You can catch it decrypted data when in the second stage in copy of dropper process it calls
NtFreeVirtualMemory. Nothing really impressive, actual malware data is about ~600 Kb, where ~500 Kb are BMP images and ransomware text to display and TOR linked object files ->
https://doxygen.torproject.org/files.html, seems used for communication mechanisms, zlib 1.2.8 library etc
Code: Select allYour personal files are encrypted.%f0%%c0%
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer.
Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files.
1. Type the address %c1%http://torproject.org%c0% in your Internet browser. It opens the Tor site.
2. Press 'Download Tor', then press 'DOWNLOAD Tor Browser Bundle', install and run it.
3. Now you have Tor Browser. In the Tor Browser open the %c1%http://%onion%/%c0%
Note that this server is available via Tor Browser only
Retry in 1 hour if site is not reachable.
4. Write in the following public key in the input form on server. Avoid missprints.
%f1%%c1%%key%%f0%%c0%
5. Follow the instructions on the server.
These instructions are also saved to file named DecryptAllFiles.txt in Documents folder. You can open it and use copy-paste for address and key.
Malware BMP's in attach.