B - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 51-100 of 2233 for "B" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 ... Page 45

Name Nível da ameaça Descrição
Backdoor.Advanced_Port_Redirection Elevated Advanced Port Redirection is a hacktool used to create backdoor trojans for ...
Backdoor.Aebot.J High Backdoor.Aebot.J is a trojan that opens a random port and listens on it and is ...
Backdoor.Afcore.AE High Backdoor.Afcore.AE hooks itself to Explorer.exe which will allow it to operate ...
Backdoor.Afcore.GEN High Backdoor.Afcore.GEN hooks itself to Explorer.exe which will allow it to operate ...
Backdoor.Agent High Backdoor.Agent attempts to create backdoors and allows an attacker unauthorized ...
Backdoor.Agent_Secures High Backdoor.Agent.Secures has rootkit functionality, and has ability to send ...
Backdoor.Agent.ABZ High Backdoor.Agent.ABZ is a malicious application that runs in the background and ...
Backdoor.Agent.ADQQ Medium Backdoor.Agent.ADQQ is a malicious application that runs in the background and ...
Backdoor.Agent.AEC High Backdoor.Agent.AEC opens random ports and allows an attacker complete ...
Backdoor.Agent.AEX High Backdoor.Agent.AEX is a malicious application that runs in the background and ...
Backdoor.Agent.AFR High Backdoor.Agent.AFR is a malicious application that runs in the background and ...
Backdoor.Agent.AGA High Backdoor.Agent.AGA is a malicious application that runs in the background and ...
Backdoor.Agent.AHJ Medium This backdoor compromises the infected machine by opening ports for connecting ...
Backdoor.Agent.AIR High Backdoor.Agent.AIR is a malicious application that runs in the background and ...
Backdoor.Agent.AJU High Backdoor.Agent.AJU is a malicious backdoor trojan that is capable to run and ...
Backdoor.Agent.AKS High Backdoor.Agent.AKS will open a port and allow an attacker to gain remote access ...
Backdoor.Agent.ALC High Backdoor.Agent.ALC attempts to create backdoors and allows an attacker ...
Backdoor.Agent.ALH High Backdoor.Agent.ALH is a malicious application that runs in the background and ...
Backdoor.Agent.ALM High Backdoor.Agent.ALM is a malicious application that runs in the background and ...
Backdoor.Agent.ALP High Backdoor.Agent.ALP is a malicious application that runs in the background and ...
Backdoor.Agent.ALY High Backdoor.Agent.ALY attempts to create backdoors and allows an attacker ...
Backdoor.Agent.AMO High Backdoor.Agent.AMO allows unauthorized access to the infected computer without ...
Backdoor.Agent.AON High Backdoor.Agent.AON collects information of infected machines and sends them to ...
Backdoor.Agent.ARK High Backdoor.Agent.ARK is a Trojan that will add itself to Windows schedule tasks ...
Backdoor.Agent.BA Medium Backdoor.Agent.BA is a backdoor trojan that acts as proxy server which allows ...
Backdoor.Agent.BBP High Backdoor.Agent.BBP modify automatically start up files to append a reference to ...
Backdoor.Agent.BDQ High Backdoor.Agent.BDQ hooks itself to Explorer.exe which will it to operate under ...
Backdoor.Agent.BG High Backdoor.Agent.BG is a malicious application that runs in the background and ...
Backdoor.Agent.CFC High Backdoor.Agent.CFC opens up a backdoor on the infected computer allowing a ...
Backdoor.Agent.CG Elevated Backdoor.Agent.CG attempts to contact a predetermined host which can download ...
Backdoor.Agent.CH High Backdoor.Agent.CH allows a remote intruder to anonymously access the internet ...
Backdoor.Agent.CLH High Backdoor.Agent.CLH is a malicious application that runs in the background and ...
Backdoor.Agent.CNC High Backdoor.Agent.CNC attempts to install a backdoor to allow malicious attacker ...
Backdoor.Agent.CU High Backdoor.Agent.CU is an IRC Bot capable of participating in DoS attacks. The ...
Backdoor.Agent.CY High Backdoor.Agent.CY will allow a intruder to gain remote shell access to the ...
Backdoor.Agent.EC High Backdoor.Agent.EC runs silently in the background as a process which starts up ...
Backdoor.Agent.EN Elevated Backdoor.Agent.EN is a backdoor trojan which will give hackers full control of ...
Backdoor.Agent.EPU Medium Backdoor.Agent.EPU attempts to create backdoors and allows an attacker ...
Backdoor.Agent.FGV High Backdoor.Agent.FGV runs in the background and allows remote access to the ...
Backdoor.Agent.FO Medium This backdoor is capable of downloading files over the internet and uploading ...
Backdoor.Agent.FWT Medium Backdoor.Agent.FWT is a malicious backdoor trojan that runs in the background ...
Backdoor.Agent.GCD High Backdoor.Agent.GCD installs itself on the affected system without user ...
Backdoor.Agent.GDZ High Backdoor.Agent.GDZ runs in the background and allows attackers to gain remote ...
Backdoor.Agent.GT High Backdoor.Agent.GT runs in the background as a service, allowing attackers to ...
Backdoor.Agent.HKP High Backdoor.Agent.HKP is a malicious application that runs in the background and ...
Backdoor.Agent.HMT High Backdoor.Agent.HMT is a backdoor which will let infected system to be ...
Backdoor.Agent.JJ High Backdoor.Agent.JJ will open a port and allow an attacker to gain remote access ...
Backdoor.Agent.JN High Backdoor.Agent.JN drops itself under the Windows folder and conceals itself as ...
Backdoor.Agent.JZK High Backdoor.Agent.JZK attempts to create backdoors and allows an attacker ...
Backdoor.Agent.LEA High Backdoor.Agent.LEA is a malicious application that runs in the background and ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 ... Page 45

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware