T - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1301-1350 of 3390 for "T" found.

Page 1 ... Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 ... Page 68

Name Nível da ameaça Descrição
Trojan-Dropper.USE High Trojan-Dropper.USE is a trojan which on execution installs malicious files onto ...
Trojan-Dropper.VB High Trojan-Dropper.VB is a family of trojans that attempts to drop other Trojans ...
Trojan-Dropper.VB.AY High Trojan-Dropper.VB.AY a malicious program that has capability to combine or bind ...
Trojan-Dropper.VB.BB High Trojan.Dropper.VB.BB when executed, copies itself onto user's computer and ...
Trojan-Dropper.VB.BLD High Trojan-Dropper.VB.BLD copies itself onto users' computer and further downloads ...
Trojan-Dropper.VB.FK High Trojan-Dropper.VB.FK when executed, drops malicious files onto a users computer ...
Trojan-Dropper.VB.GY High Trojan-Dropper.VB.GY when executed, drops malicious files onto a users computer ...
Trojan-Dropper.VB.IJM Medium Trojan-Dropper.VB.IJM a malicious trojan horse that may represent security risk ...
Trojan-Dropper.VB.IMC Medium Trojan-Dropper.VB.IMC a malicious trojan horse that may represent security risk ...
Trojan-Dropper.VB.INQ Medium Trojan-Dropper.VB.INQ when executed, drops malicious files onto a users ...
Trojan-Dropper.VB.IUS Medium Trojan-Dropper.VB.IUS when executed, drops malicious files onto a users ...
Trojan-Dropper.VB.IYQ Medium Trojan-Dropper.VB.IYQ when executed, drops malicious files onto a users ...
Trojan-Dropper.VB.JPT High Trojan-Dropper.VB.JPT when executed drops and executes other malicious files on ...
Trojan-Dropper.VB.MHY High When executed, Trojan-Dropper.VB.MHY drops and executes other malicious files ...
Trojan-Dropper.VB.MN High Trojan.Dropper.VB.MN copies itself onto user's computer and further downloads ...
Trojan-Dropper.VB.NN Medium Trojan.Dropper.VB.NN when executed, drops other Trojans and runs them without ...
Trojan-Dropper.VB.PP Elevated Trojan.Dropper.VB.PP copies itself onto user's computer and further downloads ...
Trojan-Dropper.Vidro High Trojan.Dropper.Vidro will copy itself into the system folder which then ...
Trojan-Dropper.Vidro.B High Trojan.Dropper.Vidro.B when executed, drops malicious files onto a users ...
Trojan-Dropper.Webind High Trojan-Dropper.Webind is a malicious program that is capable to bind two or ...
Trojan-Dropper.Welder High Trojan-Dropper.Welder is a malicious program that is capable to append and bind ...
Trojan-Dropper.WormDrop High Trojan-Dropper.WormDrop copies itself into the affected machine and drops ...
Trojan-Dropper.XspyFran High Trojan-Dropper.XspyFran is a trojan that Drops files that are detected as ...
Trojan-Dropper.Zbot High Trojan-Dropper.Zbot is a backdoor trojan that runs in the background and allows ...
Trojan-Dropper.Zyon High Trojan-Dropper.Zyon is a malicious program that has capability to combine or ...
Trojan-IM.Faker High Trojan-IM.Faker is a password stealing program that fakes Internet Messengers ...
Trojan-IM.Lunix High Trojan-IM.Lunix that sends out personal information related to ICQ Instant ...
Trojan-IM.VB High Trojan-IM.VB is a monitoring software used to view the true status of MSN ...
Trojan-IM.VB.J High Trojan.IM.VB.J is a trojan which steals display pictures and emoticons from MSN ...
Trojan-Notifier.IllNotifier High Trojan-Notifier.IllNotifier is a malicious trojan that notifies a remote user ...
Trojan-Notifier.Kipnot High Trojan-Notifier.Kipnot is malicious program that is capable to notify remote ...
Trojan-Proxy.3proxy High Trojan-Proxy.3proxy requests a bunch of other malicious files from ...
Trojan-Proxy.Agent.AA High Trojan.Proxy.Agent.AA opens port to allow hackers to gain full access to ...
Trojan-Proxy.Agent.AAJ High Trojan-Proxy.AAJ is a trojan proxy agent that sets the computer up as a proxy ...
Trojan-Proxy.Agent.AEJ Medium Trojan-Proxy.Agent.AEJ opens port and allows remote access to an infected ...
Trojan-Proxy.Agent.AFU High Trojan-Proxy.Agent.AFU allows remote attackers to gain full access to infected ...
Trojan-Proxy.Agent.AWK High Trojan-Proxy.Agent.AWK is a trojan proxy agent that sets the computer up as a ...
Trojan-Proxy.Agent.BGY High Trojan-Proxy.Agent.BGY allows an attacker to use the infected computer as a ...
Trojan-Proxy.Agent.BKK Medium Trojan-Proxy.Agent.BKK allows an attacker to use the infected computer as a ...
Trojan-Proxy.Agent.DD High Trojan.Proxy.Agent.DD opens a port to allow attackers to gain full access to ...
Trojan-Proxy.Agent.Df High Trojan.Proxy.Agent.Df will open a backdoor on the infected computer and set up ...
Trojan-Proxy.Agent.DT High Trojan.Proxy.Agent.DT uses a hidden process to open TCP ports which allow ...
Trojan-Proxy.Agent.FP High Trojan.Proxy.Agent.FP is a Trojan which will disable security related ...
Trojan-Proxy.Agent.FY High Trojan.Proxy.Agent.FY is a trojan horse which opens and listens on a port on an ...
Trojan-Proxy.Agent.GM High Trojan.Proxy.Agent.GM interferes with Windows XP's firewall and allows remote ...
Trojan-Proxy.Agent.GT Medium Trojan.Proxy.Agent.GT allows a remote intruder to gain unauthorized access to ...
Trojan-Proxy.Agent.HO High Trojan.Proxy.Agent.HO opens ports to allow an attacker unauthorized access ...
Trojan-Proxy.Agent.HS High Trojan.Proxy.Agent.HS is a Trojan that sends out mass spam e-mails, consuming ...
Trojan-Proxy.Agent.HW High Trojan-Proxy.Agent.HW opens a port to allow attackers to gain full access to ...
Trojan-Proxy.Agent.JL High Trojan.Proxy.Agent.JL connects to an external server to download additional ...

Page 1 ... Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 ... Page 68

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware