Keyword: ransom.win32.cring
75227 Total Search   |   Showing Results : 1201 - 1220
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does not
encrypts files found in specific folders. It drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped
system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
following files: (Folder of Encrypted Files}\OSIRIS-{Random Hex Values}.htm -> Ransom Note It drops and executes the following files: %Desktop%\DesktopOSIRIS.htm -> Ransom Note %Desktop%\DesktopOSIRIS.bmp ->
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\cached-microdescs.new {drive letter}:\README{1-10}.txt → Ransom Note {folder containing encrypted files}\README.txt → Ransom Note %ProgramData%\System32\xfs (Hidden) → Contains list of encrypted files (Note: %User Temp%
found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
victim {Folder containing encrypted files}\_How to decrypt LeChiffre files.html - contains the ransom note It drops the following copies of itself into the affected system: %Recycle Bin%\sunset.jpg (Note:
encrypted files: .armage It leaves text files that serve as ransom notes containing the following text: Trojan-Ransom.Win32.Cryptor.btx (KASPERSKY), Ransom:Win32/Genasom (MICROSOFT) Downloaded from the