Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 10001-10050 de 11067 encontradas.

Page 1 ... Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 | Page 205 ... Page 222

Name Nível da ameaça Descrição
Trojan-Spy.Wsnd High Trojan-Spy.Wsnd is a trojan that monitors user keylogs and then stores it in ...
Trojan-Spy.Xinkey High Trojan-Spy.Xinkey is a trojan that attempts to steal important user information ...
Trojan-Spy.Xspyout.A High Trojan-Spy.Xspyout.A is trojan that tries to monitors user activities in hopes ...
Trojan-Spy.Yazoka High Trojan-Spy.Yazoka is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Zagaban High Trojan-Spy.Zagaban hijacks the compromised system and steals sentive ...
Trojan-Spy.Zagaban.H High Trojan-Spy.Zagaban.H monitors browser activities in hopes that it can collect ...
Trojan-Spy.Zagaban.K High Trojan-Spy.Zagaban.K is a trojan that drops a copy of itself and its components ...
Trojan-Spy.Zbot High Trojan-Spy.Zbot is a rootkit trojan which steals online banking information and ...
Trojan-Spy.Zbot.A High Trojan-Spy.Zbot.A is a banking trojan that will monitor logins to banking ...
Trojan-Spy.Zbot.GLJ Medium Trojan-Spy.Zbot.GLJ is Trojan that will replace the system file by itself and ...
Trojan-Spy.Zbot.YETH High Trojan-Spy.Zbot.YETH is a rootkit trojan which steals online banking ...
Trojan-Spy.Zonepal Medium Trojan.Spy.Zonepal will hide itself in the system folder and add a registry key ...
Trojan.0Cat_Yellowpages Elevated 0Cat Yellowpages adds a toolbar into your browser and hijacks your homepage to ...
Trojan.2nd-thought_com High 2ndThought is a commercial trojan controlled by 2nd-thought.com. It is ...
Trojan.abcsearch4u High AbcSearch4u hijacks your homepage to abcsearch4u.com. It also changes Internet ...
Trojan.Abox Elevated Trojan.Abox is a downloading trojan that can download and install unsigned code ...
Trojan.AckCmd High Trojan.AckCmd is a backdoor trojan which allows an attacker remote access to an ...
Trojan.ActiveSecurity Medium Trojan.ActiveSecurity is a dialer program used to dial a high-cost ...
Trojan.Adclicker High Trojan.Adclicker is a trojan that will produce pop-up advertisements when you ...
Trojan.AddUser.A Low Trojan.AddUser.A will attempt to create a user account named "IUSE_SERVER" on ...
Trojan.Adex.A High Trojan.Adex.A is a trojan that attempts to connect to a certain website ...
Trojan.Adrenaline Low Trojan.Adrenaline is a malicious program that does not infect other files but ...
Trojan.AdRotator Elevated An ad exchange program that brings popup advertisements to user desktops. Some ...
Trojan.Adservice_Scanner High Adservice Scanner produces a fake scanning window alerting users that their ...
Trojan.AdsInject High Trojan.AdsInject is a threat that tries to download a file from a certain ...
Trojan.AF.20 High Trojan.AF.20 drops additional malware and It also creates a run key which ...
Trojan.Agent High Trojan.Agent will spy on the browsing habits of users, modify Internet Explorer ...
Trojan.Agent-BZ Medium Trojan.Agent-BZ creates a registry entry to ensure it executes on every ...
Trojan.Agent.ABE Medium Trojan.Agent.ABE downloads additional malware via FTP from Chinese adware ...
Trojan.Agent.ABF High Trojan.Agent.ABF is a trojan that installs itself as a service on the infected ...
Trojan.Agent.ACYQ Medium Trojan-Agent.ACYQ is a malicious trojan horse or bot that may represent ...
Trojan.Agent.AD High Trojan.Agent.AD will modify Internet Explorer settings and download malicious ...
Trojan.Agent.ADMK High Trojan.Agent.ADMK on execution drops and executes other malicious files on the ...
Trojan.Agent.AEHZ Medium Trojan.Agent.AEHZ is a trojan that is downloaded onto the computer by another ...
Trojan.Agent.AHD High Trojan.Agent.AHD attempts to connect to the Internet to contact a predetermined ...
Trojan.Agent.AHO High Trojan.Agent.AHO allows remote intruders to gain access and contol over the ...
Trojan.Agent.AIV High Trojan.Agent.AIV is downloaded onto the computer by another threat and ...
Trojan.Agent.AJG High Trojan.Agent.AJG is a threat that modifies the windows system host file in ...
Trojan.Agent.AKH High Trojan.Agent.AKH is a trojan that is downloaded onto the computer by another ...
Trojan.Agent.AMJI Medium Trojan.Agent.AMJI is downloaded onto the computer by another threat and ...
Trojan.Agent.AMK High Trojan.Agent.AMK is a trojan that will add itself to the Windows scheduled ...
Trojan.Agent.AMX High Trojan.Agent.AMX is a threat that attempts to connect to the Internet either to ...
Trojan.Agent.AOLJ High Trojan.Agent.AOLJ is a malicious program that may represent a security risk for ...
Trojan.Agent.AOY High Trojan.Agent.AOY is variant of eZula trojan which modifies the Windows system ...
Trojan.Agent.AQO Medium Trojan.Agent.AQO is a malicious trojan horse or bot that may represent security ...
Trojan.Agent.ARWZ Medium Trojan.Agent.ARWZ allows unauthorized remote access into the infected computer ...
Trojan.Agent.ASDJ High Trojan.Agent.ASDJ runs in the background and allows remote intruders to gain ...
Trojan.Agent.ASMU High Trojan.Agent.ASMU is a malicious trojan horse or bot that may represent ...
Trojan.Agent.ASQN High Trojan.Agent.ASQN on execution drops and executes other malware. It also ...
Trojan.Agent.ASU High Trojan.Agent.ASU is a trojan that is downloaded onto the computer by another ...

Page 1 ... Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 | Page 205 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware