets-danish-speakers<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_339\">\n                    <td style=\"\">Serpico<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DetoxCrypto Variant<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Serpico.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_340\">\n                    <td style=\"\">Shark<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Readme.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Atom<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-shark-ransomware-project-allows-to-create-your-own-customized-ransomware\/<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/shark-ransomware-rebrands-as-atom-for-a-fresh-start\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/shark-ransomware-rebrands-as-atom-for-a-fresh-start\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_341\">\n                    <td style=\"\">ShellLocker<\/td>\n                    <td style=\"\">.L0cked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/799388289337671680<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_342\">\n                    <td style=\"\">ShinoLocker<\/td>\n                    <td style=\"\">.shino<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/760560147131408384<\/td>\n                    <td style=\"\"><a href='http:\/\/www.bleepingcomputer.com\/news\/security\/new-educational-shinolocker-ransomware-project-released\/' rel='' target=''>http:\/\/www.bleepingcomputer.com\/news\/security\/new-educational-shinolocker-ransomware-project-released\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_343\">\n                    <td style=\"\">Shujin<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\u6587\u4ef6\u89e3\u5bc6\u5e2e\u52a9.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">KinCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/chineseRansom.html<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/chinese-language-ransomware-makes-appearance\/' rel='' target=''>http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/chinese-language-ransomware-makes-appearance\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_344\">\n                    <td style=\"\">Simple_Encoder<\/td>\n                    <td style=\"\">.~<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">_RECOVER_INSTRUCTIONS.ini<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/the-shark-ransomware-project-allows-to-create-your-own-customized-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_345\">\n                    <td style=\"\">SkidLocker \/ Pompous<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_IT.txt<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/pompous-ransomware-dev-gets-defeated-by-backdoor\/<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/SkidLocker.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_346\">\n                    <td style=\"\">SkyName<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/817079028725190656<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_347\">\n                    <td style=\"\">Smash!<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/smash-ransomware-is-cute-rather-than-dangerous\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_348\">\n                    <td style=\"\">Smrss32<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">_HOW_TO_Decrypt.bmp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_349\">\n                    <td style=\"\">Snatch<\/td>\n                    <td style=\"\">.abcde\n\n.snatch\n.jimm\n.googl\n.dglnl\n.ohwqg\n.wvtr0\n.hceem<\/td>\n                    <td style=\"\">appending .abcde to the original file name (e.g., filename.txt.abcde)<\/td>\n                    <td style=\"\">README_ABCDE_FILES.txt\nDECRYPT_ABCDE_DATA.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/news.sophos.com\/en-us\/2019\/12\/09\/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection\/<\/td>\n                    <td style=\"\"><a href='https:\/\/thedfirreport.com\/2020\/06\/21\/snatch-ransomware\/' rel='' target=''>https:\/\/thedfirreport.com\/2020\/06\/21\/snatch-ransomware\/<\/a><\/td>\n                    <td style=\"\">193.188.22.29 (:443)\n193.188.22.29 (:37462)\n193.188.22.26\n193.188.22.25\n67.211.209.151 (:3306)\n37.59.146.180\n45.147.228.91\n185.61.149.242\n94.140.125.150\nmydatasuperhero.com\nmydatassuperhero.com\nsnatch24uldhpwrm.onion\nsnatch6brk4nfczg.onion<\/td>\n                    <td style=\"\">commands executed during the attack:\nvssadmin delete shadows \/all \/quiet\nbcdedit.exe \/set {current} safeboot minimal\nshutdown.exe \/r \/f \/t 00\nnet stop SuperBackupMan<\/td>\n            <\/tr>\n            <tr id=\"table_2_row_350\">\n                    <td style=\"\">SNSLocker<\/td>\n                    <td style=\"\">.RSNSlocked\n.RSplited<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_Me.txt<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/nyxbone.com\/malware\/SNSLocker.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_351\">\n                    <td style=\"\">Spora<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">[Infection-ID].HTML<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.gdatasoftware.com\/2017\/01\/29442-spora-worm-and-ransomware<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.emsisoft.com\/2017\/01\/10\/from-darknet-with-love-meet-spora-ransomware\/' rel='' target=''>http:\/\/blog.emsisoft.com\/2017\/01\/10\/from-darknet-with-love-meet-spora-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_352\">\n                    <td style=\"\">Sport<\/td>\n                    <td style=\"\">.sport<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_353\">\n                    <td style=\"\">Stampado<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Random message includes bitcoin wallet address with instructions<\/td>\n                    <td style=\"\">Coded by \"The_Rainmaker\"\nRandomly deletes a file every 6hrs up to 96hrs then deletes decryption key<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/success.trendmicro.com\/portal_kb_articledetail?solutionid=1114221\nhttp:\/\/www.bleepingcomputer.com\/news\/security\/stampado-ransomware-campaign-decrypted-before-it-started\/\nhttps:\/\/decrypter.emsisoft.com\/stampado<\/td>\n                    <td style=\"\">https:\/\/cdn.streamable.com\/video\/mp4\/kfh3.mp4<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-economics-behind-ransomware-prices\/' rel='' target=''>http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-economics-behind-ransomware-prices\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_354\">\n                    <td style=\"\">Strictor<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on EDA2, shows Guy Fawkes mask<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Strictor.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_355\">\n                    <td style=\"\">Surprise<\/td>\n                    <td style=\"\">.surprise\n.tzu<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DECRYPTION_HOWTO.Notepad<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_356\">\n                    <td style=\"\">Survey<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ThxForYurTyme.txt<\/td>\n                    <td style=\"\">Still in development, shows FileIce survey<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/in-dev-ransomware-forces-you-do-to-survey-before-unlocking-computer\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_357\">\n                    <td style=\"\">SynoLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Exploited Synology NAS firmware directly over WAN<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_358\">\n                    <td style=\"\">SZFLocker<\/td>\n                    <td style=\"\">.szf<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/now.avg.com\/dont-pay-the-ransom-avg-releases-six-free-decryption-tools-to-retrieve-your-files\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_359\">\n                    <td style=\"\">TeamXrat<\/td>\n                    <td style=\"\">.___xratteamLucked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Como descriptografar os seus arquivos.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/securelist.com\/blog\/research\/76153\/teamxrat-brazilian-cybercrime-meets-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_360\">\n                    <td style=\"\">TeleCrypt<\/td>\n                    <td style=\"\">.xcri<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_RESTORE.HTML\nRECOVER[5 random symbols].html<\/td>\n                    <td style=\"\">Telecrypt will generate a random string to encrypt with that is between 10-20 length and only contain the letters vo,pr,bm,xu,zt,dq.<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Trojan-Ransom.Win32.Telecrypt\nPDM:Trojan.Win32.Generic<\/td>\n                    <td style=\"\">29.09.2023<\/td>\n                    <td style=\"\">https:\/\/malwarebytes.app.box.com\/s\/kkxwgzbpwe7oh59xqfwcz97uk0q05kp3\nhttps:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/11\/telecrypt-the-ransomware-abusing-telegram-api-defeated\/<\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/11\/telecrypt-the-ransomware-abusing-telegram-api-defeated\/<\/td>\n                    <td style=\"\"><a href='https:\/\/securelist.com\/blog\/research\/76558\/the-first-cryptor-to-exploit-telegram\/' rel='' target=''>https:\/\/securelist.com\/blog\/research\/76558\/the-first-cryptor-to-exploit-telegram\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_361\">\n                    <td style=\"\">TeslaCrypt 0.x - 2.2.0<\/td>\n                    <td style=\"\">.vvv\n.ecc\n.exx\n.ezz\n.abc\n.aaa\n.zzz\n.xyz<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_TO_SAVE_FILES.txt\nHowto_RESTORE_FILES.html<\/td>\n                    <td style=\"\">Factorization<\/td>\n                    <td style=\"\">RSA\nAES\nECHD<\/td>\n                    <td style=\"\">AlphaCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/576600\/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt\/\nhttp:\/\/www.talosintel.com\/teslacrypt_tool\/<\/td>\n                    <td style=\"\">https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/05\/teslacrypt_followin.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_362\">\n                    <td style=\"\">TeslaCrypt 3.0+<\/td>\n                    <td style=\"\">.micro\n.xxx\n.ttt\n.mp3<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">4.0+ has no extension<\/td>\n                    <td style=\"\">AES(256) + ECHD + SHA1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/576600\/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt\/\nhttp:\/\/www.welivesecurity.com\/2016\/05\/18\/eset-releases-decryptor-recent-variants-teslacrypt-ransomware\/\nhttps:\/\/blog.kaspersky.com\/raknidecryptor-vs-teslacrypt\/12169\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_363\">\n                    <td style=\"\">TeslaCrypt 4.1A<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RECOVER<5_chars>.html\nRECOVER<5_chars>.png\nRECOVER<5_chars>.txt\n_how_recover+<random 3 chars>.txt or .html\nhelp_recover_instructions+<random 3 chars>.BMP or .html or .txt\n_H_e_l_p_RECOVER_INSTRUCTIONS+<random 3 char>.txt, .html or .png\nRecovery+<5 random chars>.txt, .html, e.g., Recovery+gwote.txt\nRESTORE_FILES_<random 5 chars>.TXT , e.g. restore_files_kksli.bmp\nHELP_RESTORE_FILES_<random 5 chars>.TXT , e.g. help_restore_files_kksli.bmp\nHOWTO_RECOVER_FILES_<random 5 chars>.TXT. e.g. howto_recover_files_xeyye.txt\nHELP_TO_SAVE_FILES.txt or .bmp<\/td>\n                    <td style=\"\">no special extension<\/td>\n                    <td style=\"\">AES(256) + ECHD + SHA1<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/576600\/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt\/\nhttp:\/\/www.welivesecurity.com\/2016\/05\/18\/eset-releases-decryptor-recent-variants-teslacrypt-ransomware\/\nhttps:\/\/blog.kaspersky.com\/raknidecryptor-vs-teslacrypt\/12169\/<\/td>\n                    <td style=\"\">https:\/\/www.endgame.com\/blog\/your-package-has-been-successfully-encrypted-teslacrypt-41a-and-malware-attack-chain<\/td>\n                    <td style=\"\"><a href='https:\/\/blog.kaspersky.com\/raknidecryptor-vs-teslacrypt\/12169\/' rel='' target=''>https:\/\/blog.kaspersky.com\/raknidecryptor-vs-teslacrypt\/12169\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_364\">\n                    <td style=\"\">TeslaCrypt 4.2<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">RECOVER<5_chars>.html\nRECOVER<5_chars>.png\nRECOVER<5_chars>.txt\n_how_recover+<random 3 chars>.txt or .html\nhelp_recover_instructions+<random 3 chars>.BMP or .html or .txt\n_H_e_l_p_RECOVER_INSTRUCTIONS+<random 3 char>.txt, .html or .png\nRecovery+<5 random chars>.txt, .html, e.g., Recovery+gwote.txt\nRESTORE_FILES_<random 5 chars>.TXT , e.g. restore_files_kksli.bmp\nHELP_RESTORE_FILES_<random 5 chars>.TXT , e.g. help_restore_files_kksli.bmp\nHOWTO_RECOVER_FILES_<random 5 chars>.TXT. e.g. howto_recover_files_xeyye.txt\nHELP_TO_SAVE_FILES.txt or .bmp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/576600\/tesladecoder-released-to-decrypt-exx-ezz-ecc-files-encrypted-by-teslacrypt\/\nhttp:\/\/www.welivesecurity.com\/2016\/05\/18\/eset-releases-decryptor-recent-variants-teslacrypt-ransomware\/\nhttps:\/\/blog.kaspersky.com\/raknidecryptor-vs-teslacrypt\/12169\/<\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/teslacrypt-4-2-released-with-quite-a-few-modifications\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_365\">\n                    <td style=\"\">Thanksgiving<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/801486420368093184<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_366\">\n                    <td style=\"\">Threat Finder<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HELP_DECRYPT.HTML<\/td>\n                    <td style=\"\">Files cannot be decrypted\nHas a GUI<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_367\">\n                    <td style=\"\">TorrentLocker<\/td>\n                    <td style=\"\">.Encrypted\n.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_TO_RESTORE_FILES.html\nDECRYPT_INSTRUCTIONS.html\nDESIFROVANI_POKYNY.html\nINSTRUCCIONES_DESCIFRADO.html\nISTRUZIONI_DECRITTAZIONE.html\nENTSCHLUSSELN_HINWEISE.html\nONTSLEUTELINGS_INSTRUCTIES.html\nINSTRUCTIONS_DE_DECRYPTAGE.html\nSIFRE_COZME_TALIMATI.html\nwie_zum_Wiederherstellen_von_Dateien.txt<\/td>\n                    <td style=\"\">Newer variants not decryptable.\nOnly first 2 MB are encrypted<\/td>\n                    <td style=\"\">AES(256) CBC for files\nRSA(1024) for AES key\nuses LibTomCrypt<\/td>\n                    <td style=\"\">Crypt0L0cker\nCryptoFortress \nTeerac<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/547708\/torrentlocker-ransomware-cracked-and-decrypter-has-been-made\/<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/804008236600934403<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.talosintelligence.com\/2017\/03\/crypt0l0cker-torrentlocker-old-dog-new.html' rel='' target=''>http:\/\/blog.talosintelligence.com\/2017\/03\/crypt0l0cker-torrentlocker-old-dog-new.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_368\">\n                    <td style=\"\">TowerWeb<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Payment_Instructions.jpg<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/618055\/towerweb-ransomware-help-support-topic-payment-instructionsjpg\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_369\">\n                    <td style=\"\">Toxcrypt<\/td>\n                    <td style=\"\">.toxcrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">tox.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_370\">\n                    <td style=\"\">Trojan<\/td>\n                    <td style=\"\">.braincrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">!!! HOW TO DECRYPT FILES !!!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">BrainCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/BrainCryptDecrypter.zip<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/811249250285842432<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_371\">\n                    <td style=\"\">Troldesh<\/td>\n                    <td style=\"\">.breaking_bad\n.better_call_saul\n.xtbl\n.da_vinci_code\n.windows10\n.no_more_ransom<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README<number>.txt \nnomoreransom_note_original.txt<\/td>\n                    <td style=\"\">May download additional malware after encryption<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">Shade\nXTBL<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.nomoreransom.org\/uploads\/ShadeDecryptor_how-to_guide.pdf<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Troldesh.html<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/kelihos-botnet-delivering-shade-troldesh-ransomware-with-no-more-ransom-extension\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/kelihos-botnet-delivering-shade-troldesh-ransomware-with-no-more-ransom-extension\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_372\">\n                    <td style=\"\">TrueCrypter<\/td>\n                    <td style=\"\">.enc<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/news\/security\/truecrypter-ransomware-accepts-payment-in-bitcoins-or-amazon-gift-card\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_373\">\n                    <td style=\"\">Trump Locker<\/td>\n                    <td style=\"\">.TheTrumpLockerf\n.TheTrumpLockerfp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">What happen to my files.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-trump-locker-ransomware-is-a-fraud-just-venuslocker-in-disguise\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_374\">\n                    <td style=\"\">Turkish<\/td>\n                    <td style=\"\">.sifreli<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/821991600637313024<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_375\">\n                    <td style=\"\">Turkish (Fake CTB-Locker)<\/td>\n                    <td style=\"\">.encrypted<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Beni Oku.txt<\/td>\n                    <td style=\"\">keys in '%name%.manifest.xml<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/842034887397908480<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_376\">\n                    <td style=\"\">Turkish Ransom<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">DOSYALARINIZA ULA\u015eMAK \u0130\u00c7\u0130N A\u00c7INIZ.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/turkishRansom.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_377\">\n                    <td style=\"\">UltraLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on the idiotic open-source ransomware called CryptoWire<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/807161652663742465<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/-proof-of-concept-cryptowire-ransomware-spawns-lomix-and-ultralocker-families\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/-proof-of-concept-cryptowire-ransomware-spawns-lomix-and-ultralocker-families\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_378\">\n                    <td style=\"\">UmbreCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">umbrecrypt_ID_[VICTIMID]<\/td>\n                    <td style=\"\">README_DECRYPT_UMBRE_ID_[victim_id].jpg\nREADME_DECRYPT_UMBRE_ID_[victim_id].txt\ndefault32643264.bmp\ndefault432643264.jpg<\/td>\n                    <td style=\"\">CrypBoss Family<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.thewindowsclub.com\/emsisoft-decrypter-hydracrypt-umbrecrypt-ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_379\">\n                    <td style=\"\">UnblockUPC<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Files encrypted.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/forums\/t\/627582\/unblockupc-ransomware-help-support-topic-files-encryptedtxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_380\">\n                    <td style=\"\">Ungluk<\/td>\n                    <td style=\"\">.H3LL\n.0x0\n.1999<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READTHISNOW!!!.txt\nHellothere.txt\nYOUGOTHACKED.TXT<\/td>\n                    <td style=\"\">Ransom note instructs to use Bitmessage to get in contact with attacker\nSecretishere.key\nSECRETISHIDINGHEREINSIDE.KEY\nsecret.key<\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_381\">\n                    <td style=\"\">Unlock26<\/td>\n                    <td style=\"\">.locked-[XXX]<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ReadMe-XXX.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/new-raas-portal-preparing-to-spread-unlock26-ransomware\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_382\">\n                    <td style=\"\">Unlock92<\/td>\n                    <td style=\"\">.CRRRT\n.CCCRRRPPP<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">READ_ME_!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/839038399944224768<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_383\">\n                    <td style=\"\">Vanguard<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">GO Ransomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JAMESWT_MHT\/status\/834783231476166657<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_384\">\n                    <td style=\"\">VapeLauncher<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptoWire variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/839771195830648833<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_385\">\n                    <td style=\"\">VaultCrypt<\/td>\n                    <td style=\"\">.vault\n.xort\n.trun<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">VAULT.txt\nxort.txt\ntrun.txt\n<random>.hta | VAULT.hta<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">uses gpg.exe<\/td>\n                    <td style=\"\">CrypVault\nZlader<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/russianRansom.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_386\">\n                    <td style=\"\">VBRANSOM 7<\/td>\n                    <td style=\"\">.VBRANSOM<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Does not actually encrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/817851339078336513<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_387\">\n                    <td style=\"\">VenisRansomware<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">In dev\nVenisRansom@protonmail.com<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/Antelox\/status\/785849412635521024<\/td>\n                    <td style=\"\"><a href='http:\/\/pastebin.com\/HuK99Xmj' rel='' target=''>http:\/\/pastebin.com\/HuK99Xmj<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_388\">\n                    <td style=\"\">VenusLocker<\/td>\n                    <td style=\"\">.Venusf\n.Venusp<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ReadMe.txt<\/td>\n                    <td style=\"\">Based on EDA2<\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/08\/venus-locker-another-net-ransomware\/?utm_source=twitter&utm_medium=social<\/td>\n                    <td style=\"\"><a href='http:\/\/www.nyxbone.com\/malware\/venusLocker.html' rel='' target=''>http:\/\/www.nyxbone.com\/malware\/venusLocker.html<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_389\">\n                    <td style=\"\">Vindows Locker<\/td>\n                    <td style=\"\">.vindows<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/malwarebytes.app.box.com\/s\/gdu18hr17mwqszj3hjw5m3sw84k8hlph\nhttps:\/\/rol.im\/VindowsUnlocker.zip<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/800729944112427008<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/vindowslocker-ransomware-mimics-tech-support-scam-not-the-other-way-around\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/vindowslocker-ransomware-mimics-tech-support-scam-not-the-other-way-around\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_390\">\n                    <td style=\"\">Virlock<\/td>\n                    <td style=\"\">.exe<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Polymorphism \/ Self-replication<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/Virlock.html<\/td>\n                    <td style=\"\"><a href='http:\/\/www.welivesecurity.com\/2014\/12\/22\/win32virlock-first-self-reproducing-ransomware-also-shape-shifter\/' rel='' target=''>http:\/\/www.welivesecurity.com\/2014\/12\/22\/win32virlock-first-self-reproducing-ransomware-also-shape-shifter\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_391\">\n                    <td style=\"\">Virus-Encoder<\/td>\n                    <td style=\"\">.CrySiS\n.xtbl\n.crypt\n.DHARMA<\/td>\n                    <td style=\"\">.id-########.decryptformoney@india.com.xtbl\n.[email_address].DHARMA<\/td>\n                    <td style=\"\">How to decrypt your data.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">AES(256)<\/td>\n                    <td style=\"\">CrySiS<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.welivesecurity.com\/2016\/11\/24\/new-decryption-tool-crysis-ransomware\/\nhttp:\/\/media.kaspersky.com\/utilities\/VirusUtilities\/EN\/rakhnidecryptor.zip<\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/virus-encoder.html<\/td>\n                    <td style=\"\"><a href='http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/crysis-targeting-businesses-in-australia-new-zealand-via-brute-forced-rdps\/' rel='' target=''>http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/crysis-targeting-businesses-in-australia-new-zealand-via-brute-forced-rdps\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_392\">\n                    <td style=\"\">Vortex<\/td>\n                    <td style=\"\">.aes<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">\u0166l\u0e4ft\u0454\u0433\u0e04 \u0433\u0e04\u0e20\u0e23\u0e4f\u0e53\u0e2c\u0e04\u0433\u0454<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/839778905091424260<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_393\">\n                    <td style=\"\">vxLock<\/td>\n                    <td style=\"\">.vxLock<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_394\">\n                    <td style=\"\">WannaCry<\/td>\n                    <td style=\"\">.wcry\n.wncry\n.WNCRY\n.WCRY<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">@Please_Read_Me@.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">WannaCrypt\nWCry<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/846241982347427840<\/td>\n                    <td style=\"\"><a href='https:\/\/docs.google.com\/spreadsheets\/d\/1XNCCiiwpIfW8y0mzTUdLLVzoW6x64hkHJ29hcQW5deQ\/pubhtml#' rel='' target=''>https:\/\/docs.google.com\/spreadsheets\/d\/1XNCCiiwpIfW8y0mzTUdLLVzoW6x64hkHJ29hcQW5deQ\/pubhtml#<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_395\">\n                    <td style=\"\">WildFire Locker<\/td>\n                    <td style=\"\">.wflx<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_TO_UNLOCK_FILES_README_(<ID>).txt<\/td>\n                    <td style=\"\">Zyklon variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Hades Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/labs.opendns.com\/2016\/07\/13\/wildfire-ransomware-gaining-momentum\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_396\">\n                    <td style=\"\">Winnix Cryptor<\/td>\n                    <td style=\"\">.wnx<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">YOUR FILES ARE ENCRYPTED!.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">GPG<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/PolarToffee\/status\/811940037638111232<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_397\">\n                    <td style=\"\">XCrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Xhelp.jpg<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/825790584971472902<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_398\">\n                    <td style=\"\">XData<\/td>\n                    <td style=\"\">.~xdata~<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW_CAN_I_DECRYPT_MY_FILES.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/www.bleepingcomputer.com\/news\/security\/xdata-ransomware-on-a-rampage-in-ukraine\/#.WR-iz69z-MA.twitter<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_399\">\n                    <td style=\"\">Xorist<\/td>\n                    <td style=\"\">.EnCiPhErEd\n.73i87A\n.p5tkjw\n.PoAr2w\n.fileiscryptedhard\n.encoderpass\n.zc3791\n.antihacker2017<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">HOW TO DECRYPT FILES.TXT<\/td>\n                    <td style=\"\">encrypted files will still have the original non-encrypted header of 0x33 bytes length<\/td>\n                    <td style=\"\">XOR or TEA<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/support.kaspersky.com\/viruses\/disinfection\/2911\nhttps:\/\/decrypter.emsisoft.com\/xorist<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_400\">\n                    <td style=\"\">XRTN<\/td>\n                    <td style=\"\">.xrtn<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">VaultCrypt family<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_401\">\n                    <td style=\"\">XYZWare<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Based on HiddenTear<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/833636006721122304<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_402\">\n                    <td style=\"\">You Have Been Hacked!!!<\/td>\n                    <td style=\"\">.Locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Attempt to steal passwords<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/808280549802418181<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_403\">\n                    <td style=\"\">YourRansom<\/td>\n                    <td style=\"\">.yourransom<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">README.txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/_ddoxer\/status\/827555507741274113<\/td>\n                    <td style=\"\"><a href='https:\/\/www.bleepingcomputer.com\/news\/security\/yourransom-is-the-latest-in-a-long-line-of-prank-and-educational-ransomware\/' rel='' target=''>https:\/\/www.bleepingcomputer.com\/news\/security\/yourransom-is-the-latest-in-a-long-line-of-prank-and-educational-ransomware\/<\/a><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_404\">\n                    <td style=\"\">Zcrypt<\/td>\n                    <td style=\"\">.zcrypt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Zcryptor<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/05\/26\/link-lnk-to-ransom\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_405\">\n                    <td style=\"\">Zeta<\/td>\n                    <td style=\"\">.code\n.scl\n.rmd<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"># HELP_DECRYPT_YOUR_FILES #.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">CryptoMix<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/JakubKroustek\/status\/804009831518572544<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_406\">\n                    <td style=\"\">Zimbra<\/td>\n                    <td style=\"\">.crypto<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">how.txt<\/td>\n                    <td style=\"\">mpritsken@priest.com<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.bleepingcomputer.com\/forums\/t\/617874\/zimbra-ransomware-written-in-python-help-and-support-topic-crypto-howtotxt\/<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_407\">\n                    <td style=\"\">ZinoCrypt<\/td>\n                    <td style=\"\">.ZINO<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">ZINO_NOTE.TXT<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/malwrhunterteam\/status\/842781575410597894<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_408\">\n                    <td style=\"\">Zlader \/ Russian<\/td>\n                    <td style=\"\">.vault<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">VaultCrypt family<\/td>\n                    <td style=\"\">RSA<\/td>\n                    <td style=\"\">VaultCrypt\nCrypVault<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">http:\/\/www.nyxbone.com\/malware\/russianRansom.html<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_409\">\n                    <td style=\"\">Zorro<\/td>\n                    <td style=\"\">.zorro<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Take_Seriously (Your saving grace).txt<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/BleepinComputer\/status\/844538370323812353<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_410\">\n                    <td style=\"\">zScreenLocker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/twitter.com\/struppigel\/status\/794077145349967872<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_411\">\n                    <td style=\"\">Zyka<\/td>\n                    <td style=\"\">.locked<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">https:\/\/download.bleepingcomputer.com\/demonslay335\/StupidDecrypter.zip<\/td>\n                    <td style=\"\">https:\/\/twitter.com\/GrujaRS\/status\/826153382557712385<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n            <tr id=\"table_2_row_412\">\n                    <td style=\"\">Zyklon<\/td>\n                    <td style=\"\">.zyklon<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">Hidden Tear family, GNL Locker variant<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\">GNL Locker<\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n                    <td style=\"\"><\/td>\n            <\/tr>\n    <\/tbody>        <!-- \/Table body -->\n\n        \n    <\/table>\n\n<\/div>\n\n<span class=\"powered_by_link d-block m-l-10 m-t-10 m-b-10\">Generated by <a href=\"https:\/\/wpdatatables.com\" target=\"_blank\">wpDataTables<\/a><\/span><style>\ntable.wpDataTable td.numdata { text-align: right !important; }\n<\/style>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#x2196; Data Intrusion Detection Evaluation Dataset &#x2197;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":268,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-295","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=295"}],"version-history":[{"count":8,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":350,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/295\/revisions\/350"}],"up":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/268"}],"wp:attachment":[{"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}