Keyword: ransom.win32.cring
75073 Total Search   |   Showing Results : 981 - 1000
Ransomware requires the following additional components to properly run: image.jpg -> to be used as Desktop Wallpaper config.cfg -> Contains the ID, ransom note name, Encrypted file extension, public
which displays the ransom note: http://ogrersmwre.16mb.com/enckey1 It connects to the following URL when the “(Programme Test)” hyperlink is clicked: https://www.coinbase.com/ --> Ransomware Routine This
encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
{folder of encrypted files}\_{number of folders encrypted}_HOWDO_text.html - ransom note It drops and executes the following files: %desktop%\_HOWDO_text.html - Ransom note %desktop%\_HOWDO_text.bmp - image
malware" %Application Data%\{10 digit number} %Application Data%\{Unique ID}.html -> Ransom Note %Application Data%\Microsoft\Windows\Templates\{Unique ID}.html -> Ransom Note %Desktop%\{Unique ID}.html ->
malware" %Application Data%\{10 digit number} %Application Data%\{Unique ID}.html -> Ransom Note %Application Data%\Microsoft\Windows\Templates\{Unique ID}.html -> Ransom Note %Desktop%\{Unique ID}.html ->
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It
%AppDataLocal%\Lista.log It deletes all encrypted files after 3 days if ransom is not paid (Note: %AppDataLocal% is the Application Data folder found in Local Settings, where it is usually C:\Documents and
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies files, disabling programs and applications
\Microsoft\Crypto\wscript.exe.config ← xml file %Application Data%\Microsoft\Crypto\comm.txt ← ransom note %Application Data%\Microsoft\Crypto\bann.txt ← list of whitelisted directories
Cache\ \Microsoft Help\ It appends the following extension to the file name of the encrypted files: {original name}.{Unique ID} It leaves text files that serve as ransom notes containing the following
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
7, and 8.) It appends the following extension to the file name of the encrypted files: .FilGZmsp It leaves text files that serve as ransom notes containing the following text: %Desktop%\!
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
Installation This Ransomware adds the following processes: notepad.exe Other Details This Ransomware does the following: It display the following as ransom notes after encrypting file routine: Ransomware Routine