Keyword: ransom.win32.cring
75227 Total Search   |   Showing Results : 1301 - 1320
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself. It is
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
unknowingly by users when visiting malicious sites. Installation This Trojan drops the following files: {folder of encrypted files}\_{count of folders where files are encrypted}-INSTRUCTION.html ← Ransom
information. It encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
Server 2008, and Windows Server 2012.) It drops the following files: %Application Data%\1.bmp %Desktop%\key.dat %Desktop%\#_HOW_TO_FIX.inf ← Ransom Note {Encrypted files directory}\#_HOW_TO_FIX.inf
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
{random characters}.bmp - image used as wallpaper %User Profile%\My Documents\Decrypt All Files {random characters}.txt - ransom note in text file %User Profile%\My Documents\{random characters}.html
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
when visiting malicious sites. Installation This Trojan drops the following files: %Desktop%\Decryption instructions webmafia@india.com recovery.txt -> Ransom Note %Application Data%\Info.hta -> Ransom
malicious sites. Installation This Trojan drops the following files: %Desktop%\_README_{random name}_.hta - ransom note %User Temp%\{random name}.bmp - background image %User Temp%\_README_{random name}_.hta
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.