Update 19053

2019-03-19

Total: 79 (2 Android, 3 other, 1 HTML, 1 Java, 2 JS, 7 MSIL, 1 PowerShell, 2 VBA, 4 VBS, 53 Win32, 3 Win64)

Android/Agent.BGI
Android/TrojanDropper.Agent.CWS
GenScript.CFH
GenScript.CFI
GenScript.CFJ
HTML/Phishing.Microsoft.DC
Java/Filecoder.AG
JS/ProxyChanger.FE
JS/TrojanDropper.Agent.NUA
MSIL/Agent.BWR
MSIL/Agent.TCZ
MSIL/Bladabindi.AS
MSIL/GenKryptik.DCZR
MSIL/GenKryptik.DCZZ
MSIL/NanoCore.E
MSIL/Packed.Confuser.BJ
PowerShell/TrojanDownloader.Agent.BIO
VBA/TrojanDownloader.Agent.FRK
VBA/TrojanDownloader.Agent.NEV
VBS/PSW.CoinStealer.C
VBS/TrojanDownloader.Agent.QWU
VBS/TrojanDownloader.Agent.QZJ
VBS/TrojanDropper.Agent.NAU
Win32/Adware.HPDefender.FAR
Win32/Adware.HPDefender.FAS
Win32/Adware.HPDefender.FAT
Win32/Adware.HPDefender.FAU
Win32/Agent.AAMF
Win32/Agent.RXL
Win32/Belonard.A
Win32/Exploit.CVE-2017-11882.ADS
Win32/Filecoder.LockerGoga.D
Win32/Formbook.AA
Win32/GenKryptik.DCZQ
Win32/GenKryptik.DCZS
Win32/GenKryptik.DCZT
Win32/GenKryptik.DCZU
Win32/GenKryptik.DCZV
Win32/GenKryptik.DCZW
Win32/GenKryptik.DCZX
Win32/GenKryptik.DCZY
Win32/GenKryptik.DDAA
Win32/Indiloadz.BH
Win32/Injector.EEJG
Win32/Injector.EEJH
Win32/Injector.EEJI
Win32/Injector.EEJJ
Win32/Injector.EEJK
Win32/KeyLogger.EliteKeylogger.AE
Win32/KeyLogger.EliteKeylogger.AE.gen
Win32/Kryptik.GRAZ
Win32/Kryptik.GRBA
Win32/Kryptik.GRBB
Win32/Kryptik.GRBC
Win32/Kryptik.GRBD
Win32/Kryptik.GRBE
Win32/Packed.AutoIt.OD
Win32/Packed.Themida.EXG
Win32/Packed.Themida.EXH
Win32/Packed.Themida.EXI
Win32/Packed.Themida.EXJ
Win32/Packed.Themida.Gen.WT
Win32/Packed.Themida.Gen.WU
Win32/Packed.VMProtect.GY
Win32/PSW.Agent.OFF
Win32/PSW.Fareit.A
Win32/PSW.OnLineGames.QZR
Win32/Rescoms.B
Win32/Small.NHS
Win32/Spy.Ursnif.BO
Win32/Spy.Weecnaw.O
Win32/TrojanDownloader.Agent.ELB
Win32/TrojanDownloader.Banload.YIR
Win32/TrojanDropper.Agent.RBR
Win32/TrojanDropper.Agent.SCR
Win32/TrojanDropper.VB.OUY
Win64/Agent.FG
Win64/Winsecsrv.K
Win64/Winsecsrv.L

 

List of updates

Please enable Javascript to ensure correct displaying of this content and refresh this page.