Keyword: ransom.win32.cring
75073 Total Search   |   Showing Results : 941 - 960
Server 2012.) Dropping Routine This Trojan drops the following files: {folder of encrypted files}\RESTORE-FILES!{random numbers}.txt - ransom note Other Details This Trojan encrypts files with the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected
\-INSTRUCTION.html - ransom note %Desktop%\-INSTRUCTION.bmp - image used as wallpaper {folders containing encrypted files}\_[number]-INSTRUCTION.html - ransom note (Note: %Desktop% is the desktop folder, where it
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation This Ransomware drops the following files: %Desktop%\README_TO_DECRYPT_FILES.html - ransom note %Desktop%
drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
not have any backdoor routine. It drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped by
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
files: %User Profile%\DesktopOSIRIS.htm ← ransom note %User Profile%\DesktopOSIRIS.bmp ← ransom note, also used as the background image (Note: %User Profile% is the current user's profile folder, which is
information. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly
system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\how_to_back_files.html %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\how_to_back_files.html %Program Files%\Adobe\Reader
system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a