Update 16670

2018-01-02

Total: 80 (1 Android, 1 DOC, 2 HTML, 7 JS, 7 MSIL, 7 OSX, 2 PowerShell, 1 VBA, 2 VBS, 47 Win32, 3 Win64)

Android/Spy.Banker.SY
DOC/TrojanDropper.Agent.X
HTML/Phishing.gen
HTML/TrojanDownloader.Agent.NEO
JS/TrojanDownloader.Agent.QVE
JS/TrojanDownloader.Agent.RIA
JS/TrojanDownloader.Agent.RIB
JS/TrojanDownloader.Agent.RIC
JS/TrojanDownloader.Agent.RID
JS/TrojanDownloader.Banload.SC
JS/TrojanDownloader.Nemucod.DXJ
MSIL/Agent.BGK
MSIL/Autorun.Spy.Agent.AU
MSIL/GenKryptik.BKVG
MSIL/HackTool.DoSer.DZ
MSIL/Kryptik.MDS
MSIL/TrojanDownloader.Small.BKK
MSIL/TrojanDropper.Agent.DLA
OSX/Adware.InstallCore.EN
OSX/Adware.InstallCore.FQ
OSX/Adware.InstallCore.FR
OSX/Adware.InstallCore.FS
OSX/Adware.InstallCore.FT
OSX/Adware.InstallCore.FU
OSX/Adware.InstallCore.FV
PowerShell/Agent.CJ
PowerShell/TrojanDownloader.Agent.ACP
VBA/TrojanDropper.Agent.YI
VBS/Agent.NQU
VBS/TrojanDownloader.Agent.OLD
Win32/Adware.Bang5mai.AE
Win32/Adware.HPDefender.CWX
Win32/Adware.Neoreklami.FQ
Win32/Adware.OpenSUpdater.CH
Win32/Adware.Toolbar.Webalta.HV
Win32/CoinMiner.AXT
Win32/Deceptor.MacroPCCleaner.A
Win32/Emotet.AZ
Win32/Filecoder.Crysis
Win32/Filecoder.EQ
Win32/GenKryptik.BKVF
Win32/GenKryptik.BKVH
Win32/GenKryptik.BKVI
Win32/GenKryptik.BKVJ
Win32/GenKryptik.BKVK
Win32/Injector.DUVG
Win32/Injector.DUVH
Win32/Injector.DUVI
Win32/Injector.DUVJ
Win32/Injector.DUVK
Win32/Injector.DUVL
Win32/Kryptik.GBCM
Win32/Kryptik.GBCN
Win32/Kryptik.GBCO
Win32/Kryptik.GBCP
Win32/Kryptik.GBCQ
Win32/Kryptik.GBCR
Win32/Kryptik.GBCS
Win32/Kryptik.GBCT
Win32/Kryptik.GBCU
Win32/Kryptik.GBCV
Win32/Kryptik.GBCW
Win32/Kryptik.GBCX
Win32/Kryptik.GBCY
Win32/Kryptik.GBCZ
Win32/Kryptik.GBDA
Win32/Kryptik.GBDB
Win32/Lethic.AF
Win32/NukeSped.CO
Win32/Phorpiex.F
Win32/Pliskal.C
Win32/PSW.Fareit.A
Win32/PSW.Fareit.L
Win32/Rootkit.Agent.OCC
Win32/SearchPage.G
Win32/Spy.Banker.AEDF
Win32/TrojanDownloader.Zurgop.CO
Win64/Derusbi.AX
Win64/JackServn.C
Win64/Spy.Banker.CF

 

List of updates

Please enable Javascript to ensure correct displaying of this content and refresh this page.