Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 2901-2950 de 11067 encontradas.

Page 1 ... Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 ... Page 222

Name Nível da ameaça Descrição
Backdoor.BO2K Elevated Backdoor.BO2K is a malicious application that runs in the background and allows ...
Backdoor.Bobic.K High Backdoor.Bobic.K is a trojan backdoor which allows attackers to gain access to ...
Backdoor.Bodombot Medium Backdoor.Bodombot is a backdoor trojan which allows unauthorized access to ...
Backdoor.Bofishy Elevated Backdoor.Bofishy is a family of backdoor Trojans that affect the source code ...
Backdoor.Botax High Backdoor.Botax installs itself into the system folder of the infected machine. ...
Backdoor.Botex Elevated Backdoor.Botex is a backdoor program to allow unauthorized remote access to a ...
Backdoor.Botnachala Elevated Backdoor.Botnachala is a back door Trojan that modifies the Hosts file and may ...
Backdoor.Brabot High Backdoor.Brabot attempts to allow unauthorized access to infected machine via ...
Backdoor.Brador Elevated Backdoor.Brador is the first Windows Mobile backdoor Trojan horse. This ...
Backdoor.BrainSpy Elevated Backdoor.BrainSpy is a malicious application that runs in the background and ...
Backdoor.Brakkeshell Elevated Backdoor.Brakkeshell is a Trojan horse that opens a back door on the ...
Backdoor.Breach Elevated Backdoor.Breach is a malicious application that runs in the background and ...
Backdoor.Bredolab High Backdoor.Bredolab allows attackers unauthorized access to infected mac ...
Backdoor.Breplibot High Breplibot is a backdoor trojan which allows attackers to gain access to the ...
Backdoor.Bridco Elevated Backdoor.Bridco is a backdoor Trojan that uses MSN Messenger (.NET messenger). ...
Backdoor.BrownOrifice Elevated Backdoor.BrownOrifice uses Java to allow users to download and view files from ...
Backdoor.Cabro Elevated Backdoor.Cabro allows unauthorized access to the infected computer. ...
Backdoor.Cafeini High Backdoor.Cafeini is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Cakl High Backdoor.Cakl attempts to allow an attacker unauthorized access to an infected ...
Backdoor.CamKing Elevated Backdoor.CamKing allows the author of this Trojan Horse to activate your ...
Backdoor.Carool Elevated Backdoor.Carool is a back door server program that allows unauthorized remote ...
Backdoor.Carufax Elevated Backdoor.Carufax is a trojan horse that will attempt to download files, open a ...
Backdoor.Cazdoor High Backdoor.Cazdoor opens port allowing unauthorized access to the infected ...
Backdoor.Cazno Elevated Backdoor.Cazno is a Trojan editor or client that allows an attacker to control ...
Backdoor.CCInvader High Backdoor.CCInvader opens and listens on a port and grants the remote hacker ...
Backdoor.Ceckno High Backdoor.Ceckno hides itself to avoid detection. It injects its code into the ...
Backdoor.Ceckno.BHX High Backdoor.Ceckno.BHX is a backdoor that will provide remote access on infected ...
Backdoor.Chalex Elevated Backdoor.Chalex is a malicious application that runs in the background and ...
Backdoor.Charge Elevated Backdoor.Charge gives a remote attacker unobstructed access to a compromised ...
Backdoor.CHCP Elevated Backdoor.CHCP is a backdoor Trojan that is written in the Microsoft Visual ...
Backdoor.Checkesp Elevated Backdoor.Checkesp is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Cheeser High Backdoor.Cheeser opens ports and allows hackers to access the infected computer ...
Backdoor.Christmas_Blessing-4 High Opening this Powerpoint file will infect your PC with Hupigon Trojans. A ...
Backdoor.Chupa High Backdoor.Chupa is a trojan that opens a backdoor program and allows an attacker ...
Backdoor.Chupam Elevated Backdoor.Chupam is a malicious application that runs in the background and ...
Backdoor.CIA Elevated Backdoor.CIA is a malicious application that runs in the background and allows ...
Backdoor.CIADoor High Backdoor.CIADoor is a Trojan which on execution installs itself as a legitimate ...
Backdoor.CIADoor.13 High Backdoor.CIADoor.13 is a backdoor application which runs in the background, ...
Backdoor.CIADoor.AR High Backdoor.CIADoor.AR is a backdoor application that runs in the background, ...
Backdoor.CIADoor.B High Backdoor.CIADoor.B is a backdoor application that runs in the background, ...
Backdoor.Cigivip Elevated Backdoor.Cigivip is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Cindyc.YW High Backdoor.Cindyc.YW is a malicious program that modify system file in order to ...
Backdoor.Civcat Elevated Backdoor.Civcat is a Trojan horse that opens a back door on the compromised ...
Backdoor.Clt Elevated Backdoor.Clt is a Backdoor Trojan Horse that gives a hacker complete access to ...
Backdoor.CMDer High Backdoor.CMDer is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Cmdkill Elevated Backdoor.Cmdkill is a Trojan Horse script that can be added to HTML files. The ...
Backdoor.Cmjspy Elevated Backdoor.Cmjspy is a Backdoor Trojan Horse that logs keystrokes. ...
Backdoor.CNK Elevated Backdoor.CNK is the client portion of the Backdoor.CNK.A Trojan Horse. Using ...
Backdoor.Codbot.Gen High Backdoor.Codbot.Gen is an IRC controlled backdoor (or "bot") that can be used ...
Backdoor.ColdLoad Elevated Backdoor.ColdLoad is a malicious application that runs in the background and ...

Page 1 ... Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware