T - Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2951-3000 of 3390 for "T" found.

Page 1 ... Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 ... Page 68

Name Nível da ameaça Descrição
Trojan.Gaslide.B High Trojan.Gaslide.B downloads malicious code on the infected machine. It hijacks ...
Trojan.GatewayExploit Medium Trojan.GatewayExploit is a program that using dictionary attack to exploit ...
Trojan.Generic High Common Components that may be used by Trojans Small, DRSN Search, Binet, ...
Trojan.Generic.CS High Trojan.Generic.CS is a malicious program that does not infect other files but ...
Trojan.Generic.PP High Trojan.Generic.PP is a malicious program that does not infect other files but ...
Trojan.Generic.SN High Trojan.Generic.SN is a malicious program that does not infect other files but ...
Trojan.Generic.SNB High Trojan.Generic.SNB is a malicious program that does not infect other files but ...
Trojan.Genome.GEN High Trojan.Genome.GEN is a trojan that targets IRC and Instant Messaging clients ...
Trojan.GenteeKiller.A High Trojan.GenteeKiller.A deletes files from the affected system including system ...
Trojan.GIFembed Medium Trojan.GIFembed is a Graphics Interchange Format (.GIF) file that contains an ...
Trojan.Glieder High Trojan.Glieder attempts to download other malware. It also turns off anti-virus ...
Trojan.Glitch High Trojan.Glitch is a backdoor Trojan that targets IRC and Instant Messaging ...
Trojan.Glukonat.B High Trojan.Glukonat.B is a trojan that tries intentionally tries to infiltrate ...
Trojan.Goldun.D High Trojan.Goldun.D contacts a remote server in order to download additional ...
Trojan.Gozi High Trojan.Gozi is a malicious program that may represent security risk for your ...
Trojan.Graone High Trojan.Graone is a Trojan horse with adware capabilities which runs in the ...
Trojan.Gromp Medium Trojan.Gromp reports a users browsing habits and search terms back to its ...
Trojan.Grum High Trojan.Grum installs itself as a rootkit in an infected user's system and ...
Trojan.HacDef High Trojan.HacDef allows unauthorized access to the infected system and can also be ...
Trojan.Hacker High Trojan.Hacker is a trojan that runs silently in the background and also ...
Trojan.HackTool.ANI Low HackTool.ANI is a tool used by an attacker to generate image or cursor files ...
Trojan.Haradong.CY High Trojan.Haradong.CY deletes files in the affected system and connects to remote ...
Trojan.Harnig.B High Trojan.Harnig.B is a trojan which downloads other malware from a remote server. ...
Trojan.Hatu High Trojan.Hatu is a trojan which when executed causes Windows to shutdown ...
Trojan.Hijack.Explorer High Trojan.Hijack.Explorer is a trojan hijacker that hooks onto Explorer.exe, so it ...
Trojan.Hiloti High Trojan.Hiloti is a malicious trojan horse or bot that may represent security ...
Trojan.HookDump High Trojan.HookDump captures all keystrokes to a log file on the computer itself, ...
Trojan.Hooker High Trojan.Hooker is a password stealing trojan which starts when Windows starts. ...
Trojan.Hotworld.a High Trojan.Hotworld.A is a spy trojan that captures keystrokes, logs users ...
Trojan.Hydraq.GEN High Trojan.Hydraq.GEN installs a backdoor trojan that listens for incoming commands ...
Trojan.Icekboy.F High Trojan.Icekboy.F is a Trojan horse which attempts to download other malware. On ...
Trojan.ICQPager.A High Trojan.ICQPager.A is a threat that uses the ICQ application to perform its ...
Trojan.ICQRevenge High Trojan.ICQRevenge is a malicious program that does not infect other files but ...
Trojan.IEPatcher Medium Trojan.IEPatcher modifies Internet Explorer to avoid Windows Genuine Advantage ...
Trojan.IESpawn High Trojan.IESpawn creates an instance of Internet Explorer which it hides from ...
Trojan.Implinker High Trojan.Implinker is installed on the infected computer through a web page that ...
Trojan.IMTheft High Trojan.IMTheft is a malicious trojan horse or bot that may represent security ...
Trojan.Inefo High Trojan.Inefo will register itself as a service once installed onto a machine. ...
Trojan.Infostealer High Trojan.Infostealer is a Trojan display fake alert or message to persuade users ...
Trojan.Inject High This trojan injects itself into one of the system process in order to bypass ...
Trojan.Inject.DXY High Trojan.Inject.DXY is a threat that injects itself onto system processes in ...
Trojan.Inject.ESI Medium Trojan.Inject.ESI injects itself into one of the system process in order to ...
Trojan.Inject.JDP High Trojan.Inject.JDP injects itself into one of the system process in order to ...
Trojan.Inject.KBV Medium Trojan.Inject.KBV injects itself into one of the system process in its attempt ...
Trojan.Inject.UHI Medium Trojan.Inject.UHI is a threat that injects itself onto system processes in ...
Trojan.Inject.ZR High Trojan.Inject.ZR creates a scheduled task for itself to be launched every hour ...
Trojan.Inteter.AJ High Trojan.Inteter.AJ monitors user activity while visiting selected websi ...
Trojan.Iosdt High Iosdt trojan claiming to be a "Product Activation" tool installs iosdt.exe . It ...
Trojan.IP High Trojan.IP is a trojan that can be used by a malicious user to attack his or her ...
Trojan.IRC.Comiz High Backdoor.IRC.Comiz is a Backdoor Trojan Horse that gives its creator full ...

Page 1 ... Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 ... Page 68

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware