- Distribution Method : Unknown
 
 - MD5 : eaebaa9026e4f0d9c62bf3c23bac7b51
 
 - Major Detection Name : DeepScan:Generic.Ransom.JSWORM.C28E5264 (BitDefender), Ransom.JSWorm (Malwarebytes)
 
 - Encrypted File Pattern : .[ID-<Random>][doctorSune@protonmail.com].TRUMP
 
 - Malicious File Creation Location :
 - C:\ProgramData\Microsoft\svchost.exe
 - C:\ProgramData\key.TRUMP
 - C:\ProgramData\user_data.TRUMP
 - C:\Windows\System32\Tasks\TRUMP 
 - Payment Instruction File : TRUMP-DECRYPT.txt
 
 - Major Characteristics :
 - Offline Encryption
 - Adds TRUMP to scheduler to execute "C:\ProgramData\Microsoft\svchost.exe" at user login.
 - Block processes execution (bes10*, black*, IBM*, mysql*, sql, store.exe etc.)
 - Stop services execution (mr2kserv, MSExchangeADTopology, MSSQLServerADHelper100, ReportServer$ISARS, SQLAgent$ISARS, WinDefend etc.)
 - Disable system restore (vssadmin.exe Delete Shadows /All /Quiet, bcdedit /set {default} recoveryenabled No, bcdedit /set {default} bootstatuspolicy ignoreallfailures)
 - Deletes event log 
 
					リスト