T - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2751-2800 of 3390 for "T" found.

Page 1 ... Page 52 | Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 ... Page 68

Name Nível da ameaça Descrição
Trojan.Bancos.QW High Trojan.Bancos.QW monitors users Internet usage to capture all login information ...
Trojan.Bancos.RE Medium Trojan.Bancos.RE monitors users Internet usage to capture all login information ...
Trojan.Bancos.SF High Trojan.Bancos.SF monitors users Internet usage to capture all login information ...
Trojan.Bancos.W High Trojan.Bancos.W is a password stealing trojan. It monitors users Internet ...
Trojan.Bancos.WN High Trojan.Bancos.WN monitors users Internet usage to capture all login information ...
Trojan.BankAsh High Trojan bankAsh tries to steal email addresses and passwords stored in ...
Trojan.Bankem High Trojan.Bankem is a Trojan that installs itself on to the users computer as a ...
Trojan.Banker High Trojan.Banker steals information such as bank accounts, usernames, passwords ...
Trojan.Banker_Service High Trojan.Banker_Service will still personal banking information such as usernames ...
Trojan.Banker.AAL High Trojan.Banker.AAL displays fake login webpage when a user navigates to certain ...
Trojan.Banker.AEM Elevated Trojan.Banker.AEM is a Trojan horse which displays web pages pretending to be ...
Trojan.Banker.AJ High This is a Trojan reported by Sophos in November 04. It steals credit card ...
Trojan.Banker.AMD High Trojan.Banker.AMD installs itself in the Windows folder. It then logs users ...
Trojan.Banker.ANV High Trojan.Banker.ANV displays fake login webpage when a user navigates to certain ...
Trojan.Banker.BN High Trojan.Banker.BN is a trojan which monitors users Internet usage, displays fake ...
Trojan.Banker.CB High Trojan.Banker.CB monitors users internet activities and logs users banking and ...
Trojan.Banker.CV High Trojan.Banker.CV is a trojan which logs keystrokes when the user visits certain ...
Trojan.Banker.D High Trojan.Banker.D attempts to steal information such as usernames, passwords and ...
Trojan.Banker.DH High Trojan.Banker.DH runs silently in the background to monitor web browser ...
Trojan.Banker.DX High Trojan.Banker.DX is a Trojan which on execution installs itself as a legitimate ...
Trojan.Banker.EX High Trojan.Banker.EX will steal personal information by monitoring various ...
Trojan.Banker.FZ High Trojan.Banker.FZ is a Trojan which on execution installs itself as a legitimate ...
Trojan.Banker.GO High Trojan.Banker.GO displays fake login webpage when a user navigates to certain ...
Trojan.Banker.KQ High Trojan.Banker.KQ will display fake login webpages when a user navigates to ...
Trojan.Banker.QY High Trojan.Banker.QY attempts to steal information such as usernames, passwords and ...
Trojan.Banker.U High Trojan.Banker.U installs itself on the victims machine. It then attempts to log ...
Trojan.Banker.UK High Trojan.Banker.UK is a Trojan which when executed installs itself as a ...
Trojan.BAT.Flood High Trojan.BAT.Flood is a kind of batch file that overloads a connection by any ...
Trojan.BeastPWS.C High Trojan.BeastPWS.C is a keylogging trojan which arrives in an email which ...
Trojan.Belnow High Trojan.Belnow is a trojan that allows attacker to clear the CMOS and corrupt ...
Trojan.Bepiv.DC Medium Trojan.Bepiv.DC is a trojan that will display advertisements on an infected ...
Trojan.Bertz High Trojan.Bertz is a trojan that can be used by a malicious user to attack his or ...
Trojan.BHO.AJ High This trojan drops and installs its BHO component in the infected machine in ...
Trojan.BHO.BO High Trojan.BHO.BO installs a Browser Helper Object on infected machine. It ...
Trojan.BHO.BRV Medium Trojan.BHO.BRV installed as a Browser Helper Object in the infected machine in ...
Trojan.BHO.BU High Trojan.BHO.BU attempts to run a Browser Helper Object on infected computers and ...
Trojan.BHO.CS Elevated Trojan.BHO.CS is a trojan that is spread via email spam. It hooks itself on ...
Trojan.BHO.G High This trojan registered as a Browser Helper Object in the infected machine in ...
Trojan.BHO.GI High Trojan.BHO.GI is a BHO component that monitors system activity in the afffected ...
Trojan.BHO.GOK High Trojan.BHO.GOK installed as a Browser Helper Object in the infected machine in ...
Trojan.BHO.GV High Trojan.BHO.GV arrives on a system as a component of another malware or ...
Trojan.BHO.GXZ High Trojan.BHO.GXZ installed as a Browser Helper Object in the infected machine in ...
Trojan.BHO.GY High Trojan.BHO.GY arrives on a system as a component of another malware or ...
Trojan.BHO.INQ High Trojan.BHO.INQ installs a Browser Helper Object on the infected system. ...
Trojan.BHO.INS Elevated Trojan.BHO.INS is a trojan that is spread via email spam. It hooks itself on ...
Trojan.BHO.IPS Elevated Trojan.BHO.IPS hooks itself on Internet Explorer using AmskerBar Browser Helper ...
Trojan.BHO.JDH Elevated Trojan.BHO.JDH hooks itself on Internet Explorer using LuckInet Browser Helper ...
Trojan.BHO.KMY High Trojan.BHO.KMY installs itself as a Browser Helper Object (BHO) in order to ...
Trojan.BHO.KQW Medium Trojan.BHO.KQW installs itself as a Browser Helper Object (BHO) in order to ...
Trojan.BHO.MTQ Medium Trojan.BHO.MTQ drops and installs its BHO components on the infected machine in ...

Page 1 ... Page 52 | Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 ... Page 68

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware