diff --git a/galaxy.html b/galaxy.html
index f3682ef..002207c 100755
--- a/galaxy.html
+++ b/galaxy.html
@@ -659,6 +659,9 @@ Android is a cluster galaxy available in JSON format at https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
+
+https://www.threatfabric.com/blogs/new_android_trojan_targeting_over_60_banks_and_social_apps.html |
+
@@ -13538,6 +13541,26 @@ By placing itself in this menu, the device’s OS will automatically start t
+
+
+
+
Since early September, SophosLabs has been monitoring an increasingly prolific attack targeting Internet-facing SSH servers on Linux-based systems that has been dropping a newly-discovered family of denial-of-service bots we’re calling Chalubo. The attackers encrypt both the main bot component and its corresponding Lua script using the ChaCha stream cipher. This adoption of anti-analysis techniques demonstrates an evolution in Linux malware, as the authors have adopted principles more common to Windows malware in an effort to thwart detection. Like some of its predecessors, Chalubo incorporates code from the Xor.DDoS and Mirai malware families.
+
+
+
@@ -13733,7 +13756,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 538. Table References
+Table 539. Table References
@@ -13766,7 +13789,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 539. Table References
+Table 540. Table References
@@ -13809,7 +13832,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 540. Table References
+Table 541. Table References
@@ -13854,7 +13877,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 541. Table References
+Table 542. Table References
@@ -13887,7 +13910,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 542. Table References
+Table 543. Table References
@@ -13923,7 +13946,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 543. Table References
+Table 544. Table References
@@ -13946,7 +13969,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 544. Table References
+Table 545. Table References
@@ -13976,7 +13999,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 545. Table References
+Table 546. Table References
@@ -14012,7 +14035,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 546. Table References
+Table 547. Table References
@@ -14041,7 +14064,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 547. Table References
+Table 548. Table References
@@ -14064,7 +14087,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 548. Table References
+Table 549. Table References
@@ -14084,7 +14107,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 549. Table References
+Table 550. Table References
@@ -14123,7 +14146,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 550. Table References
+Table 551. Table References
@@ -14162,7 +14185,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 551. Table References
+Table 552. Table References
@@ -14198,7 +14221,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 552. Table References
+Table 553. Table References
@@ -14228,7 +14251,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 553. Table References
+Table 554. Table References
@@ -14271,7 +14294,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 554. Table References
+Table 555. Table References
@@ -14301,7 +14324,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 555. Table References
+Table 556. Table References
@@ -14337,7 +14360,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 556. Table References
+Table 557. Table References
@@ -14363,7 +14386,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 557. Table References
+Table 558. Table References
@@ -14403,7 +14426,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 558. Table References
+Table 559. Table References
@@ -14439,7 +14462,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 559. Table References
+Table 560. Table References
@@ -14475,7 +14498,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 560. Table References
+Table 561. Table References
@@ -14514,7 +14537,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 561. Table References
+Table 562. Table References
@@ -14557,7 +14580,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 562. Table References
+Table 563. Table References
@@ -14596,7 +14619,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 563. Table References
+Table 564. Table References
@@ -14619,7 +14642,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 564. Table References
+Table 565. Table References
@@ -14652,7 +14675,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 565. Table References
+Table 566. Table References
@@ -14678,7 +14701,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 566. Table References
+Table 567. Table References
@@ -14717,7 +14740,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 567. Table References
+Table 568. Table References
@@ -14737,7 +14760,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 568. Table References
+Table 569. Table References
@@ -14770,7 +14793,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 569. Table References
+Table 570. Table References
@@ -14793,7 +14816,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 570. Table References
+Table 571. Table References
@@ -14819,7 +14842,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 571. Table References
+Table 572. Table References
@@ -14865,7 +14888,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 572. Table References
+Table 573. Table References
@@ -14898,7 +14921,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 573. Table References
+Table 574. Table References
@@ -14940,7 +14963,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 574. Table References
+Table 575. Table References
@@ -14970,7 +14993,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 575. Table References
+Table 576. Table References
@@ -15003,7 +15026,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 576. Table References
+Table 577. Table References
@@ -15026,7 +15049,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 577. Table References
+Table 578. Table References
@@ -15052,7 +15075,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 578. Table References
+Table 579. Table References
@@ -15088,7 +15111,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 579. Table References
+Table 580. Table References
@@ -15124,7 +15147,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 580. Table References
+Table 581. Table References
@@ -15160,7 +15183,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 581. Table References
+Table 582. Table References
@@ -15180,7 +15203,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 582. Table References
+Table 583. Table References
@@ -15206,7 +15229,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 583. Table References
+Table 584. Table References
@@ -15226,7 +15249,7 @@ Exploit-Kit is a cluster galaxy available in JSON format at
-Table 584. Table References
+Table 585. Table References
@@ -15280,7 +15303,7 @@ Malpedia is a cluster galaxy available in JSON format at
-Table 585. Table References
+Table 586. Table References
@@ -15316,7 +15339,7 @@ Malpedia is a cluster galaxy available in JSON format at
-Table 586. Table References
+Table 587. Table References
@@ -15342,7 +15365,7 @@ Malpedia is a cluster galaxy available in JSON format at
-Table 587. Table References
+Table 588. Table References
@@ -15368,7 +15391,7 @@ Malpedia is a cluster galaxy available in JSON format at
-Table 588. Table References
+Table 589. Table References
@@ -15404,7 +15427,7 @@ Malpedia is a cluster galaxy available in JSON format at
-Table 589. Table References
+Table 590. Table References
@@ -15444,7 +15467,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Catelites is also known as:
-Table 590. Table References
+Table 591. Table References
@@ -15480,7 +15503,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 591. Table References
+Table 592. Table References
@@ -15532,7 +15555,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 592. Table References
+Table 593. Table References
@@ -15567,7 +15590,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Clientor is also known as:
-Table 593. Table References
+Table 594. Table References
@@ -15607,7 +15630,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 594. Table References
+Table 595. Table References
@@ -15630,7 +15653,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Cpuminer is also known as:
-Table 595. Table References
+Table 596. Table References
@@ -15663,7 +15686,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 596. Table References
+Table 597. Table References
@@ -15696,7 +15719,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 597. Table References
+Table 598. Table References
@@ -15719,7 +15742,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Dvmap is also known as:
-Table 598. Table References
+Table 599. Table References
@@ -15752,7 +15775,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 599. Table References
+Table 600. Table References
@@ -15775,7 +15798,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
FlexiSpy is also known as:
-Table 600. Table References
+Table 601. Table References
@@ -15805,7 +15828,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 601. Table References
+Table 602. Table References
@@ -15838,7 +15861,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 602. Table References
+Table 603. Table References
@@ -15861,7 +15884,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
GlanceLove is also known as:
-Table 603. Table References
+Table 604. Table References
@@ -15896,7 +15919,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
HeroRAT is also known as:
-Table 604. Table References
+Table 605. Table References
@@ -15919,7 +15942,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
IRRat is also known as:
-Table 605. Table References
+Table 606. Table References
@@ -15952,7 +15975,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 606. Table References
+Table 607. Table References
@@ -15975,7 +15998,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
KevDroid is also known as:
-Table 607. Table References
+Table 608. Table References
@@ -16001,7 +16024,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Koler is also known as:
-Table 608. Table References
+Table 609. Table References
@@ -16024,7 +16047,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Lazarus is also known as:
-Table 609. Table References
+Table 610. Table References
@@ -16047,7 +16070,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Lazarus ELF Backdoor is also known as:
-Table 610. Table References
+Table 611. Table References
@@ -16080,7 +16103,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 611. Table References
+Table 612. Table References
@@ -16119,7 +16142,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 612. Table References
+Table 613. Table References
