T - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1351-1400 of 3390 for "T" found.

Page 1 ... Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 | Page 32 ... Page 68

Name Nível da ameaça Descrição
Trojan-Proxy.Agent.JO High Trojan-Proxy.Agent.JO attempt to create backdoors and allows an attacker to ...
Trojan-Proxy.Agent.JP High Trojan.Proxy.Agent.JP is a backdoor trojan which allows an attacker to gain ...
Trojan-Proxy.Agent.JS High Trojan.Proxy.Agent.JS opens ports to allow unauthorized hackers full access to ...
Trojan-Proxy.Agent.LL Elevated Trojan-Proxy.Agent.LL connects to several specific websites to download files ...
Trojan-Proxy.Agent.LQ High Trojan.Proxy.Agent.LQ opens port to allow attacker to carry out spamming and ...
Trojan-Proxy.Agent.MU High Trojan-Proxy.Agent.MU opens a random ports to allow attackers to gain full ...
Trojan-Proxy.Agent.Q High Trojan.Proxy.Agent.Q allows a remote intruder to gain unauthorized access to ...
Trojan-Proxy.Agent.TKN High Trojan.Proxy.Agent.TKN opens random ports allowing an attacker unauthorized ...
Trojan-Proxy.Agent.ZM Medium Trojan-Proxy.Agent.ZM opens port to allow hackers to gain full access to ...
Trojan-Proxy.BH High Trojan.Proxy.BH has the ability to redirect traffic and download additional ...
Trojan-Proxy.BK High Trojan.Proxy.BK lowers some Windows security settings and opens a random TCP ...
Trojan-Proxy.Bobax High Trojan.Proxy.Bobax will operate silently in the background, attempting to send ...
Trojan-Proxy.Bunitu Medium Trojan-Proxy.Bunitu listens to random ports for incoming requests. It contacts ...
Trojan-Proxy.Cimuz High Trojan-Proxy.Cimuz is a malicious trojan that starts a proxy server and allows ...
Trojan-Proxy.Corpes High Trojan-Proxy.Corpes opens a TCP port and allows a remote attacker to gain ...
Trojan-Proxy.Corpse High Trojan.Proxy.Corpse downloads configuration information from a remote server ...
Trojan-Proxy.Delf.AN High This Trojan modifies Windows system in order to by-pass Firewall protection and ...
Trojan-Proxy.Delf.CK High Trojan-Proxy.Delf.CK opens a port to allow remote users unauthorized access to ...
Trojan-Proxy.DiskMaster.B High Trojan-Proxy.DiskMaster.B is a backdoor application which runs in the ...
Trojan-Proxy.Dlena.AV Medium Trojan-Proxy.Dlena.AV is a malicious application that attempts to steal ...
Trojan-Proxy.Glukelira.GEN Medium Trojan-Proxy.Glukelira.GEN opens port to allow hackers to gain full access to ...
Trojan-Proxy.GN High Trojan.Proxy.GN uses a hidden process to open a random TCP port which allows ...
Trojan-Proxy.Horst High Trojan-Proxy.Horst is a trojan horse that is used by malicious users to hide ...
Trojan-Proxy.Jaber High Trojan-Proxy.Jaber injects itself into the Layered Service Provider (LSP) ...
Trojan-Proxy.Jaber.G Low Trojan-Proxy.Jaber.G installs onto infected machine silently and adds itself to ...
Trojan-Proxy.Lager High Trojan.Proxy.Lager contacts a remote server to download and install malwares, ...
Trojan-Proxy.Lager.f High Trojan.Proxy.Lager.F contacts a remote server to download and install another ...
Trojan-Proxy.Livevids High Trojan-Proxy.Livevids attempts to open a random TCP port and connect to a ...
Trojan-Proxy.Mitglieder High Trojan-Proxy.Mitglieder is a threat that compromises computer by opening a ...
Trojan-Proxy.OPU High Trojan.Proxy.OPU will receive a list of servers addresses from ...
Trojan-Proxy.Ranky High Trojan-Proxy.Ranky is a Proxy Trojan which is designed to listen on a specified ...
Trojan-Proxy.Ranky.AN High Trojan.Proxy.Ranky.AN is a Proxy Trojan which is designed to listen to a ...
Trojan-Proxy.Ranky.BC High Trojan-Proxy.Ranky.BC is a threat that compromises computer by opening a proxy ...
Trojan-Proxy.Ranky.EK High Trojan.Proxy.Ranky.EK is a proxy server trojan which allows remote attackers to ...
Trojan-Proxy.Ranky.EL High Trojan.Proxy.Ranky.EL opens ports 1900 and 2869 and attempts to contact a ...
Trojan-Proxy.Ranky.GI High Trojan.Proxy.Ranky.GI is a Proxy Trojan which is designed to listen on a ...
Trojan-Proxy.Saturn.M High Trojan-Proxy.Saturn.M is a malicious trojan horse or bot that may represent ...
Trojan-Proxy.Slaper High Trojan.Proxy.Slaper is variant of Trojan.Mailbot that allows a infected system ...
Trojan-Proxy.Small.AV High Trojan-Proxy.Small.AV is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.BO High Trojan.Proxy.Small.BO silently installs itself onto a computer and ensures that ...
Trojan-Proxy.Small.BP High Trojan.Proxy.Small.BP is a trojan that installs itself onto the infected ...
Trojan-Proxy.Small.BT High Trojan.Proxy.Small.BT is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.BU High Trojan.Proxy.Small.BU connects to remote servers and allows remote users to ...
Trojan-Proxy.Small.CK High Trojan-Proxy.Small.CK is a Trojan horse which opens and listens on a random ...
Trojan-Proxy.Small.CO High Trojan.Proxy.Small.CO is downloaded and installed as part of ...
Trojan-Proxy.Small.CR.8 High Trojan.Proxy.Small.CR.8 attempts to connect to smoke.all.the.marijuanabuds.info ...
Trojan-Proxy.Small.CT High Trojan.Proxy.Small.CT will attempt to connect to the Internet to contact a ...
Trojan-Proxy.Small.DJ High Trojan.Proxy.Small.DJ is a Trojan that attempts to connect to the Internet to ...
Trojan-Proxy.Small.DU High Trojan.Proxy.Small.DU is a Trojan that will steal locally stored email ...
Trojan-Proxy.Small.DV High Trojan.Proxy.Small.DV opens a proxy server on TCP port 1030 which allows remote ...

Page 1 ... Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 | Page 31 | Page 32 ... Page 68

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware