PUA.MSOffice.VBA.maldoc

Overview Type: PUA (Potentially Unwanted Application) Destruction Level: Low Prevalence: Low   What is Potentially Unwanted Application (PUA)? PUA is considered as malwares that include adware, toolbar installation or other intentions, but in fact they are not as destructive as other malwares. This malware category may perform activities that are not approved or expected by…

Virus.Win32.Expiro

Overview Type: Virus Destruction Level: High Prevalence: Low   Malware name(s) Virus.Win32.Expiro   What is a virus? In technical terms, a computer virus such as Expiro is a type of malware that cannot replicate itself automatically. Viruses can infect all accessible executable files in the computer system, which usually have .exe and .dll extensions. Viruses…

Trojan.Android.Wroba.Roamingmantis

Overview Type: Trojan Potential Damage: Medium Prevalence: Medium   Malware name(s) Trojan.Android.Wroba.Roamingmantis (Padvish) HEUR:Trojan-Dropper.AndroidOS.Wroba.o (Kaspersky) ANDROID/Drop.Wroba.monhn (Avira)   What is a Trojan? Trojan is a type of malware that disguise itself as cleaned and legitimate software and behaves totally like a useful and functional software. But when executed, it causes a lot of damage to…

Trojan.Win32.RisePro

Overview Type: Trojan Destruction Level: Medium Prevalence: Medium   Malware name(s) Trojan.Win32. RisePro.a (Padvish) A Variant Of Win32/TrojanDownloader.Agent.GNV (ESET) HEUR:Trojan-PSW.Win32.RisePro (Kaspersky) What is a Trojan? Trojans are a type of malware that masqurades themselves as legitimate and lawful software, behaving very similarly to useful and practical applications. However, when executed, they create numerous disruptions for…

Spy.Win32.SecondEye

Overview Type: Spyware Destruction Level: Moderate Prevalence: Moderate   Malware names: Spy.Win32.SecondEye (Padvish) Win32/Spy.SecondEye.A   What is spyware? This type of malware is used to steal organizational personal information and espionage purposes. With spyware installed on the system, the user’s information is under constant threat from the security point of view, and there is a…

Trojan.VBS.Neoreklami

Overview Type: Trojan Degree of destruction: Moderate Prevalence: High What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to an…

Trojan.Android.SmsSpy.Sinab

Overview Type: Trojan Destruction Level: Moderate What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to an email, etc. are…

Exploit.Win32.CVE-2022-30190.a

Overview: Type: Vulnerability Vulnerable Platform: Windows Vulnerable Versions: All Windows versions Patch release date: 14, June 2022   Vulnerable module: Microsoft Support Diagnostic Tool (MSDT) Vulnerability type: Remote Code Execution Risk Level: High (CVSS:3.1 7.8 / 7.0) What is a Vulnerability? In computer security, Vulnerability is a weak point in a platform that can be exploited by an…