@@ -16159,7 +16182,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 613. Table References
+Table 614. Table References
@@ -16188,7 +16211,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
MazarBot is also known as:
-Table 614. Table References
+Table 615. Table References
@@ -16227,7 +16250,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 615. Table References
+Table 616. Table References
@@ -16260,7 +16283,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 616. Table References
+Table 617. Table References
@@ -16312,7 +16335,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
-Table 617. Table References
+Table 618. Table References
@@ -16338,7 +16361,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Fake Pornhub is also known as:
-Table 618. Table References
+Table 619. Table References
@@ -16358,7 +16381,7 @@ Currently the malware has overlays for over 2,200 apps of banks and financial in
Raxir is also known as:
-Table 619. Table References
+Table 620. Table References
@@ -16396,7 +16419,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 620. Table References
+Table 621. Table References
@@ -16441,7 +16464,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 621. Table References
+Table 622. Table References
@@ -16489,7 +16512,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 622. Table References
+Table 623. Table References
@@ -16525,7 +16548,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 623. Table References
+Table 624. Table References
@@ -16561,7 +16584,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 624. Table References
+Table 625. Table References
@@ -16610,7 +16633,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 625. Table References
+Table 626. Table References
@@ -16636,7 +16659,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Slocker is also known as:
-Table 626. Table References
+Table 627. Table References
@@ -16659,7 +16682,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
SMSspy is also known as:
-Table 627. Table References
+Table 628. Table References
@@ -16689,7 +16712,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 628. Table References
+Table 629. Table References
@@ -16725,7 +16748,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 629. Table References
+Table 630. Table References
@@ -16748,7 +16771,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
StealthAgent is also known as:
-Table 630. Table References
+Table 631. Table References
@@ -16771,7 +16794,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Stealth Mango is also known as:
-Table 631. Table References
+Table 632. Table References
@@ -16807,7 +16830,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 632. Table References
+Table 633. Table References
@@ -16840,7 +16863,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 633. Table References
+Table 634. Table References
@@ -16863,7 +16886,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
TeleRAT is also known as:
-Table 634. Table References
+Table 635. Table References
@@ -16886,7 +16909,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
TemptingCedar Spyware is also known as:
-Table 635. Table References
+Table 636. Table References
@@ -16919,7 +16942,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 636. Table References
+Table 637. Table References
@@ -16942,7 +16965,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Titan is also known as:
-Table 637. Table References
+Table 638. Table References
@@ -16968,7 +16991,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Triada is also known as:
-Table 638. Table References
+Table 639. Table References
@@ -17003,7 +17026,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Unidentified APK 001 is also known as:
-Table 639. Table References
+Table 640. Table References
@@ -17026,7 +17049,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Unidentified APK 002 is also known as:
-Table 640. Table References
+Table 641. Table References
@@ -17046,7 +17069,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Viper RAT is also known as:
-Table 641. Table References
+Table 642. Table References
@@ -17072,7 +17095,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
WireX is also known as:
-Table 642. Table References
+Table 643. Table References
@@ -17114,7 +17137,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 643. Table References
+Table 644. Table References
@@ -17140,7 +17163,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
XRat is also known as:
-Table 644. Table References
+Table 645. Table References
@@ -17163,7 +17186,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
ZooPark is also known as:
-Table 645. Table References
+Table 646. Table References
@@ -17196,7 +17219,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 646. Table References
+Table 647. Table References
@@ -17225,7 +17248,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Irc16 is also known as:
-Table 647. Table References
+Table 648. Table References
@@ -17280,7 +17303,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 648. Table References
+Table 649. Table References
@@ -17319,7 +17342,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 649. Table References
+Table 650. Table References
@@ -17354,7 +17377,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Chapro is also known as:
-Table 650. Table References
+Table 651. Table References
