Keyword: ransom_cerber
6373 Total Search   |   Showing Results : 2601 - 2620
extension to the file name of the encrypted files: .H_F_D_locked NOTES: This Ransomware displays the following window as its ransom note: Trojan:Win32/Skeeyah.A!rfn (Microsoft); Trojan.MSIL.Agent.actgw (
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
extension to the file name of the encrypted files: .UPS-{Random 16 characters} It leaves text files that serve as ransom notes containing the following text: a variant of Win32/Filecoder.Russenger.A
powershell -win hidden -enc {encrypted string} It displays the following window as a ransom note: This ransomware is still in development, it is not capable of encrypting files. HEUR:Trojan.Win32.Generic
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
rec.exe powershell.exe -win hidden -enc {encrypted string} It displays the following window as a ransom note: Ransomware Routine This Ransomware encrypts files with the following extensions: .jpg .jpeg
avast.exe Clicking the exit button on its UI will shutdown the system by executing the following command: shutdown -s -t 4 It displays the following UI as its ransom note: This ransomware does not encrypt
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It requires its
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
encrypted files: .crypt It leaves text files that serve as ransom notes containing the following text: {Encrypted Directory}DECRYPT.txt TR/RedCap.hmjvh (Avira (no cloud)); Ransom:Win32/Kasitoo.A!rsm
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
= 1 Other Details This Ransomware does the following: It displays the following ransom screen: It displays the following upon successfully unlocking: The key for this ransomware is:
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival