Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 481 - 500
for sending information about the infection back to the server: http://page/sam/{BLOCKED}x.php?selection={encrypted data} {encrypted data} is the number of files that is overwriten by the malware. This
following: Sending information about the infection back to the server. It is capable of receiving files from the remote server and execute it on the affected system. Propagates via network shares, Downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
sure you have typed the key correctly and you are still unable to decrypt your files, come back tomorrow and it should work. NOTES: This malware does not encrypt files. MSIL/Hoax.FakeFilecoder.AG
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
It drops the following file(s) as ransom note: {Encrypted Directory}\HOW TO BACK YOUR FILES.txt
legitimate file After encrypting file: It restore/ delete the drop copy of itself and back to original legitimate file. It deletes itself after execution. Executes the following commands to gather information:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
"aRmLgk8wb0WK5q7" "byBkPAa1oZ" "EnderISTheBEST" * It also modifies the registry back to “explorer.exe” once the keys are entered. It does not encrypt any files. Artemis!FD04507E1AE5 (McAfee);
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to a website to send and receive
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
passcode. After that, you'll be able to get your files back again. Failure to do so within 3 days will result in all your files being deleted & lost forever - visit www.luno.com to buy Bitcoin and once you