Application Control
Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.
This indicates that the system might be infected by the Katusha backdoor trojan.
This indicates that the system might be infected by the Webwail botnet.
This indicates that a system might be infected by Asprox Botnet
This indicates that the system might be infected by the Imrabot trojan.
This indicates that the system might be infected by the Sasfis trojan.
This indicates that the system might be infected by the Gumblar trojan.
This indicates Koobface command-and-control (C&C) activity from within the network.
This indicates an attempt to access the Dns2tcp tool.Dns2tcp is a network tool designed to relay TCP connections through DNS traffic....
This indicates an attempt to access GTunnel.GTunnel a free proxy software used to bypass firewall policy. It works as a local...
This indicates an attempt to access HTTP-Tunnel.HTTP-Tunnel is a proxy software that supports proxy services through its online...
This indicates an attempt to access CGIProxy.CGIProxy is a CGI (Common Gateway Interface) proxy software based on perl. It uses...
This indicates detection of network traffic originating from a computer infected with the Krackin version of the Storm worm.The...
It indicates that the system might be infected by the Agobot/Phatbot trojan.This backdoor trojan is known to:1) scan local networks...
This indicates detection of data traffic from a Gnutella application.Gnutella is a popular peer-to-peer (P2P) file-sharing protocol....
This indicates detection of data traffic from a Gnutella application.Gnutella is a popular peer-to-peer (P2P) file-sharing protocol....