Update 19026

2019-03-14

Total: 81 (3 Android, 6 other, 2 HTML, 11 MSIL, 1 PDF, 2 PowerShell, 5 VBA, 4 VBS, 47 Win32)

Android/Spy.Banker.ALI
Android/Spy.QQspy.FC
Android/TrojanDropper.Agent.CWK
GenScript.CDD
GenScript.CDE
GenScript.CDF
GenScript.CDG
GenScript.CDH
GenScript.CDI
HTML/Phishing.Adobe.CH
HTML/Phishing.gen
MSIL/Agent.BPK
MSIL/BadJoke.OA
MSIL/Bladabindi.BC
MSIL/Injector.UHG
MSIL/Kryptik.RBO
MSIL/NanoCore.K
MSIL/PSW.OnLineGames.BSF
MSIL/Spy.Agent.AUS
MSIL/Spy.Agent.BYP
MSIL/TrojanClicker.Agent.NUQ
MSIL/TrojanDownloader.Agent.FJL
PDF/Phishing.Agent.KOU
PowerShell/TrojanDownloader.Agent.BII
PowerShell/TrojanDropper.Agent.AJ
VBA/TrojanDownloader.Agent.NCS
VBA/TrojanDownloader.Agent.NCT
VBA/TrojanDownloader.Agent.NCU
VBA/TrojanDownloader.Agent.NCV
VBA/TrojanDownloader.Agent.NCW
VBS/TrojanDownloader.Agent.QYP
VBS/TrojanDownloader.Agent.QYQ
VBS/TrojanDownloader.Agent.QYR
VBS/TrojanDropper.Agent.NSJ
Win32/Adware.HPDefender.EZS
Win32/Adware.HPDefender.EZT
Win32/Adware.HPDefender.EZU
Win32/Adware.Zdengo.DKZ
Win32/Adware.Zdengo.DLA
Win32/Bolik.J
Win32/Delf.TXQ
Win32/Filecoder.GandCrab.F
Win32/Formbook.AA
Win32/GenKryptik.DCMI
Win32/GenKryptik.DCMJ
Win32/GenKryptik.DCMK
Win32/GenKryptik.DCML
Win32/GenKryptik.DCMM
Win32/GenKryptik.DCMN
Win32/GenKryptik.DCMO
Win32/GenKryptik.DCMP
Win32/GenKryptik.DCMQ
Win32/HackTool.Agent.NED
Win32/Injector.EEGI
Win32/Injector.EEGJ
Win32/Injector.EEGK
Win32/Injector.EEGL
Win32/Injector.EEGM
Win32/Injector.EEGN
Win32/Kryptik.GQWJ
Win32/Kryptik.GQWK
Win32/Kryptik.GQWL
Win32/Kryptik.GQWM
Win32/Kryptik.GQWN
Win32/Kryptik.GQWO
Win32/Kryptik.GQWP
Win32/Kryptik.GQWQ
Win32/Kryptik.GQWR
Win32/Kryptik.GQWS
Win32/Kryptik.GQWT
Win32/Packed.Enigma.BS
Win32/Packed.Themida.EWK
Win32/Packed.Themida.EWL
Win32/Packed.Themida.Gen.VS
Win32/Packed.VMProtect.GV
Win32/PSW.Fareit.L
Win32/Spy.Weecnaw.O
Win32/TrojanDownloader.Agent.EMD
Win32/TrojanDownloader.Autoit.OTA
Win32/TrojanDownloader.Nymaim.BL
Win32/TrojanDownloader.Stantinko.FG

 

List of updates

Please enable Javascript to ensure correct displaying of this content and refresh this page.