B - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 951-1000 of 2233 for "B" found.

Page 1 ... Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 ... Page 45

Name Nível da ameaça Descrição
Backdoor.Regdor Elevated Backdoor.Regdor is a Trojan horse that opens a back door on the compromised ...
Backdoor.Reload High Backdoor.Reload runs in the background, opens a port and allows attackers to ...
Backdoor.Reload.K High Backdoor.Reload.K runs in the background, opens a port and allows attackers to ...
Backdoor.Reload.M High Backdoor.Reload.M runs in the background, opens a port and allows attackers to ...
Backdoor.Remnet Elevated Backdoor.Remnet is a backdoor trojan that allows unauthorized remote access. By ...
Backdoor.Remocy Elevated Backdoor.Remocy is a Backdoor Trojan Horse that gives its creator full control ...
Backdoor.Remohak Elevated Backdoor.Remohak allows a hacker to remotely control an infected computer. It ...
Backdoor.RemoteNC Elevated Backdoor.RemoteNC is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.RemoteSOB Elevated The Backdoor.RemoteSOB Backdoor Trojan allows unauthorized access to the ...
Backdoor.Renomb Elevated Backdoor.Renomb is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Rephlex Elevated Backdoor.Rephlex is backdoor Trojan that allows a hacker to control the ...
Backdoor.Retrib Elevated Backdoor.Retrib is a malicious application that runs in the background and ...
Backdoor.Retrieve High Backdoor.Retrieve is a backdoor application that can be used to retrieve ...
Backdoor.Retro64 Elevated Backdoor.Retro64 is a Trojan that downloads and executes malicious files via ...
Backdoor.Revacc Elevated Backdoor.Revacc is a malicious application that runs in the background and ...
Backdoor.Revenge High Backdoor.Revenge allows attackers unauthorized access to infected mach ...
Backdoor.Revird Elevated Backdoor.Revird is a Trojan horse that opens a back door on the compromised ...
Backdoor.Revrs Elevated Backdoor.Revrs is the client that is used to control the Backdoor.Revrs Trojan. ...
Backdoor.RipClient Elevated Backdoor.RipClient is a malicious application that runs in the background and ...
Backdoor.Ripgof Elevated Backdoor.Ripgof is a Trojan horse that opens a back door on the compromised ...
Backdoor.Ripiner Elevated Backdoor.Ripiner is a back door Trojan horse that provides unauthorized access ...
Backdoor.Ripjac Elevated Backdoor.Ripjac is a backdoor Trojan that allows a hacker to gain access to the ...
Backdoor.RMFDoor Elevated Backdoor.RMFDoor is the client for the backdoor Trojan RMFdoor (the ser ...
Backdoor.RmtSvc.A Elevated Backdoor.RmtSvc.a is a malicious application that runs in the background and ...
Backdoor.Robi Elevated Backdoor.Robi is a backdoor server that allows unauthorized access to the ...
Backdoor.Robobot High Backdoor.Robobot will open various ports allowing unauthorized access to an ...
Backdoor.Robofo Elevated Backdoor.Robofo is a Trojan horse program that opens a back door on the ...
Backdoor.Rockse Elevated Backdoor.Rockse is a Backdoor Trojan Horse that allows unauthorized, remote ...
Backdoor.Rootcip High Backdoor.Rootcip opens ports on infected computer to allow attackers ...
Backdoor.Roxe Elevated Backdoor.Roxe is a backdoor Trojan horse that exploits the Microsoft GDI+ ...
Backdoor.Roxrat Elevated Backdoor.Roxrat is a variant of Backdoor.Roxrat. It gives an attacker ...
Backdoor.Roxy Elevated Backdoor.Roxy is a Trojan Horse that runs as a proxy server. It listens on a ...
Backdoor.RPCBot Elevated Backdoor.IRC.RPCBot.E is an Internet Relay Chat (IRC) Trojan horse that allows ...
Backdoor.Rsbot Elevated Backdoor.Rsbot is a back door Trojan horse that gives a hacker unauthorized ...
Backdoor.Rsock Elevated Backdoor.Rsock is a malicious application that runs in the background and ...
Backdoor.Rtkit Elevated Backdoor.Rtkit is a backdoor server program that allows a remote attacker to ...
Backdoor.Rukap High Backdoor.Rukap allows attackers unauthorized access to infected machin ...
Backdoor.Runar High Backdoor.Runar is a remote access trojan which allows attackers unauthorized ...
Backdoor.Runnet Elevated Backdoor.Runnet is a backdoor Trojan horse, which allows unauthorized, remote ...
Backdoor.Rustock Elevated Backdoor.Rustock is a back door Trojan horse that allows a compromised computer ...
Backdoor.Rustock.GEN High Backdoor.Rustock.GEN is a malicious program that runs in the background and ...
Backdoor.Ryejet Elevated Backdoor.Ryejet is a back door Trojan horse that allows unauthorized remote ...
Backdoor.Ryknos Elevated Backdoor.Ryknos is a minor variant of Backdoor.Ryknos. ...
Backdoor.Sadhound Elevated Backdoor.Sadhound is a backdoor Trojan that creates the file, ...
Backdoor.Sadmind Elevated Backdoor.Sadmind is the detection for any files that are dropped onto a Windows ...
Backdoor.Samkams Elevated Backdoor.Samkams is a Trojan horse with back door capabilities that allows a ...
Backdoor.Sandro Elevated Backdoor.Sandro is a malicious application that runs in the background and ...
Backdoor.Sanjicom Elevated Backdoor.Sanjicom is a Trojan horse that opens a back door on the compromised ...
Backdoor.Satan Elevated Backdoor.Satan is a malicious application that runs in the background and ...
Backdoor.Satancrew Elevated Backdoor.Satancrew is a Backdoor Trojan that gives an attacker unauthorized ...

Page 1 ... Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 ... Page 45

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware