Keyword: ransom.win32.cring
75073 Total Search   |   Showing Results : 1041 - 1060
"31" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "32" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "34" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "35
\ Configuration xcnt = "31" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "32" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "33" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt =
\SOFTWARE\System32\ Configuration xcnt = "32" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "33" HKEY_LOCAL_MACHINE\SOFTWARE\System32\ Configuration xcnt = "34" HKEY_LOCAL_MACHINE\SOFTWARE
files that serve as ransom notes containing the following text: {Encrypted Directory}\---==%$$$OPEN_ME_UP$$$==---.txt Win32/Filecoder.Paradise.C trojan (NOD32), TrojanRansom.Crypmod (VBA32) Downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\Windows on all Windows operating system versions.) It drops the following component file(s): {Encrypted File Path}\HOW_TO_RESTORE_FILES.txt -> Ransom Note {Encrypted File Path}\HOW_TO_RESTORE_FILES.html ->
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It is capable of
following files: {Folder of Encrypted Files}\OSIRIS-{Random Values}.htm It drops and executes the following files: %User Profile%\DesktopOSIRIS.bmp -> Ransom Note, used as wallpaper %User Profile%
This ransomware speaks, apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan
It opens a GUI that serves as a ransom note: It has the capability to decrypt the encrypted files once the ransom is paid. It adds the following registry entry to disable the CTRL key:
Ransomware appends the following extension to the file name of the encrypted files: .CIop It leaves text files that serve as ransom notes containing the following text: {encrypted directory}\CIopReadMe.txt
files that serve as ransom notes containing the following text: %Desktop%\Read@My.txt Gen:Variant.Symmi.42586 (BITDEFENDER); Trojan:Win32/Casdet!rfn (MICROSOFT) Dropped by other malware, Downloaded from
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It is
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting