Keyword: ransom.win32.cring
75227 Total Search   |   Showing Results : 821 - 840
8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) It drops the following component file(s): %Desktop%\_Locky_recover_instructions.txt - ransom note %Desktop%
It drops HELP_DECRYPT.HTML , HELP_DECRYPT.PNG , HELP_DECRYPT.TXT , and HELP_DECRYPT.URL to all folders where files are encrypted. It opens the dropped ransom notes HELP_DECRYPT.TXT , HELP_DECRYPT.PNG ,
visiting malicious sites. Installation This Trojan drops the following component file(s): %Desktop%\Payment-instructions.html - ransom note (Note: %Desktop% is the desktop folder, where it usually is C:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
HELP_DECRYPT.URL to all folders where files are encrypted. It opens the dropped ransom notes HELP_DECRYPT.TXT, HELP_DECRYPT.PNG and HELP_DECRYPT.HTML : It demands payment for using a decryption service:
HELP_DECRYPT.PNG, HELP_DECRYPT.TXT , and HELP_DECRYPT.URL to all folders where files are encrypted. It opens the dropped ransom notes: It demands payment for using a decryption service: Trojan.Cryptodefense (Symantec
8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.) It drops the following component file(s): %Desktop%\_Locky_recover_instructions.txt - ransom note %Desktop%
following component file(s): %Desktop%\_HELP_instructions.txt - ransom note %Desktop%\_HELP_instructions.bmp - image used as wallpaper {folders containing encrypted files}\_HELP_instructions.txt - ransom note
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It is capable of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Ransomware
drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
not have any backdoor routine. It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This
files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a