Keyword: ransom.win32.cring
75227 Total Search   |   Showing Results : 121 - 140
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Installation
\ .lockbit HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ .lockbit\DefaultIcon HKEY_CURRENT_USER\Software\FA0C50E256FCBA It does the following: It has the capability to print the ransom note in infected machines. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
file(s): %Desktop%\_Locky_recover_instructions.txt - ransom note %Desktop%\_Locky_recover_instructions.bmp - image used as wallpaper {Folders containing encrypted files}\_Locky_recover_instructions.txt -
This Ransomware drops files as ransom note. It avoids encrypting files with the following file extensions. Installation This Ransomware drops the following files: %User Temp%\background-image.jpg
processes. It drops files as ransom note. It avoids encrypting files with the following file extensions. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
\TypeSupport\Unicode\Mappings\Mac\ReadMe.txt %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\ReadMe.bmp %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
\TypeSupport\Unicode\Mappings\Mac\ReadMe.txt %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\ReadMe.bmp %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
not have any backdoor routine. It encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or
\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT %Program Files%\Common Files\Microsoft Shared\DW\1025\DWINTL20.DLL
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
\00000000.key {location of malware}\00000000.res {location of malware}\00000000.dat {location of malware}\taskmsgr.exe - contains ransom note {location of malware}\a.lnk - targets taskmsgr.exe {location of
\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\win\CP1250.TXT %Program Files%\Adobe\Reader 10.0\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT %Program Files%\Adobe\Reader 10.0\Resource