Keyword: usoj_ransom.acg
6301 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
connects to certain websites to send and receive information. It encrypts files with specific file extensions. It encrypts files found in specific folders. It drops files as ransom note. Arrival Details This
Server 2008, and Windows Server 2012.) It drops the following files: %Application Data%\1.bmp %Desktop%\key.dat %Desktop%\#_HOW_TO_FIX.inf ← Ransom Note {Encrypted files directory}\#_HOW_TO_FIX.inf
with specific file extensions. It drops files as ransom note. Arrival Details This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager. It drops files as ransom note. It
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident
This is a type of polymorphic DOS virus that infects COM and EXE files. It uses a complex polymorphic engine to decrypt its code. This virus can be memory or non-memory resident. Non-memory resident
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Spyware connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may be dropped by other malware. It is a component of other malware. Arrival Details This Trojan may be dropped by the following malware: WORM_DORKBOT Installation This Trojan is a
compiled by the Edge Just-In-Time (JIT) compiler that allows Arbitrary Code Guard (ACG) to be bypassed. The security update addresses the ACG bypass vulnerability by helping to ensure that Microsoft Edge
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a