Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3201-3250 de 11067 encontradas.

Page 1 ... Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Hupigon.EQZD High Backdoor.Hupigon.EQZD is a backdoor trojan which shuts down latest Kaspersky ...
Backdoor.Hupigon.EVG High Backdoor.Hupigon.EVG is a threat that attempts to connect to a certain ...
Backdoor.Hupigon.GEN High Backdoor.Hupigon.GEN has rootkit functionality. It injects itself into Internet ...
Backdoor.Hupigon.HXV High Backdoor.Hupigon.HXV is a backdoor trojan which opens a backdoor on infected ...
Backdoor.Hupigon.KVZ High Backdoor.Hupigon.KVZ injects itself into the Internet Explorer to evade ...
Backdoor.Hupigon.LH High Backdoor.Hupigon.LH is a malicious application that runs in the background and ...
Backdoor.Hupigon.MHP Elevated Backdoor.Hupigon.MHP is a backdoor trojan which allows unauthorized access to ...
Backdoor.IceBraker Elevated Backdoor.IceBraker is a malicious application that runs in the background and ...
Backdoor.ICQ Elevated Backdoor.ICQ is a malicious application that runs in the background and allows ...
Backdoor.IDDO Elevated Backdoor.IDDO is a malicious application that runs in the background and allows ...
Backdoor.IE High Backdoor.IE is a tool for generating IE backdoor trojans which can allow an ...
Backdoor.Iexplore5 Elevated Backdoor.Iexplore5 is a malicious application that runs in the background and ...
Backdoor.Igloo High Backdoor.Igloo is a backdoor trojan which has the ability to open ports and ...
Backdoor.IISCrack Elevated This backdoor Trojan is a Dynamic Link Library (DLL) that is used to attack and ...
Backdoor.IK High Backdoor.IK allows hackers to change security settings and gain access to your ...
Backdoor.Imiserv Elevated Backdoor.Imiserv connects and sends data to a predefined Web site. It is ...
Backdoor.InCommander Elevated Backdoor.InCommander is a malicious application that runs in the background and ...
Backdoor.InfecDoor High Backdoor.InfecDoor attempts to create backdoors and allows an attacker ...
Backdoor.Infra High Backdoor.Infra is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Insane Elevated Backdoor.Insane is a malicious application that runs in the background and ...
Backdoor.Intended Elevated Backdoor.Intended is a malicious application that runs in the background and ...
Backdoor.Intruzzo Elevated Backdoor.Intruzzo is a remote access Trojan that was coded using Visual Basic ...
Backdoor.IO_Brisa High IO Brisa is a hack tool that is used by attackers to gain backdoor access on an ...
Backdoor.IRC Elevated Backdoor.IRC is a backdoor Trojan horse that uses malicious scripts in the mIRC ...
Backdoor.IRC.ABN High Backdoor.IRC.ABN is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Besik Medium Backdoor.IRC.Besik is a malicious application that runs in the background and ...
Backdoor.IRC.Bnc.A High Backdoor.IRC.Bnc.A allows an attacker unauthorized access to an infected ...
Backdoor.IRC.Client.a High This backdoor opens port 6667 in the windows firewall. It then lies dormant ...
Backdoor.IRC.Flood High Backdoor.IRC.Flood is a backdoor Trojan. It installs an mIRC client that has ...
Backdoor.IRC.Kelebek Medium Backdoor.IRC.Kelebek is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Logare High Backdoor.IRC.Logare is a tool for generating IRC backdoor trojans which can ...
Backdoor.IRC.LSA High Backdoor.IRC.LSA attempts to connect to an external IRC server to allow an ...
Backdoor.IRC.Mimic High Backdoor.IRC.Mimic installs its own modified version of mIRC client onto ...
Backdoor.IRC.Zapchast High Backdoor.IRC.Zapchast installs IRC clients on infected machines and serves as a ...
Backdoor.IRCBot High Backdoor.IRCBot is a family of IRC backdoors allowing unauthorized access to an ...
Backdoor.IRCBot_FactorLibrary High ...
Backdoor.IRCBot.AAC High Backdoor.IRCBot.AAC starts up when Windows starts and tries to connect to an ...
Backdoor.IRCBot.AAQ High Backdoor.IRCBot.AAQ is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.ACD High Backdoor.IRCBot.ACD is backdoor worm that spreads through Microsoft instant ...
Backdoor.IRCBot.ACF High Backdoor.IRCBot.ACF connects to the internet to download further malware and ...
Backdoor.IRCBot.ACU High Backdoor.IRCBot.ACU is a Backdoor that transmit itself via the instant ...
Backdoor.IRCBot.ADF High Backdoor.IRCBot.ADF is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.ADJ High Backdoor.IRCBot.ADJ connects to the internet to download further malware and ...
Backdoor.IRCBot.AE High Backdoor.IRCBot.AE uses mIRC client to remote control infected machines giving ...
Backdoor.IRCBot.AHJ Medium Backdoor.Ircbot.AHJ is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.AJU High Backdoor.IRCBot.AJU is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.AZ High Backdoor.IRCBot.AZ connects to the internet to download further malware and ...
Backdoor.IRCBot.AZC High Backdoor.IRCBot.AZC is a trojan which runs in the background providing a ...
Backdoor.IRCBot.BAM Medium This backdoor program is propagated by other malware through instant messenger ...
Backdoor.IRCBot.BAR High Backdoor.IRCBot.BAR allows an attacker unauthorized access to the infected ...

Page 1 ... Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware