Keyword: usojan.ps1.powload.jkp
54622 Total Search   |   Showing Results : 1341 - 1360
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
This Ransomware adds the following processes: %System%\cmd.exe /c timeout 1 & del "{Malware Path}\{Malware File Name}.exe" "%System%\cmd.exe /c vssadmin delete shadows /all /quiet" (Note: %System% is the
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses file names similar to those of legitimate
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It injects its dropped file/component to specific
HKEY_CURRENT_USER\Control Panel\Desktop WallpaperStyle = "0" (Note: The default value data of the said registry entry is {User Preferences} .) HKEY_CURRENT_USER\Control Panel\Desktop Wallpaper = "%System Root%\1
pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3 sqlitedb sr2 srf srw st4
pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3 sqlitedb sr2 srf srw st4 st5
pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3 sqlitedb sr2 srf srw st4
pat pcd pdf pef pem pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3
pat pcd pdf pef pem pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3
odt orf otg oth otp ots ott p12 p7b p7c pat pcd pdf pef pem pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1
pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3 sqlitedb sr2 srf srw st4 st5
nrw ns2 ns3 ns4 nsd nsf nsg nsh nwb nx1 nx2 nyf odb odf odg odm odp ods odt orf otg oth otp ots ott p12 p7b p7c pat pcd pdf pef pem pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3
pptx ps psafe3 psd ptx py ra2 raf rar raw rdb rtf rw2 rwl rwz s3db sas7bdat sav sd0 sd1 sda sdf sldm sldx sql sqlite sqlite3 sqlitedb sr2 srf srw st4 st5 st6 st7 st8 stc std sti stw stx sxc sxd sxg sxi
nsh nwb nx1 nx2 nyf odb odf odg odm odp ods odt orf otg oth otp ots ott p12 p7b p7c pat pcd pdf pef pem pfx php pl pot potm potx ppam pps ppsm ppsx ppt pptm pptx ps psafe3 psd ptx py ra2 raf rar raw rdb
ransom note in russian language %User Temp%\~.bat - delete itself and shutdown the infected machine after 1 minute (Note: %All Users Profile% is the All Users folder, where it usually is C:\Documents and
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It