B - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 551-600 of 2233 for "B" found.

Page 1 ... Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 ... Page 45

Name Nível da ameaça Descrição
Backdoor.Iexplore5 Elevated Backdoor.Iexplore5 is a malicious application that runs in the background and ...
Backdoor.Igloo High Backdoor.Igloo is a backdoor trojan which has the ability to open ports and ...
Backdoor.IISCrack Elevated This backdoor Trojan is a Dynamic Link Library (DLL) that is used to attack and ...
Backdoor.IK High Backdoor.IK allows hackers to change security settings and gain access to your ...
Backdoor.Imiserv Elevated Backdoor.Imiserv connects and sends data to a predefined Web site. It is ...
Backdoor.InCommander Elevated Backdoor.InCommander is a malicious application that runs in the background and ...
Backdoor.InfecDoor High Backdoor.InfecDoor attempts to create backdoors and allows an attacker ...
Backdoor.Infra High Backdoor.Infra is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Insane Elevated Backdoor.Insane is a malicious application that runs in the background and ...
Backdoor.Intended Elevated Backdoor.Intended is a malicious application that runs in the background and ...
Backdoor.Intruzzo Elevated Backdoor.Intruzzo is a remote access Trojan that was coded using Visual Basic ...
Backdoor.IO_Brisa High IO Brisa is a hack tool that is used by attackers to gain backdoor access on an ...
Backdoor.IRC Elevated Backdoor.IRC is a backdoor Trojan horse that uses malicious scripts in the mIRC ...
Backdoor.IRC.ABN High Backdoor.IRC.ABN is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Besik Medium Backdoor.IRC.Besik is a malicious application that runs in the background and ...
Backdoor.IRC.Bnc.A High Backdoor.IRC.Bnc.A allows an attacker unauthorized access to an infected ...
Backdoor.IRC.Client.a High This backdoor opens port 6667 in the windows firewall. It then lies dormant ...
Backdoor.IRC.Flood High Backdoor.IRC.Flood is a backdoor Trojan. It installs an mIRC client that has ...
Backdoor.IRC.Kelebek Medium Backdoor.IRC.Kelebek is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Logare High Backdoor.IRC.Logare is a tool for generating IRC backdoor trojans which can ...
Backdoor.IRC.LSA High Backdoor.IRC.LSA attempts to connect to an external IRC server to allow an ...
Backdoor.IRC.Mimic High Backdoor.IRC.Mimic installs its own modified version of mIRC client onto ...
Backdoor.IRC.Zapchast High Backdoor.IRC.Zapchast installs IRC clients on infected machines and serves as a ...
Backdoor.IRCBot High Backdoor.IRCBot is a family of IRC backdoors allowing unauthorized access to an ...
Backdoor.IRCBot_FactorLibrary High ...
Backdoor.IRCBot.AAC High Backdoor.IRCBot.AAC starts up when Windows starts and tries to connect to an ...
Backdoor.IRCBot.AAQ High Backdoor.IRCBot.AAQ is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.ACD High Backdoor.IRCBot.ACD is backdoor worm that spreads through Microsoft instant ...
Backdoor.IRCBot.ACF High Backdoor.IRCBot.ACF connects to the internet to download further malware and ...
Backdoor.IRCBot.ACU High Backdoor.IRCBot.ACU is a Backdoor that transmit itself via the instant ...
Backdoor.IRCBot.ADF High Backdoor.IRCBot.ADF is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.ADJ High Backdoor.IRCBot.ADJ connects to the internet to download further malware and ...
Backdoor.IRCBot.AE High Backdoor.IRCBot.AE uses mIRC client to remote control infected machines giving ...
Backdoor.IRCBot.AHJ Medium Backdoor.Ircbot.AHJ is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.AJU High Backdoor.IRCBot.AJU is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.AZ High Backdoor.IRCBot.AZ connects to the internet to download further malware and ...
Backdoor.IRCBot.AZC High Backdoor.IRCBot.AZC is a trojan which runs in the background providing a ...
Backdoor.IRCBot.BAM Medium This backdoor program is propagated by other malware through instant messenger ...
Backdoor.IRCBot.BAR High Backdoor.IRCBot.BAR allows an attacker unauthorized access to the infected ...
Backdoor.IRCBot.BFB High Backdoor.IRCBot.BFB connects to the internet to download further malware and ...
Backdoor.IRCBot.BMD High Backdoor.IRCBot.BMD connects to the internet to download further malware and ...
Backdoor.IRCBot.BOG High Backdoor.IRCBot.BOG is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.BSQ Medium Backdoor.IRCBot.BSQ is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.CJD High Backdoor.IRCBot.CJD is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.COM High Backdoor.IRCBot.COM is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DD High Backdoor.IRCBot.DD connects to the internet to download further malware and ...
Backdoor.IRCBot.DHH High Backdoor.IRCBot.DHH is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DOK High Backdoor.IRCBot.DOK is a malicious backdoor trojan that runs in the background ...
Backdoor.Ircbot.E High Backdoor.Ircbot.E is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.EKX Medium Backdoor.IRCBot.EKX is a malicious backdoor trojan that runs in the background ...

Page 1 ... Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 ... Page 45

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware