Keyword: usoj_ransom.wi
6450 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Trojan ransomware possesses increased potential for damage, propagation, or both. Specifically, it locks the affected machine by suspending all running threads found in EXPLORER.EXE. It then
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
computer. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
information. It encrypts files with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded
information. It is capable of encrypting files in the affected system. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file
with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
performing its routines. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
.rar It renames encrypted files using the following names: {original filename}.encrypted It does the following: Deletes encrypted files when ransom has not been paid within given time. Encrypts files in
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
ransom note {Folder containing encrypted files}\DECRYPT_MY_FILES.vbs {Folder containing encrypted files}\ID.txt %Application Data%\wl.bmp - set as desktop wallpaper (Note: %Application Data% is the
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Ransomware
file name of the encrypted files: .H_F_D_locked extension NOTES: This ransomware displays the following window applications as ransom note: This ransomware is also in development (in-dev ransomware).
.Sct .Vsd .wk3 .wk4 .XPM .zip .rar It does the following: It deletes 1000 files when system is restarted by the user It deletes a file per hour when ransom amount is not yet paid NOTES: This ransomware
This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages. This Trojan arrives on a