Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3101-3150 de 11067 encontradas.

Page 1 ... Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Foobot Elevated Backdoor.Foobot is a Trojan horse that opens a back door on the compromised ...
Backdoor.Forbot High Backdoor.Forbot connects to a remote IRC server from which attackers can gain ...
Backdoor.Formador Elevated Backdoor.Formador is a back door server that allows unauthorized remote access ...
Backdoor.Fox Elevated Backdoor.Fox gives a hacker full remote access to the comnputer. ...
Backdoor.Fraggle Elevated Backdoor.Fraggle is a backdoor Trojan horse that allows another person to have ...
Backdoor.Frango Elevated Backdoor.Frango is a Backdoor Trojan Horse that gives an attacker unauthorized ...
Backdoor.Frauder High Backdoor.Frauder runs in the background and allows remote access to the ...
Backdoor.Freddy Elevated Backdoor.Freddy is a malicious application that runs in the background and ...
Backdoor.Freefors Elevated Backdoor.Freefors is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Frenzy Elevated Backdoor.Frenzy is a malicious application that runs in the background and ...
Backdoor.FTP Elevated The Backdoor.FTP Trojan allows unauthorized access to the infected computer. By ...
Backdoor.FTP_Ana Elevated Backdoor.FTP_Ana is a Backdoor Trojan that gives a hacker unauthorized access ...
Backdoor.FTP_Bmail Elevated Backdoor.FTP_Bmail is a Trojan horse that allows a hacker to remotely control ...
Backdoor.FTP_Simpel High Backdoor.FTP.Simpel runs silently in the background and opens a port which ...
Backdoor.Fulamer Elevated Backdoor.Fulamer is a typical backdoor Trojan which gives a remote attacker ...
Backdoor.FunFactory Elevated Backdoor.FunFactory allows unauthorized access to an infected computer. It also ...
Backdoor.Futh Elevated Backdoor.Futh is a backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Futro Elevated Backdoor.Futro is a typical backdoor server program. Presence of the file ...
Backdoor.Fuwudoor Elevated Backdoor.Fuwudoor is a back door Trojan that allows unauthorized access to a ...
Backdoor.Fxsvc Elevated Backdoor.Fxsvc is a Backdoor Trojan Horse that gives its author access to your ...
Backdoor.G_Door Elevated Backdoor.G_Door is a utility that is used to control the Backdoor.G_Door ...
Backdoor.G_Door.B High Backdoor.G_Door.B is a backdoor trojan that starts up with windows and runs ...
Backdoor.Gaobot Elevated Backdoor.Gaobot is the server component of the worm, W32.HLLW.Gaobot.P, which ...
Backdoor.Gapin Elevated Backdoor.Gapin is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Gargamel Elevated Backdoor.Gargamel is a malicious application that runs in the background and ...
Backdoor.Gaster Elevated Backdoor.Gaster is a Trojan that gives an attacker access to your computer. It ...
Backdoor.GateCrasher Elevated Backdoor.GateCrasher is a malicious application that runs in the background and ...
Backdoor.GDoor Elevated Backdoor.GDoor is a malicious application that runs in the background and ...
Backdoor.Gecky Elevated Backdoor.Gecky is a malicious application that runs in the background and ...
Backdoor.Generic High These common components have files and keys that are in different threats but ...
Backdoor.GF Elevated Backdoor.GF is a backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.GGDoor High Backdoor.GGDoor allows an attacker unauthorized access to infected mach ...
Backdoor.Ghoice Elevated Backdoor.Ghoice allows unauthorized access to the infected computer. By default ...
Backdoor.Gholame Elevated Backdoor.Gholame is a backdoor Trojan that opens two ports on the computer; ...
Backdoor.Ghost High Backdoor.Ghost allows unauthorized access to an infected machine. ...
Backdoor.Ghostnet Elevated Backdoor.Ghostnet is a Trojan horse that opens a back door on the compromised ...
Backdoor.Ghostvoice High Ghostvoice is a remote access trojan which opens a port allowing an attacker ...
Backdoor.Ginwui High Backdoor.Ginwui attempts to create backdoors and allows an attacker ...
Backdoor.GirlFriend High Backdoor.GirlFriend is a backdoor trojan that allows attackers to gain access ...
Backdoor.GirlinRed High Backdoor GirlinRed is a backdoor which will let infected system to be ...
Backdoor.Globe Elevated Backdoor.Globe is a proof-of-concept Trojan horse program that exploits the ...
Backdoor.Glupzy Elevated Backdoor.Glupzy is a malicious application that runs in the background and ...
Backdoor.Gobot High Backdoor.Gobot is a backdoor trojan which attempts to create a backdoor and ...
Backdoor.Gobot.GEN High Backdoor.Gobot.GEN is an IRC-controlled malware that spreads through through ...
Backdoor.GOL Elevated The Backdoor.GOL backdoor is used to compromise AOL accounts. The backdoor is ...
Backdoor.Goster Elevated Backdoor.Goster is a backdoor Trojan that works under ICQ Messenger. It allows ...
Backdoor.Goweh High Backdoor.Goweh is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Grab Elevated Backdoor.Grab is a malicious application that runs in the background and allows ...
Backdoor.Granst Elevated Backdoor.Granst is a malicious application that runs in the background and ...
Backdoor.Graybird Elevated Backdoor.Graybird is a Trojan horse that hides its presence on the compromised ...

Page 1 ... Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware