Keyword: ransom.win32.cring
75073 Total Search   |   Showing Results : 781 - 800
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
This Ransomware connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible. Installation This Ransomware drops the following files:
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
specific information from the affected system. It encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
encrypted files: .NEMTY_{7 random characters} It leaves text files that serve as ransom notes containing the following text: {Encrypted Directory}\NEMTY_{7 random characters}-DECRYPT.txt It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
the task manager of the affected system by modifying registry keys. It displays this ransom note after encryption. It adds the following scheduled tasks: Name = updater47 Action = vssadmin Delete
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
ransom note %Desktop%\data files encrypted.txt ← ransom note (Note: %User Startup% is the current user's Startup folder, which is usually C:\Documents and Settings\{user}\Start Menu\Programs\Startup
ransom note %Desktop%\Data recovery FILESs .txt ← ransom note (Note: %User Startup% is the current user's Startup folder, which is usually C:\Documents and Settings\{user}\Start Menu\Programs\Startup
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
following names: {filename}_decryptor_{random characters}.tor It leaves text files that serve as ransom notes containing the following text: {Encrypted Directory}\---==%$$$OPEN_ME_UP$$$==---.txt
appends the following extension to the file name of the encrypted files: _ID_{HDDVolumeID}_H_{BLOCKED}ta.company@{BLOCKED}.google It leaves text files that serve as ransom notes containing the following
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This