- Distribution Method : Unknown
 
 - MD5 : 54465f04a6075b8e68f272d09b243e81
 
 - Major Detection Name : Ransom-Avest!54465F04A607 (McAfee), Trojan:MSIL/Genasom.A!MTB (Microsoft)
 
 - Encrypted File Pattern : .ckey(<Random>).email(data1992@protonmail.com).pack14
 
 - Malicious File Creation Location :
 - C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\officeupdate.lnk
 - C:\Users\%UserName%\Documents\MyPictures
 - C:\Users\%UserName%\Documents\MyPictures\details.txt
 - C:\Users\%UserName%\Documents\MyPictures\office64.exe 
 - Payment Instruction File : !!!Readme!!!Help!!!.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Generate a fake Installer lock screen
 - Block processes execution (1c*, EXCEL*, mstsc.exe, notepad*, WINWORD*) 
 
					List