| MD5 | 6f6266e8f9233850704e900e8ce4a6ef |
| SHA1 | c747fee6e9fb66411883e99ee1dacbbb132491e3 |
| Filename | ywfgthnkvuey.exe |
| Domains | [stage.justecigandvape.com] [alaraditower.com] [bluedreambd.com] [onguso.com] [silocot.com] [gooseart.com] |
| IP Addresses | [107.161.177.58] [108.179.232.95] [64.71.78.169] [195.128.174.143] [72.41.18.2] |
| Antivirus | [Ransom:Win32/Tescrypt] |
| [Ransomware-FHS!6F6266E8F923] | |
| [Ransom_CRYPTESLA.CBQ164B] | |
| [Troj.Ransom.W32.Bitman!c] | |
| [Trojan-Ransom.Win32.Bitman.xuo] | |
| [Trojan.AVKill.61308] | |
| [Trojan.Bitman.Win32.2088] | |
| [Trojan.Win32.AVKill.ebopwl] | |
| [Trojan.Win32.Filecoder] | |
| [Trojan.Win32.Z.Teslacrypt.286720.J[h]] |