Viruses

Multidropper.XQ

It allows to get into the affected computer.It does not spread automatically using its own means.

IVP.460

It carries out damaging actions on the affected computer.It does not spread automatically using its own means.

Phisher.R

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Dialer.ZH

It establishes a phone connection with a high rate number.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

WOW.BL

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It does not spread automatically using its own means.

Sdbot.CYG

It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.

Small.EN

It allows to gain remote access to the affected computer.It does not spread automatically using its own means.

Lineage.ASH

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It spreads , across the Internet.

Aladinz

It allows to gain remote access to the affected computer.It spreads , across the Internet.

Downloader.GCJ

It allows to get into the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Sdbot.CMV

It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.

Bifrose.KG

It allows to gain remote access to the affected computer.It opens one or more ports to allow remote access to the computer.It uses stealth techniques to avoid being detected by the user.It does not spread automatically using its own means.

Pc Flu-2F

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Bck/IRC.Wup

It allows to get into the affected computer.It does not spread automatically using its own means.

Alanchum.BJ

It allows to gain remote access to the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.

Sdbot.BJE

It joins an IRC channel in order to receive control commands, such as launching denial of service attacks against websites.

Dreg.448

It carries out damaging actions on the affected computer.It captures certain information entered or saved by the user, with the corresponding threat to privacy.It causes the loss of information stored on the computer, either specific files or data in general.It affects the productivity of the computer, the network to which its connected or other remote sites.It carries out actions that decrease the security level of the computer.It does not spread automatically using its own means.