@@ -17383,7 +17406,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Cpuminer is also known as:
-Table 651. Table References
+Table 652. Table References
@@ -17412,7 +17435,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Ebury is also known as:
-Table 652. Table References
+Table 653. Table References
@@ -17454,7 +17477,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 653. Table References
+Table 654. Table References
@@ -17477,7 +17500,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
ext4 is also known as:
-Table 654. Table References
+Table 655. Table References
@@ -17510,7 +17533,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 655. Table References
+Table 656. Table References
@@ -17554,7 +17577,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Hakai is also known as:
-Table 656. Table References
+Table 657. Table References
@@ -17594,7 +17617,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 657. Table References
+Table 658. Table References
@@ -17642,7 +17665,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 658. Table References
+Table 659. Table References
@@ -17674,7 +17697,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
JenX is also known as:
-Table 659. Table References
+Table 660. Table References
@@ -17704,7 +17727,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 660. Table References
+Table 661. Table References
@@ -17727,7 +17750,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Lady is also known as:
-Table 661. Table References
+Table 662. Table References
@@ -17750,7 +17773,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
MiKey is also known as:
-Table 662. Table References
+Table 663. Table References
@@ -17786,7 +17809,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 663. Table References
+Table 664. Table References
@@ -17833,7 +17856,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Mokes is also known as:
-Table 664. Table References
+Table 665. Table References
@@ -17856,7 +17879,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Moose is also known as:
-Table 665. Table References
+Table 666. Table References
@@ -17885,7 +17908,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
MrBlack is also known as:
-Table 666. Table References
+Table 667. Table References
@@ -17921,7 +17944,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 667. Table References
+Table 668. Table References
@@ -17962,7 +17985,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Penquin Turla is also known as:
-Table 668. Table References
+Table 669. Table References
@@ -18001,7 +18024,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 669. Table References
+Table 670. Table References
@@ -18024,7 +18047,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
r2r2 is also known as:
-Table 670. Table References
+Table 671. Table References
@@ -18047,7 +18070,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Rakos is also known as:
-Table 671. Table References
+Table 672. Table References
@@ -18070,7 +18093,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Rex is also known as:
-Table 672. Table References
+Table 673. Table References
@@ -18112,7 +18135,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 673. Table References
+Table 674. Table References
@@ -18150,7 +18173,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
ShellBind is also known as:
-Table 674. Table References
+Table 675. Table References
@@ -18173,7 +18196,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Shishiga is also known as:
-Table 675. Table References
+Table 676. Table References
@@ -18196,7 +18219,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Spamtorte is also known as:
-Table 676. Table References
+Table 677. Table References
@@ -18229,7 +18252,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 677. Table References
+Table 678. Table References
@@ -18252,7 +18275,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Stantinko is also known as:
-Table 678. Table References
+Table 679. Table References
@@ -18285,7 +18308,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 679. Table References
+Table 680. Table References
@@ -18308,7 +18331,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Trump Bot is also known as:
-Table 680. Table References
+Table 681. Table References
@@ -18341,7 +18364,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 681. Table References
+Table 682. Table References
@@ -18370,7 +18393,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Turla RAT is also known as:
-Table 682. Table References
+Table 683. Table References
@@ -18410,7 +18433,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 683. Table References
+Table 684. Table References
@@ -18436,7 +18459,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
elf.vpnfilter is also known as:
-Table 684. Table References
+Table 685. Table References
@@ -18480,7 +18503,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
elf.wellmess is also known as:
-Table 685. Table References
+Table 686. Table References
@@ -18500,7 +18523,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Wirenet is also known as:
-Table 686. Table References
+Table 687. Table References
@@ -18558,7 +18581,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 687. Table References
+Table 688. Table References
@@ -18593,7 +18616,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
Xaynnalc is also known as:
-Table 688. Table References
+Table 689. Table References
