Inc - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 101-150 of 312 for "Inc" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Name Nível da ameaça Descrição
Application.Private_Eye High Private Eye is a PC activity monitoring tool. It records all keystrokes ...
Application.Real_Spy_Monitor-Keylogger High Real Spy Monitor is a commercial key logger which captures keystrokes typed, ...
Application.Revealer_Keylogger High Application.Revealer_Keylogger is a Keylogger software from Alan Sylvestre ...
Application.Snapkey High Snapkey is a keylogger which records all the keystrokes (including username, ...
Application.Solid_Key_Logger High Solid Key Logger is a keylogger software from Virtuoza, Inc. It can run in ...
Application.Spy_Lantern_Keylogger High Spy Latern Keylogger is a Keylogger software from Spydex Inc. It captures all ...
Application.Spy_Mail High Spy Mail is a monitoring software from InternetSafetySoftware.com Inc. It ...
Application.Spy_Software High Spy Software is a keylogger software from SoftWeb Ltd. It has the ability to ...
Application.SpyBuddy_Keylogger High SpyBuddy is not just a keylogger, but a monitoring software as well, that gives ...
Application.SpyEx Elevated SpyEx monitors and logs all activities performed on the system, including ...
Application.SpyKeySpy High SpyKeySpy is a Keylogger software from SoftArtStudio. It runs in stealth mode ...
Application.SpyMyPc High SpyMyPc is a keylogger software from Benutec software. It captures all the ...
Application.SpyMyPC_Pro High SpyMyPc Pro is a keylogger software from Benutec software. It captures all the ...
Application.SpyPal High SpyPal is a monitoring software from Thinkertec, Inc. It can run in stealth ...
Application.Stealth_Keyboard_Interceptor High Stealth Keyboard Interceptor is a spyware (Monitoring tool and a Keylogger) ...
Application.Stealth_Keylogger Info Stealth Keylogger is monitoring software from 'Amplusnet.' It can run in ...
Application.TrackingCookies Low A tracking cookie is any cookie that is shared among two or more unrelated ...
Application.Visage_Surveillance High Visage Surveillance is a Monitoring software from Realcode Development, Inc. It ...
Application.WhileYouSurf Elevated WhileYouSurf is a background process that monitors all internet activity. ...
Application.XP_Advanced_Keylogger High XP Advanced Keylogger is a monitoring software from YL Computing Inc. It can ...
Application.XP_Keylogger High XP Keylogger is a monitoring software from YL Computing Inc. It can run in ...
ARCV.330 Low ARCV.330 is a simple, encrypted DOS virus that infects .com files, including ...
Backdoor.Agent.AJU High Backdoor.Agent.AJU is a malicious backdoor trojan that is capable to run and ...
Backdoor.Agent.CU High Backdoor.Agent.CU is an IRC Bot capable of participating in DoS attacks. The ...
Backdoor.Agent.TX High Backdoor.Agent.TX runs invisibly in the background on an infected machine ...
Backdoor.Aimbot.AC High Backdoor.Aimbot.AC spreads to network shares by exploiting weak passwords. It ...
Backdoor.Assasin High Backdoor.Assasin is a backdoor which will open a port on a compromised computer ...
Backdoor.Beasty Elevated Backdoor.Beasty is a Trojan Horse that opens a listening port on your computer. ...
Backdoor.CIADoor High Backdoor.CIADoor is a Trojan which on execution installs itself as a legitimate ...
Backdoor.DarkMoon.YW Medium Backdoor.DarkMoon.YW can give unauthorized access to attackers and if the ...
Backdoor.Evivinc Elevated Backdoor.Evivinc is a Backdoor Trojan horse that installs WinVNC without a ...
Backdoor.Fadedoor High Backdoor.Fadedoor is a Remote Administrative Trojan (RAT), which gives ...
Backdoor.Hale Elevated Backdoor.Hale is a package of programs that provide backdoor access to an ...
Backdoor.Hogle Elevated Backdoor.Hogle is a proxy SMTP server that may be used as an anonymous spam ...
Backdoor.InCommander Elevated Backdoor.InCommander is a malicious application that runs in the background and ...
Backdoor.Netdex Elevated Backdoor.Netdex consists of several components, including JavaScript (JS) ...
Backdoor.Palukka Elevated Backdoor.Palukka is a backdoor Trojan horse that can give a hacker access to ...
Backdoor.Phoenix_Keylogger High Phoenix Keylogger is a PC activity monitoring tool. It records all keystrokes ...
Backdoor.Rado Elevated Backdoor.Rado is a Backdoor Trojan Horse that gives its creator unauthorized ...
Backdoor.Rbot High Backdoor.Rbot will open ports on an infected computer and connect to a remote ...
Backdoor.Sdbot.PG High Backdoor.Sdbot.PG runs in the background allowing remote intruders to issue ...
Backdoor.Sdbot.RB High Backdoor.Sdbot.RB runs in the background allowing remote intruders to issue ...
Backdoor.Sdbot.TR High Backdoor.Sdbot.TR runs in the background allowing remote intruders to issue ...
Backdoor.SDBot.XD High Backdoor.SDBot.XD connects to an IRC server in order to join a network of other ...
Backdoor.SecretService High Backdoor.SecretService is a Remote Administration Trojan. It installs a client ...
Backdoor.SilverFTP Elevated Backdoor.SilverFTP is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.Small.HJ High Backdoor.Small.HJ installs itself into the system directory. It then attempts ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Threadsys Elevated Backdoor.Threadsys is a backdoor Trojan horse that connects to a predefined ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware