Search
Keyword: bkdr_back.b
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
adb ads agdl ai ait al apj arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib class cls cmt cpi cpp
avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib class cls cmt cpi cpp cr2 craw crt crw cs csh csl csv dac db db3 dbf
awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib class cls cmt cpi cpp cr2 craw crt crw cs csh csl csv dac db db3 dbf
arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib class cls cmt cpi cpp cr2 craw crt crw cs csh csl
avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib class cls cmt cpi cpp cr2 craw crt crw cs csh csl csv dac db db3 dbf
}les.com/web_admin/files/e2.php It encrypts files with the following extensions: 3dm 3ds 3fr 3g2 3gp 3pr 7z ab4 accdb accde accdr accdt ach acr act adb ads agdl ai ait al apj arw asf asm asp asx avi awg back backup backupdb bak
accdr accdt ach acr act adb ads agdl ai ait al apj arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfp cgm cib
http://curlmyip.com It encrypts files with the following extensions: 3dm 3ds 3fr 3g2 3gp 3pr 7z ab4 accdb accde accdr accdt ach acr act adb ads agdl ai ait al apj arw asf asm asp asx avi awg back backup backupdb bak
accdt ach acr act adb ads agdl ai ait al apj arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkp blend bpw c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 yuv zip It deletes the
acr act adb ads agdl ait ai al apj arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkf bkp blend bpw cdb cdf cdr cdr6 cdrw cdr5 cdr3 cdr4 cdx ce1 ce2 cer cfp cgm c cib class
receive the decryption key (password) and decryptor within 12 hours. BEWARE - this is NOT a virus. The ONLY way to get your files back is to pay for the decryptor + decryption key (password). Guaranteed
This Trojan may be downloaded by other malware/grayware from remote sites. It executes then deletes itself afterward. It is capable of encrypting files in the affected system. Arrival Details This
This malware uses exploits on JexBoss open source server application and other Java-based application platforms to install itself in targeted web application servers. It appends the extension
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses the Windows Task Scheduler to add a scheduled
This ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form. Instead of the usual ransom note, MIRCOP demands to be paid back, assuming
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It