@@ -18619,7 +18642,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
XOR DDoS is also known as:
-Table 689. Table References
+Table 690. Table References
@@ -18655,7 +18678,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 690. Table References
+Table 691. Table References
@@ -18688,7 +18711,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 691. Table References
+Table 692. Table References
@@ -18711,7 +18734,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
GuiInject is also known as:
-Table 692. Table References
+Table 693. Table References
@@ -18747,7 +18770,7 @@ As a distribution vector RedAlert 2 uses third-party app stores and imitates rea
-Table 693. Table References
+Table 694. Table References
@@ -18843,7 +18866,7 @@ The malware is not known to be proxy aware
-Table 694. Table References
+Table 695. Table References
@@ -18888,7 +18911,7 @@ The malware is not known to be proxy aware
-Table 695. Table References
+Table 696. Table References
@@ -18934,7 +18957,7 @@ The malware is not known to be proxy aware
-Table 696. Table References
+Table 697. Table References
@@ -18973,7 +18996,7 @@ The malware is not known to be proxy aware
-Table 697. Table References
+Table 698. Table References
@@ -18999,7 +19022,7 @@ The malware is not known to be proxy aware
Qarallax RAT is also known as:
-Table 698. Table References
+Table 699. Table References
@@ -19035,7 +19058,7 @@ The malware is not known to be proxy aware
-Table 699. Table References
+Table 700. Table References
@@ -19077,7 +19100,7 @@ The malware is not known to be proxy aware
-Table 700. Table References
+Table 701. Table References
@@ -19110,7 +19133,7 @@ The malware is not known to be proxy aware
-Table 701. Table References
+Table 702. Table References
@@ -19143,7 +19166,7 @@ The malware is not known to be proxy aware
-Table 702. Table References
+Table 703. Table References
@@ -19169,7 +19192,7 @@ The malware is not known to be proxy aware
CryptoNight is also known as:
-Table 703. Table References
+Table 704. Table References
@@ -19202,7 +19225,7 @@ The malware is not known to be proxy aware
-Table 704. Table References
+Table 705. Table References
@@ -19225,7 +19248,7 @@ The malware is not known to be proxy aware
KopiLuwak is also known as:
-Table 705. Table References
+Table 706. Table References
@@ -19251,7 +19274,7 @@ The malware is not known to be proxy aware
magecart is also known as:
-Table 706. Table References
+Table 707. Table References
@@ -19289,7 +19312,7 @@ The malware is not known to be proxy aware
-Table 707. Table References
+Table 708. Table References
@@ -19330,7 +19353,7 @@ The malware is not known to be proxy aware
Powmet is also known as:
-Table 708. Table References
+Table 709. Table References
@@ -19353,7 +19376,7 @@ The malware is not known to be proxy aware
scanbox is also known as:
-Table 709. Table References
+Table 710. Table References
@@ -19379,7 +19402,7 @@ The malware is not known to be proxy aware
HTML5 Encoding is also known as:
-Table 710. Table References
+Table 711. Table References
@@ -19405,7 +19428,7 @@ The malware is not known to be proxy aware
Maintools.js is also known as:
-Table 711. Table References
+Table 712. Table References
@@ -19428,7 +19451,7 @@ The malware is not known to be proxy aware
Unidentified 050 (APT32 Profiler) is also known as:
-Table 712. Table References
+Table 713. Table References
@@ -19454,7 +19477,7 @@ The malware is not known to be proxy aware
witchcoven is also known as:
-Table 713. Table References
+Table 714. Table References
@@ -19477,7 +19500,7 @@ The malware is not known to be proxy aware
Bella is also known as:
-Table 714. Table References
+Table 715. Table References
@@ -19513,7 +19536,7 @@ The malware is not known to be proxy aware
-Table 715. Table References
+Table 716. Table References
@@ -19536,7 +19559,7 @@ The malware is not known to be proxy aware
CoinThief is also known as:
-Table 716. Table References
+Table 717. Table References
@@ -19559,7 +19582,7 @@ The malware is not known to be proxy aware
Coldroot RAT is also known as:
-Table 717. Table References
+Table 718. Table References
@@ -19592,7 +19615,7 @@ The malware is not known to be proxy aware
-Table 718. Table References
+Table 719. Table References
@@ -19615,7 +19638,7 @@ The malware is not known to be proxy aware
CreativeUpdater is also known as:
-Table 719. Table References
+Table 720. Table References
@@ -19657,7 +19680,7 @@ The malware is not known to be proxy aware
-Table 720. Table References
+Table 721. Table References
@@ -19686,7 +19709,7 @@ The malware is not known to be proxy aware
Crossrider is also known as:
-Table 721. Table References
+Table 722. Table References
@@ -19709,7 +19732,7 @@ The malware is not known to be proxy aware
Dockster is also known as:
-Table 722. Table References
+Table 723. Table References
@@ -19735,7 +19758,7 @@ The malware is not known to be proxy aware
Dummy is also known as:
-Table 723. Table References
+Table 724. Table References
@@ -19758,7 +19781,7 @@ The malware is not known to be proxy aware
EvilOSX is also known as:
-Table 724. Table References
+Table 725. Table References
@@ -19784,7 +19807,7 @@ The malware is not known to be proxy aware
FlashBack is also known as:
-Table 725. Table References
+Table 726. Table References
@@ -19830,7 +19853,7 @@ The malware is not known to be proxy aware
-Table 726. Table References
+Table 727. Table References
@@ -19868,7 +19891,7 @@ The malware is not known to be proxy aware
HiddenLotus is also known as:
-Table 727. Table References
+Table 728. Table References
@@ -19898,7 +19921,7 @@ The malware is not known to be proxy aware
-Table 728. Table References
+Table 729. Table References
@@ -19934,7 +19957,7 @@ The malware is not known to be proxy aware
-Table 729. Table References
+Table 730. Table References
@@ -19963,7 +19986,7 @@ The malware is not known to be proxy aware
Keydnap is also known as:
-Table 730. Table References
+Table 731. Table References
@@ -19999,7 +20022,7 @@ The malware is not known to be proxy aware
-Table 731. Table References
+Table 732. Table References
@@ -20060,7 +20083,7 @@ The malware is not known to be proxy aware
-Table 732. Table References
+Table 733. Table References
@@ -20095,7 +20118,7 @@ The malware is not known to be proxy aware
Laoshu is also known as:
-Table 733. Table References
+Table 734. Table References
@@ -20121,7 +20144,7 @@ The malware is not known to be proxy aware
Leverage is also known as:
-Table 734. Table References
+Table 735. Table References
@@ -20157,7 +20180,7 @@ The malware is not known to be proxy aware
-Table 735. Table References
+Table 736. Table References
@@ -20180,7 +20203,7 @@ The malware is not known to be proxy aware
MacInstaller is also known as:
-Table 736. Table References
+Table 737. Table References
@@ -20213,7 +20236,7 @@ The malware is not known to be proxy aware
-Table 737. Table References
+Table 738. Table References
@@ -20249,7 +20272,7 @@ The malware is not known to be proxy aware
-Table 738. Table References
+Table 739. Table References
@@ -20272,7 +20295,7 @@ The malware is not known to be proxy aware
MacVX is also known as:
-Table 739. Table References
+Table 740. Table References
@@ -20295,7 +20318,7 @@ The malware is not known to be proxy aware
MaMi is also known as:
-Table 740. Table References
+Table 741. Table References
@@ -20318,7 +20341,7 @@ The malware is not known to be proxy aware
Mokes is also known as:
-Table 741. Table References
+Table 742. Table References
@@ -20354,7 +20377,7 @@ The malware is not known to be proxy aware
-Table 742. Table References
+Table 743. Table References
@@ -20377,7 +20400,7 @@ The malware is not known to be proxy aware
OceanLotus is also known as:
-Table 743. Table References
+Table 744. Table References
@@ -20409,7 +20432,7 @@ The malware is not known to be proxy aware
Olyx is also known as:
-Table 744. Table References
+Table 745. Table References
@@ -20455,7 +20478,7 @@ The malware is not known to be proxy aware
-Table 745. Table References
+Table 746. Table References
@@ -20478,7 +20501,7 @@ The malware is not known to be proxy aware
Pirrit is also known as:
-Table 746. Table References
+Table 747. Table References
@@ -20511,7 +20534,7 @@ The malware is not known to be proxy aware
-Table 747. Table References
+Table 748. Table References
@@ -20571,7 +20594,7 @@ The malware is not known to be proxy aware
-Table 748. Table References
+Table 749. Table References
@@ -20617,7 +20640,7 @@ The malware is not known to be proxy aware
-Table 749. Table References
+Table 750. Table References
@@ -20652,7 +20675,7 @@ The malware is not known to be proxy aware
systemd is also known as:
-Table 750. Table References
+Table 751. Table References
@@ -20688,7 +20711,7 @@ The malware is not known to be proxy aware
-Table 751. Table References
+Table 752. Table References
@@ -20727,7 +20750,7 @@ The malware is not known to be proxy aware
-Table 752. Table References
+Table 753. Table References
@@ -20763,7 +20786,7 @@ The malware is not known to be proxy aware
-Table 753. Table References
+Table 754. Table References
@@ -20789,7 +20812,7 @@ The malware is not known to be proxy aware
Wirenet is also known as:
-Table 754. Table References
+Table 755. Table References
@@ -20834,7 +20857,7 @@ The malware is not known to be proxy aware
-Table 755. Table References
+Table 756. Table References
@@ -20863,7 +20886,7 @@ The malware is not known to be proxy aware
XSLCmd is also known as:
-Table 756. Table References
+Table 757. Table References
@@ -20886,7 +20909,7 @@ The malware is not known to be proxy aware
PAS is also known as:
-Table 757. Table References
+Table 758. Table References
@@ -20919,7 +20942,7 @@ The malware is not known to be proxy aware
-Table 758. Table References
+Table 759. Table References
@@ -20945,7 +20968,7 @@ The malware is not known to be proxy aware
Silence DDoS is also known as:
-Table 759. Table References
+Table 760. Table References
@@ -20968,7 +20991,7 @@ The malware is not known to be proxy aware
BONDUPDATER is also known as:
-Table 760. Table References
+Table 761. Table References
@@ -20991,7 +21014,7 @@ The malware is not known to be proxy aware
GhostMiner is also known as:
-Table 761. Table References
+Table 762. Table References
@@ -21024,7 +21047,7 @@ The malware is not known to be proxy aware
-Table 762. Table References
+Table 763. Table References
@@ -21060,7 +21083,7 @@ The malware is not known to be proxy aware
-Table 763. Table References
+Table 764. Table References
@@ -21093,7 +21116,7 @@ The malware is not known to be proxy aware
-Table 764. Table References
+Table 765. Table References
@@ -21116,7 +21139,7 @@ The malware is not known to be proxy aware
QUADAGENT is also known as:
-Table 765. Table References
+Table 766. Table References
@@ -21139,7 +21162,7 @@ The malware is not known to be proxy aware
RogueRobin is also known as:
-Table 766. Table References
+Table 767. Table References
@@ -21165,7 +21188,7 @@ The malware is not known to be proxy aware
Tater PrivEsc is also known as:
-Table 767. Table References
+Table 768. Table References
@@ -21188,7 +21211,7 @@ The malware is not known to be proxy aware
ThunderShell is also known as:
-Table 768. Table References
+Table 769. Table References
@@ -21211,7 +21234,7 @@ The malware is not known to be proxy aware
WMImplant is also known as:
-Table 769. Table References
+Table 770. Table References
@@ -21234,7 +21257,7 @@ The malware is not known to be proxy aware
BrickerBot is also known as:
-Table 770. Table References
+Table 771. Table References
@@ -21278,7 +21301,7 @@ The malware is not known to be proxy aware
Saphyra is also known as:
-Table 771. Table References
+Table 772. Table References
@@ -21304,7 +21327,7 @@ The malware is not known to be proxy aware
FlexiSpy is also known as:
-Table 772. Table References
+Table 773. Table References
@@ -21340,7 +21363,7 @@ The malware is not known to be proxy aware
-Table 773. Table References
+Table 774. Table References
@@ -21392,7 +21415,7 @@ The malware is not known to be proxy aware
-Table 774. Table References
+Table 775. Table References
@@ -21446,7 +21469,7 @@ The malware is not known to be proxy aware
-Table 775. Table References
+Table 776. Table References
@@ -21472,7 +21495,7 @@ The malware is not known to be proxy aware
Abbath Banker is also known as:
-Table 776. Table References
+Table 777. Table References
@@ -21495,7 +21518,7 @@ The malware is not known to be proxy aware
AcridRain is also known as:
-Table 777. Table References
+Table 778. Table References
@@ -21518,7 +21541,7 @@ The malware is not known to be proxy aware
Acronym is also known as:
-Table 778. Table References
+Table 779. Table References
@@ -21544,7 +21567,7 @@ The malware is not known to be proxy aware
AdamLocker is also known as:
-Table 779. Table References
+Table 780. Table References
@@ -21570,7 +21593,7 @@ The malware is not known to be proxy aware
win.adkoob is also known as:
-Table 780. Table References
+Table 781. Table References
@@ -21596,7 +21619,7 @@ The malware is not known to be proxy aware
AdvisorsBot is also known as:
-Table 781. Table References
+Table 782. Table References
@@ -21619,7 +21642,7 @@ The malware is not known to be proxy aware
Adylkuzz is also known as:
-Table 782. Table References
+Table 783. Table References
@@ -21668,7 +21691,7 @@ The malware is not known to be proxy aware
-Table 783. Table References
+Table 784. Table References
@@ -21722,7 +21745,7 @@ The malware is not known to be proxy aware
-Table 784. Table References
+Table 785. Table References
@@ -21779,7 +21802,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Aldibot is also known as:
-Table 785. Table References
+Table 786. Table References
@@ -21802,7 +21825,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Project Alice is also known as:
-Table 786. Table References
+Table 787. Table References
@@ -21838,7 +21861,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 787. Table References
+Table 788. Table References
@@ -21886,7 +21909,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 788. Table References
+Table 789. Table References
@@ -21912,7 +21935,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Alma Communicator is also known as:
-Table 789. Table References
+Table 790. Table References
@@ -21935,7 +21958,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
AlmaLocker is also known as:
-Table 790. Table References
+Table 791. Table References
@@ -21955,7 +21978,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ALPC Local PrivEsc is also known as:
-Table 791. Table References
+Table 792. Table References
@@ -21988,7 +22011,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 792. Table References
+Table 793. Table References
@@ -22033,7 +22056,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 793. Table References
+Table 794. Table References
@@ -22056,7 +22079,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
AlphaNC is also known as:
-Table 794. Table References
+Table 795. Table References
@@ -22079,7 +22102,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Alreay is also known as:
-Table 795. Table References
+Table 796. Table References
@@ -22128,7 +22151,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 796. Table References
+Table 797. Table References
@@ -22164,7 +22187,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 797. Table References
+Table 798. Table References
@@ -22216,7 +22239,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 798. Table References
+Table 799. Table References
@@ -22281,7 +22304,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Anel is also known as:
-Table 799. Table References
+Table 800. Table References
@@ -22311,7 +22334,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 800. Table References
+Table 801. Table References
@@ -22331,7 +22354,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Apocalipto is also known as:
-Table 801. Table References
+Table 802. Table References
@@ -22367,7 +22390,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 802. Table References
+Table 803. Table References
@@ -22390,7 +22413,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ArdaMax is also known as:
-Table 803. Table References
+Table 804. Table References
@@ -22410,7 +22433,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Arefty is also known as:
-Table 804. Table References
+Table 805. Table References
@@ -22440,7 +22463,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 805. Table References
+Table 806. Table References
@@ -22476,7 +22499,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 806. Table References
+Table 807. Table References
@@ -22505,7 +22528,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
AscentLoader is also known as:
-Table 807. Table References
+Table 808. Table References
@@ -22525,7 +22548,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ASPC is also known as:
-Table 808. Table References
+Table 809. Table References
@@ -22565,7 +22588,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
-Table 809. Table References
+Table 810. Table References
@@ -22591,7 +22614,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
AthenaGo RAT is also known as:
-Table 810. Table References
+Table 811. Table References
@@ -22614,7 +22637,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ATI-Agent is also known as:
-Table 811. Table References
+Table 812. Table References
@@ -22637,7 +22660,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ATMii is also known as:
-Table 812. Table References
+Table 813. Table References
@@ -22660,7 +22683,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
ATMitch is also known as:
-Table 813. Table References
+Table 814. Table References
@@ -22683,7 +22706,7 @@ ALDIBOT first appeared in late August 2012 in relevant forums. Variants can stea
Atmosphere is also known as:
-Table 814. Table References
+Table 815. Table References
@@ -22710,7 +22733,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
ATMSpitter is also known as:
-Table 815. Table References
+Table 816. Table References
@@ -22736,7 +22759,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
August Stealer is also known as:
-Table 816. Table References
+Table 817. Table References
@@ -22769,7 +22792,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 817. Table References
+Table 818. Table References
@@ -22811,7 +22834,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 818. Table References
+Table 819. Table References
@@ -22834,7 +22857,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
AvastDisabler is also known as:
-Table 819. Table References
+Table 820. Table References
@@ -22857,7 +22880,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
AVCrypt is also known as:
-Table 820. Table References
+Table 821. Table References
@@ -22880,7 +22903,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Aveo is also known as:
-Table 821. Table References
+Table 822. Table References
@@ -22903,7 +22926,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Avzhan is also known as:
-Table 822. Table References
+Table 823. Table References
@@ -22926,7 +22949,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Ayegent is also known as:
-Table 823. Table References
+Table 824. Table References
@@ -22959,7 +22982,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 824. Table References
+Table 825. Table References
@@ -23017,7 +23040,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 825. Table References
+Table 826. Table References
@@ -23052,7 +23075,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
BABYMETAL is also known as:
-Table 826. Table References
+Table 827. Table References
@@ -23075,7 +23098,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
backspace is also known as:
-Table 827. Table References
+Table 828. Table References
@@ -23098,7 +23121,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
BackSwap is also known as:
-Table 828. Table References
+Table 829. Table References
@@ -23130,7 +23153,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
BadEncript is also known as:
-Table 829. Table References
+Table 830. Table References
@@ -23153,7 +23176,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
badflick is also known as:
-Table 830. Table References
+Table 831. Table References
@@ -23176,7 +23199,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
BadNews is also known as:
-Table 831. Table References
+Table 832. Table References
@@ -23221,7 +23244,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 832. Table References
+Table 833. Table References
@@ -23241,7 +23264,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Bahamut is also known as:
-Table 833. Table References
+Table 834. Table References
@@ -23267,7 +23290,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Banatrix is also known as:
-Table 834. Table References
+Table 835. Table References
@@ -23290,7 +23313,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
bangat is also known as:
-Table 835. Table References
+Table 836. Table References
@@ -23336,7 +23359,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 836. Table References
+Table 837. Table References
@@ -23378,7 +23401,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 837. Table References
+Table 838. Table References
@@ -23414,7 +23437,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
-Table 838. Table References
+Table 839. Table References
@@ -23434,7 +23457,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
BatchWiper is also known as:
-Table 839. Table References
+Table 840. Table References
@@ -23457,7 +23480,7 @@ Both libraries are legitimate Windows drivers used to interact with the componen
Batel is also known as:
-Table 840. Table References
+Table 841. Table References