B - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 401-450 of 2233 for "B" found.

Page 1 ... Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 ... Page 45

Name Nível da ameaça Descrição
Backdoor.Eclipse Elevated Backdoor.Eclipse is a malicious application that runs in the background and ...
Backdoor.Eclypse Elevated Backdoor.Eclypse is a malicious application that runs in the background and ...
Backdoor.EggDrop High Backdoor.EggDrop registers itself as a service which runs at Windows start up ...
Backdoor.EggHead Elevated Backdoor.EggHead is a backdoor Trojan horse program that uses a freeware IRC ...
Backdoor.Elitem Elevated Backdoor.Elitem is a Trojan horse that works under MSN Messenger. It allows a ...
Backdoor.Emcommander Elevated Backdoor.Emcommander is a Backdoor Trojan distributed as an EMF image file ...
Backdoor.Emogen High Backdoor Emogen is a malicious application that runs in the background and ...
Backdoor.Emoz Elevated Backdoor.Emoz is a malicious application that runs in the background and allows ...
Backdoor.Endool Elevated Backdoor.Endool is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Eparssa Elevated Backdoor.Eparssa is a Trojan horse that opens a back door on a compromised ...
Backdoor.Erman Elevated Backdoor.Erman is a malicious application that runs in the background and ...
Backdoor.Eterok Elevated Backdoor.Eterok is a back door that opens a network port on a compromised ...
Backdoor.Evilbot Elevated Backdoor.Evilbot is a variant of Backdoor.Evilbot that allows unauthorized ...
Backdoor.Evilsock High Backdoor.Evilsock opens port and allows remote access to an infected machine ...
Backdoor.Evivinc Elevated Backdoor.Evivinc is a Backdoor Trojan horse that installs WinVNC without a ...
Backdoor.Evologger Elevated Backdoor.Evologger is a malicious application that runs in the background and ...
Backdoor.Exdis Elevated Backdoor.Exdis is a backdoor Trojan horse that allows a hacker to remotely ...
Backdoor.Expjan Elevated Backdoor.Expjan is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Explorer32 Elevated Backdoor.Explorer32 is a malicious application that runs in the background and ...
Backdoor.EZBot Elevated Backdoor.EZBot is a Backdoor Trojan Horse that allows its creator to use ...
Backdoor.EzKilla High Backdoor.EzKilla creates a backdoor to allow an attacker to gain remote access ...
Backdoor.F_Door High Backdoor.F_Door is a remote access trojan (RAT) which allows an attacker access ...
Backdoor.F3bot Elevated Backdoor.F3bot allows unauthorized access to the infected computer. It requires ...
Backdoor.Fadedoor High Backdoor.Fadedoor is a Remote Administrative Trojan (RAT), which gives ...
Backdoor.Fakedos.C High Backdoor.Fakedos.C is a trojan that conceals itself as a DOS application. It ...
Backdoor.Fantasy Elevated Backdoor.Fantasy is a malicious application that runs in the background and ...
Backdoor.Fatroj Elevated Backdoor.Fatroj is the client component of the Backdoor.Fatroj Trojan Horse. ...
Backdoor.Feap Elevated Backdoor.Feap is a malicious application that runs in the background and allows ...
Backdoor.Feardoor Elevated Backdoor.Feardoor is a backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Fearic Elevated Backdoor.Fearic is a backdoor Trojan horse that allows a hacker to use America ...
Backdoor.Fearles Elevated Backdoor.Fearles is a Trojan horse that gives an attacker remote access to your ...
Backdoor.Feeth Elevated Backdoor.Feeth is a malicious application that runs in the background and ...
Backdoor.Femo Elevated Backdoor.Femo is a Backdoor Trojan Horse with process injection capabilities. ...
Backdoor.Firefly Elevated Backdoor.Firefly is a malicious application that runs in the background and ...
Backdoor.Fivsec Elevated Backdoor.Fivsec is a Trojan horse that opens a back door on a randomly chosen ...
Backdoor.Flux High Backdoor.Flux attempts to open ports and allows unauthorized access to infected ...
Backdoor.Fluxay Elevated Backdoor.Fluxay is a Backdoor Trojan Horse that uses pipes to allow an ...
Backdoor.Fof Elevated Backdoor.Fof is a malicious application that runs in the background and allows ...
Backdoor.Fonamebot Elevated Backdoor.Fonamebot is a proof-of-concept Trojan horse that uses DNS query ...
Backdoor.Foobot Elevated Backdoor.Foobot is a Trojan horse that opens a back door on the compromised ...
Backdoor.Forbot High Backdoor.Forbot connects to a remote IRC server from which attackers can gain ...
Backdoor.Formador Elevated Backdoor.Formador is a back door server that allows unauthorized remote access ...
Backdoor.Fox Elevated Backdoor.Fox gives a hacker full remote access to the comnputer. ...
Backdoor.Fraggle Elevated Backdoor.Fraggle is a backdoor Trojan horse that allows another person to have ...
Backdoor.Frango Elevated Backdoor.Frango is a Backdoor Trojan Horse that gives an attacker unauthorized ...
Backdoor.Frauder High Backdoor.Frauder runs in the background and allows remote access to the ...
Backdoor.Freddy Elevated Backdoor.Freddy is a malicious application that runs in the background and ...
Backdoor.Freefors Elevated Backdoor.Freefors is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Frenzy Elevated Backdoor.Frenzy is a malicious application that runs in the background and ...
Backdoor.FTP Elevated The Backdoor.FTP Trojan allows unauthorized access to the infected computer. By ...

Page 1 ... Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 ... Page 45

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware