Keyword: ransom.win32.cring
75132 Total Search   |   Showing Results : 2421 - 2440
}\note.ini - Ransom note {malware path}\wallet.jpg - QR code Other Details This Trojan connects to the following URL(s) to get the affected system's IP address: http://whatismyip.net It encrypts files
encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
information. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Process Termination This
unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected system. It drops files as ransom note. Arrival Details This Ransomware arrives as an attachment to email
files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This
files as ransom note. Arrival Details This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
files}\{month}-{day}-{year}-INFECTION.TXT - ransom note {folders containing encrypted files}\{random number}.KEY %My Documents%\{random number}.txt - list of encrypted files (Note: %My Documents% is
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
\adobe\reader 10.0\resource\typesupport\unicode\mappings\mac\!!!!!readme!!!!!.htm %System Root%\program files\adobe\reader 10.0\resource\typesupport\unicode\mappings\win\!!!!!readme!!!!!.htm %System Root%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It performs denial of service (DoS) attacks on affected
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses Windows Task Scheduler to create a scheduled
extension to the file name of the encrypted files: .UPS-{Random 16 characters} It leaves text files that serve as ransom notes containing the following text: a variant of Win32/Filecoder.Russenger.A
avast.exe Clicking the exit button on its UI will shutdown the system by executing the following command: shutdown -s -t 4 It displays the following UI as its ransom note: This ransomware does not encrypt
This Ransomware displays the following message boxes: This acts as the ransom note: Ransomware Routine This Ransomware encrypts files found in the following folders: %Desktop% (Note: %Desktop% is the