Search Results
Showing results for ���������������������������������������������������������������������������������������������������������������������������������������katalk:za33���������������������������
W32/Scheduler.ZA!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, ...
W32/Downloader_a.ZA!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard input...
W32/Sohanad.ZA!worm is classified as a worm. A worm has the capability to spread itself to other systems over a network.The Fortinet Antivirus Analyst Team is constantly updating our descriptions. ...
W32/Cometer.ZA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connecti...
The Fortinet Anti-Virus Analyst Team is currently in the process of creating a detailed description for this virus.
JS/Iframe.ZA!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, dele...
W32/Eorezo.ZAPOTENTIALLYUNWANTED is classified as a file infector.A file infector is a type of malware that has the capability to propagate by attaching its code to other programs or files.The Fort...
GenericRXAZ.ZA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connecti...
Linux/Satyr.ZA!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, de...
IframeBof.ZA!exploit is classified as malware using a known exploit. Exploit employs by malware to gain access to a system through a known vulnerabilities. Most commonly a computer security hole. T...