Keyword: usojan.linux.cve20165195.c
300 Total Search   |   Showing Results : 161 - 180
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
CRYPDEF belongs to family of ransomware that uses a specific of the type of encryption technique. The CRYPDEF ransomware family encrypts files and asks infected users to pay for the decryption of the files.
Windows 2000, Windows XP, Windows Server 2003 InstallationThis spyware drops the following files: %System%\lowsec\local.ds%System%\lowsec\user.ds.lll%System%\lowsec\user.ds(Note: %System% is the Windows system folder, which is usually...
Although cybercriminals continuously refine their techniques, old tricks remain to be efficient in infecting user systems. One such example is DUNIHI variants which uses removable drives as its infection vec...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.It drops files as ransom note.
This Trojan adds registry entries to enable its automatic execution at every system startup.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
Windows 98, ME, NT, 2000, XP, Server 2003 InstallationThis backdoor drops and executes the following files: %Application Data%%Common Startup%%Desktop%%Favorites%%Program Files%%Start Menu%%System%%System Root%%Temp%%User Profile%%U...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It enables its automatic execution at every system startup by dropping copies of itself into the Window...