Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 10651-10700 de 11067 encontradas.

Page 1 ... Page 210 | Page 211 | Page 212 | Page 213 | Page 214 | Page 215 | Page 216 | Page 217 | Page 218 ... Page 222

Name Nível da ameaça Descrição
Trojan.Sjkr High Trojan.Sjkr runs silently in the background and can download and install ...
Trojan.Skintrim.GEN High Trojan.Skintrim.GEN runs without user notification after initial installation ...
Trojan.SkypSnif Medium This trojan targets machines that Skype application installed. Upon execution, ...
Trojan.Small_related High A trojan downloader which hijacks Internet Explorer browser settings and ...
Trojan.Small.AH High Trojan.Small.AH is a trojan which connects to the internet and runs silently in ...
Trojan.Small.AHX High Trojan.Small.AHX will change the search page and start page of a compu ...
Trojan.Small.AMH High Trojan.Small.AMH is a threat that attempts to connect from a remote host ...
Trojan.Small.BJY High Trojan.Small.BJY infects a users machine by installing itself into the system ...
Trojan.Small.DL High Trojan.Small.DL connects to preconfigured internet sites to download data and ...
Trojan.Small.FH High Trojan.Small.FH will use the computer network resources to perform a denial of ...
Trojan.Small.IP High Trojan-Downloader.Small.IP is a trojan that attempts to connect to the internet ...
Trojan.Small.LG High Trojan.Small.LG installs itself in the system folder. It then contacts remote ...
Trojan.Small.O High Trojan.Small.O will attempt to spread by copying itself to a number of ...
Trojan.Small.TT Medium Trojan.Small.TT tries to download and run malicious files from the Internet on ...
Trojan.Small.XTA Medium Trojan.Small.XTA connects to remote sites to download other malicious fil ...
Trojan.Small.XUT High Trojan.Small.XUT connects to remote sites to download other malicious fil ...
Trojan.Small.YQL High Trojan.Small.YQL on execution tries to connect to the Internet in order to ...
Trojan.Smallfeg High Trojan.Smallfeg connects to an external IRC server to allow an attacker ...
Trojan.SmartFinder Elevated SmartFinder downloads other malicious software from a remote server without the ...
Trojan.Sonic.Worm Medium Sonic Worm is an email worm which spreads by emailing itself to addresses in ...
Trojan.SpamBot High Trojan.SpamBot is a Trojan that sends out mass spam e-mails, consuming and ...
Trojan.Spamer High Trojan.Spamer is a trojan horse, which spreads via Internet downloads, FTP, IRC ...
Trojan.SpamThru High Trojan.SpamThru opens random ports allowing unauthorized access to the infected ...
Trojan.SpBot.B High Trojan.SpBot.B is a trojan that exploits the infected computer so that it can ...
Trojan.Spedia_Surf Medium This description of Surf+ is quoted from scumware.com: If you see the big red ...
Trojan.Spooner Elevated This trojan will create links in memory to a search engine on specific words ...
Trojan.Spy.Banker.SB Medium Trojan.Spy.Banker.SB is a trojan which will attempt to steal banking ...
Trojan.Spy.Keylogger.AJ High Trojan.Spy.Keylogger.AJ runs in the background and records all keystrokes on ...
Trojan.Spybot Medium Trojan.Spybot is a worm that spreads using P2P network sharing such as Kazaa ...
Trojan.Spybot.GL High Trojan.Spybot.GL runs silently in the background opening up a port to listen ...
Trojan.Spyeye High This trojan captures keystrokes and steals sensitive information and sends the ...
Trojan.Spyrat High Trojan.Spyrat drops itself onto infected machine and allows unauthorized access ...
Trojan.Spywad.A High Trojan.Spywad.A creates an HTML file which claims that your computer is ...
Trojan.Spywad.B High Trojan.Spywad.B hijacks windows desktop settings and changes users wallpaper. ...
Trojan.Srchspy High Trojan.Srchspy is a malicious program that may represent security risk for your ...
Trojan.SRRS High Trojan.SRRS contacts a remote server in order to download additional malware ...
Trojan.Startpage High Trojan.Startpage attempts to hijacks users Internet Explorer startpage to ...
Trojan.Startpage_9991_com Low Trojan.Startpage.9991.com often bundled with other Chinese adware, changes ...
Trojan.StartPage.ACW High Trojan.StartPage.ACW is a trojan which hijacks Internet Explorers homepage and ...
Trojan.StartPage.ACZ High Trojan.StartPage.ACZ is a trojan which hijacks Internet Explorers homepage and ...
Trojan.StartPage.ADH High Trojan.StartPage.ADH is a trojan which attempts to download other trojans and ...
Trojan.Startpage.AEB High Trojan.Startpage.AEB is a trojan with adware capabilities which displays ...
Trojan.Startpage.AEN High Trojan.Startpage.AEN is a trojan with adware capabilities and will also ...
Trojan.Startpage.AFB High Trojan.StartPage.AFB is a trojan horse which hijacks the Internet Explorer home ...
Trojan.StartPage.AKF Elevated Trojan.StartPage.AKF is a trojan which hijacks Internet Explorers homepage and ...
Trojan.StartPage.AKS High StartPage.AKS comes bundled with other malware and hijacks the Internet ...
Trojan.Startpage.AUM High Trojan.Startpage.AUM is a trojan application that poses as a fake installer to ...
Trojan.StartPage.AV High Trojan.Startpage.AV is a trojan with adware capabilities which hijacks Internet ...
Trojan.Startpage.AW High Trojan.Startpage.AW is a Trojan that will hijack Internet Explorers default ...
Trojan.StartPage.BK High Trojan.StartPage.BK is a trojan which hijacks Internet Explorers homepage and ...

Page 1 ... Page 210 | Page 211 | Page 212 | Page 213 | Page 214 | Page 215 | Page 216 | Page 217 | Page 218 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware