Keyword: usoj_ransom.hun
6334 Total Search   |   Showing Results : 181 - 200
system. It encrypts files with specific file extensions. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by
information. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
information. It encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
connects to certain websites to send and receive information. It encrypts files with specific file extensions. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware encrypts files found in specific folders. It drops files as ransom note. Installation This Ransomware drops the following copies of itself into the affected system and executes them:
all the Encrypted Files of the Victim {Drive Letter}:\README{1-10}.txt --- Ransom Note {Folder Containing Encrypted Files}\README.txt --- Ransom Note %User Temp%\{random}\lock %User Temp%\{random}\state
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation
information. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation
malware/grayware/spyware from remote sites. Installation This Trojan drops the following component file(s): %Desktop%\_Locky_recover_instructions.txt - ransom note %Desktop%\_Locky_recover_instructions.bmp - image used as
This ransomware speaks, apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan
JS_LOCKY.SSU Installation This Trojan drops the following component file(s): %Desktop%\_Locky_recover_instructions.txt - ransom note %Desktop%\_Locky_recover_instructions.bmp - image used as wallpaper {Folders
dropped note per folder}_HELP_instructions.html - ransom note It drops and executes the following files: %Desktop%\_HELP_instructions.html - ransom note %Desktop%\_HELP_instructions.bmp - image used as
Trojan drops the following files: {folders containing encrypted files}\_{count of dropped note per folder}_HELP_instructions.html - ransom note It drops and executes the following files: %Desktop%
), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) It drops the following files: %Desktop%\!satana!.txt -> Ransom
unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {folders containing encrypted files}\_{count of dropped note per folder}_HELP_instructions.html -> Ransom
component that automatically opens the image ransom note upon system startup %Application Data%\Microsoft\Windows\Network Shortcuts\@README.bmp - ransom image %Application Data%\Microsoft\Windows\Network