SHA256: 2f2b2e30abe71f9a93d6ad7418facf0fcc1323fa0017682f254becf99848e43c File name: 4fv3b5.exe Detection ratio: 39 / 56 Analysis date: 2016-12-16 08:39:47 UTC ( 0 minutes ago ) Avira (no cloud) TR/Dropper.btuyq 20161216 BitDefender Trojan.GenericKD.3903694 20161216 Bkav W32.DominasaAST.Trojan 20161215 CAT-QuickHeal TrojanRansom.Zerber 20161216 CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20161024 DrWeb Trojan.Encoder.7233 20161216 ESET-NOD32 Win32/Filecoder.Cerber.C 20161216 Emsisoft Trojan.GenericKD.3903694 (B) 20161216 F-Secure Trojan.GenericKD.3903694 20161216 Fortinet W32/Malicious_Behavior.VEX 20161216 GData Trojan.GenericKD.3903694 20161216 K7AntiVirus Trojan ( 004ff8881 ) 20161216 K7GW Trojan ( 004ff8881 ) 20161216 Kaspersky Trojan-Ransom.Win32.Zerber.apnm 20161216 Malwarebytes Ransom.Locky 20161216 McAfee Generic.atf 20161216 McAfee-GW-Edition BehavesLike.Win32.Ransom.dc 20161216 eScan Trojan.GenericKD.3903694 20161216 Microsoft Ransom:Win32/Genasom!rfn 20161216 btc.blockr.io displays a page on how to pay to get your […]