T - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2301-2350 of 3390 for "T" found.

Page 1 ... Page 43 | Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 ... Page 68

Name Nível da ameaça Descrição
Trojan-Spy.Chadem Medium Trojan-Spy.Chadem is a trojan that can steal user's information on infected ...
Trojan-Spy.Chazer Elevated Trojan-Spy.Chazer is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Clipper High Trojan.Spy.Clipper is a trojan which attempts to steal password and other ...
Trojan-Spy.CmjSpy High Trojan-Spy.CmjSpy attempts to steal confidential information such as usernames ...
Trojan-Spy.Coiboa High Trojan.Spy.Coiboa is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Czad High Trojan-Spy.Czad is an unwanted application that attempts to steal passwords, ...
Trojan-Spy.Darto High Trojan-Spy.Darto is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Delf.AA High Trojan-Spy.Delf.AA is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.ABI High Trojan-Spy.Delf.ABI is trojan that tries to pose as a fake internet explorer ...
Trojan-Spy.Delf.AF High Trojan.Spy.Delf.AF is a keylogging trojan which logs keystrokes to a html file. ...
Trojan-Spy.Delf.AK High Trojan-Spy.Delf.AK is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AR High Trojan-Spy.Delf.AR is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Delf.AS High Trojan-Spy.Delf.AS is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AX High Trojan-Spy.Delf.AX is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.AZQ High Trojan-Spy.Delf.AZQ is a threat that injects itself onto processes and monitors ...
Trojan-Spy.Delf.BG High Trojan-Spy.Delf.BG is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.BJI High Trojan-Spy.Delf.BJI monitors users internet activities and captures information ...
Trojan-Spy.Delf.BW High Trojan-Spy.Delf.BW is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.CB High Trojan-Spy.Delf.CB is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.CNK High Trojan-Spy.Delf.CNK is trojan file that tries to monitors user activities in ...
Trojan-Spy.Delf.CU High Trojan-Spy.Delf.CU attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.DO High Trojan.Spy.Delf.DO is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.EGG High Trojan-Spy.Delf.EGG is trojan file that tries to monitors user activities in ...
Trojan-Spy.Delf.ESE High Trojan-Spy.Delf.ESE attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.EW High Trojan-Spy.Delf.EW attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.FK High Trojan.Delf.FK monitors users browsing habits and sends the information back to ...
Trojan-Spy.Delf.GEN High Trojan.Spy.Delf.GEN is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.GW High Trojan-Spy.Delf.GW is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.JR High Trojan-Spy.Delf.JR is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.JU High Trojan-Spy.Delf.JU open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.KF High Trojan.Spy.Delf.KF is a Trojan which installs itself as a legitimate program ...
Trojan-Spy.Delf.MQ High Trojan.Spy.Delf.MQ is a trojan that will attempt to steal information including ...
Trojan-Spy.Delf.NC High Trojan.Spy.Delf.NC is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.NT High Trojan.Spy.Delf.NT will attempt to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.O High Trojan-Spy.Delf.O open ports and allow attackers unauthorized access to an ...
Trojan-Spy.Delf.OI High Trojan.Spy.Delf.OI is a trojan which on execution displays a fake banking ...
Trojan-Spy.Delf.OX High Trojan-Spy.Delf.OX attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.R High Trojan.Spy.Delf.R is a trojan which logs keystrokes and steals information from ...
Trojan-Spy.Delf.RY High Trojan-Spy.Delf.RY attempts to monitor and log keystrokes in order to steal ...
Trojan-Spy.Delf.SE High Trojan-Spy.Delf.SE is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Delf.UC High Trojan.Spy.Delf.UC open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.W High Trojan-Spy.Delf.W open ports and allows attackers unauthorized access to an ...
Trojan-Spy.Delf.YETH Medium Trojan-Spy.Delf.YETH logs keystrokes and steals vital information from the ...
Trojan-Spy.DiabloII High Trojan.Spy.DiabloII is a trojan which monitors users activities. It captures ...
Trojan-Spy.DiabloII.D High Trojan-Spy.DiabloII.D is a trojan that tries to steal valuable user information ...
Trojan-Spy.DiabloII.G High Trojan-Spy.DiabloII.G is a trojan that tries to steal valuable user information ...
Trojan-Spy.Dirt High Trojan-Spy.Dirt has ability to access files from a remote server by using ...
Trojan-Spy.Dumarin.A High Trojan-Spy.Dumarin.A steals password and other confidential information and ...
Trojan-Spy.Dummy Elevated Trojan.Spy.Dummy will contact a remote server to send back information ...
Trojan-Spy.EgySpy High Trojan.Spy.EgySpy logs keystrokes and steals information from the users ...

Page 1 ... Page 43 | Page 44 | Page 45 | Page 46 | Page 47 | Page 48 | Page 49 | Page 50 | Page 51 ... Page 68

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware