Search Results

Showing results for ������������������������������������������������������������������������������������������KaKaotalk:PC53��������������������������������������������� ��������������������������� ���������������������������

Virus
Java/Jifake.KA!tr is classified as a Trojan. Trojan has the capabilities to remote access connection handling, perform Denial of Service (DoS) or Distributed DoS (DDoS), capture keyboard inputs, de...
  • Added: Nov 28, 2011
Virus
PUP_XAX.KA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connections,...
  • Added: Feb 08, 2017
Virus
BAT/Starter.KA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connecti...
  • Added: Oct 28, 2018
Virus
The Fortinet Anti-Virus Analyst Team is currently in the process of creating a detailed description for this virus.
  • Added: Mar 30, 2012
Virus
PDF/PDJs.KA!exploit is classified as an exploit.An exploit is a malicious program that takes advantage of a software vulnerability that may enable a remote attacker to gain access to the targeted s...
  • Added: Sep 25, 2014
Virus
MSIL/ERR.KA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connections...
  • Added: Sep 08, 2014
Virus
GenericRXCO.KA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connecti...
  • Added: Sep 26, 2017
Virus
  • Added: Feb 10, 2005
Virus
The Fortinet Anti-Virus Analyst Team is currently in the process of creating a detailed description for this virus.
  • Added: Jun 10, 2012
Virus
FakeAlert.KA!tr is classified as a trojan.A trojan is a type of malware that performs activites without the user’s knowledge. These activities commonly include establishing remote access connection...
  • Added: Dec 07, 2017