Keyword: ransom.win32.cring
75073 Total Search   |   Showing Results : 1421 - 1440
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
path 1}\cryptinfo.txt -> ransom note It drops the following copies of itself into the affected system: {variable path 1}\fakturax.exe Autostart Technique This Trojan adds the following registry entries
affected system. Ransomware Routine This Ransomware appends the following extension to the file name of the encrypted files: .[anubi@cock.li].anubi It leaves text files that serve as ransom notes containing
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result,
Name}.{File Extension}.fairytail It leaves text files that serve as ransom notes containing the following text: {Encrypted Folder}\README.txt ATTENTION! All your files are encrypted with
unknowingly by users when visiting malicious sites. It is capable of encrypting files in the affected system. It drops files as ransom note. Arrival Details This Ransomware arrives as an attachment to email
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
It does the following: Displays the following as ransom note. Ransomware Routine This Ransomware avoids encrypting files with the following strings in their file path: All Users Microsoft Windows
encrypting files in the affected system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Known as PETYA , this ransomware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service Dropbox for its arrival. Some PETYA variants
Known as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
.pptx .psd .qbb .rpt .sldprt .sql .txt .xls .xlsx .xml sln It drops the following file(s)/component(s): {All folders in all disk drive}\DECRYPT_YOUR_FILES.HTML - Ransom Note NOTES: The ransom note
encrypts files found in specific folders. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users
Directory}\s.bat %User Temp%\{random hex} %System Root%\READ_IT.hTmL ← Ransom Note %System Root%\lalover.inf0 %System Root%\lf.Lst ← List of encrypted files (Note: %User Temp% is the user's temporary folder,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware encrypts files found in specific folders. It drops files as ransom note. Autostart Technique This Ransomware adds the following registry entries to enable its automatic execution at