Viruses

Tarar

Its main aim is to take control of the affected computer and allow other users to control it.

SciRead.A

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Rizalof.MT

It allows to get into the affected computer.It generates a large amount of network traffic activity with the consequent consumption of bandwidth.It uses stealth techniques to avoid being detected by the user.It spreads , across the Internet.

Bagle.CV

It spreads and affects other computers.

Delf.F

It allows to enter and attack the affected computer, and gain remote access to it.

BW.596

It carries out damaging actions on the affected computer.It does not spread automatically using its own means.

Keylog.FV

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It spreads , across the Internet.

Gunsan

It spreads and affects other computers.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Ciadoor.EN

It allows to gain remote access to the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Gaobot.HZQ

It spreads and affects other computers.It uses the infected computer to take malicious actions on other users.It awaits remotecontrol orders to carry out.It spreads , across the Internet.

NRLG.985

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Galapoper.DL

It allows to gain remote access to the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Banker.FBT

It allows to get into the affected computer.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It downloads files from several websites.It uses stealth techniques to avoid being detected by the user.It spreads , across the Internet.

Attitude.827

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

WM/Phardera.B

It carries out damaging actions on the affected computer.It infects Words global template and documents.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Trj/AOLPS.112676

It allows to get into the affected computer.It does not spread automatically using its own means.

Downloader.MH

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Multidropper.BMR

It allows to get into the affected computer.It downloads or drops other malware.It does not spread automatically using its own means.

Black_Jec.231.C

It carries out damaging actions on the affected computer.It does not spread automatically using its own means.

Bck/Bionet.261

It spreads and affects other computers, and has damaging effects on the affected computer.