• This malware is part of the Shadow Brokers' leaked tools and exploits. It targets Windows NT 4.
    Read more   

  • This malicious cryptocurrency miner is dropped by exploiting two vulnerabilities in Elasticsearch. This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware is dropped as a .DLL file.
    Read more   

  • This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself into all the removable drives connected to an affected system.
    Read more   

  • This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Trojan Spy steals certain information from the system and/or the user.It connects to certain websites to send and receive information.
    Read more