Keyword: unauthorized file encryption
91978 Total Search   |   Showing Results : 41 - 60
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files found in specific folders. Arrival
path to a file or a directory to be encrypted specifically /FAST - Specify buffer size for fast encryption /MIN= - Specify minimum file size to encrypt /MAX= - Specify maximum file size to encrypt
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
the window shown below. Exiting this window will start the encryption routine. After its encryption routine it shows the following message box: It sets the file attribute of the running malware file to
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
following: Displays encryption progress in console Encrypts files found in the following drives: Fixed Drives, Removable Drives, Network Share Drives If the file is currently being used by another process, the
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
following window: After encryption routine it displays the following window: This ransomware avoids encrypting files with file size of 8,388,608 bytes or higher It is capable of encrypting files in the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
{Original File Name and Extension}.ned It does the following: Encrypts files in the Z:\Ransomware directory and its subdirectories Sends the Computer Name and the key used for encryption via HTTP POST
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This malware attempts to communicate to various AdFraud servers to access different advertisements in a hidden desktop. BEDEP contains heavy encryption and disguises itself as a Microsoft file
Ransomware requires the following additional components to properly run: image.jpg -> to be used as Desktop Wallpaper config.cfg -> Contains the ID, ransom note name, Encrypted file extension, public