Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3351-3400 de 11067 encontradas.

Page 1 ... Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 ... Page 222

Name Nível da ameaça Descrição
Backdoor.LittleWitch Elevated Backdoor.LittleWitch is a backdoor Trojan that is similar to ...
Backdoor.Livehar Elevated Backdoor.Livehar is a Linux-based Trojan horse that attempts to open a back ...
Backdoor.Livup Elevated Backdoor.Livup is a malicious application that runs in the background and ...
Backdoor.Lixy Elevated Backdoor.Lixy is a Backdoor Trojan Horse that opens a proxy server and allows ...
Backdoor.Lixy.B High Backdoor.Lixy.B is a variant of Backdoor.Lixy, a Backdoor Trojan Horse that ...
Backdoor.Logged Elevated Backdoor.Logged is a malicious application that runs in the background and ...
Backdoor.Lohocla Elevated Backdoor.Lohocla is a malicious application that runs in the background and ...
Backdoor.Lolok Elevated Backdoor.Lolok is a backdoor Trojan that uses the mIRC client to give a hacker ...
Backdoor.Longnu Elevated Backdoor.Longnu is a Trojan that gives a hacker access to your computer. It ...
Backdoor.Loony.E High Backdoor.Loony.E runs in the background, allowing attackers to connect to it ...
Backdoor.LoopAd High Backdoor.LoopAd runs in the background, opens random number of ports and allows ...
Backdoor.Lowtaper Elevated Backdoor.Lowtaper is a backdoor Trojan horse that allows remote command ...
Backdoor.LoxoScam Elevated Backdoor.LoxoScam is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.Lusillon Elevated Backdoor.Lusillon is a Trojan horse that opens a back door on the compromised ...
Backdoor.Lyshell Elevated Backdoor.Lyshell is a backdoor Trojan horse that gives an attacker complete ...
Backdoor.Madfind Elevated Backdoor.Madfind is a Backdoor Trojan horse that gives a hacker complete access ...
Backdoor.Magicon High Backdoor.Magicon is a malicious backdoor trojan that runs in the background and ...
Backdoor.Mailer_Services High Backdoor.Mailer.Services opens ports and listens for commands from external ...
Backdoor.MailThreads Elevated Backdoor.MailThreads is a malicious application that runs in the background and ...
Backdoor.Malpayo Elevated Backdoor.Malpayo allows a hacker to remotely control an infected computer. It ...
Backdoor.Manmatite Elevated Backdoor.Manmatite is a backdoor Trojan horse that gives an attacker remote ...
Backdoor.Mapsy Elevated Backdoor.Mapsy is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Marotob Elevated Backdoor.Marotob is a Trojan horse that steals email addresses and other ...
Backdoor.Masker Elevated Backdoor.Masker is a malicious application that runs in the background and ...
Backdoor.Massaker Elevated Backdoor.Massaker is a backdoor Trojan that allows complete access to the ...
Backdoor.MasterP Elevated Backdoor.MasterP is a malicious application that runs in the background and ...
Backdoor.MasterParadise High Backdoor.MasterParadise allows attackers unauthorized access to infected ...
Backdoor.Masteseq Elevated Backdoor.Masteseq is a back door Trojan horse, which allows a remote attacker ...
Backdoor.Matrix Elevated Backdoor.Matrix is a malicious application that runs in the background and ...
Backdoor.Maxload Elevated Backdoor.Maxload is a backdoor Trojan horse that affects Linux and Unix ...
Backdoor.Mayhdoor Elevated Backdoor.Mayhdoor is a malicious application that runs in the background and ...
Backdoor.Mechbot High Backdoor.Mechbot is a backdoor trojan which will allow attackers unauthorized ...
Backdoor.Medbot High Backdoor.Medbot is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Medias Elevated Backdoor.Medias is a Trojan horse that installs itself as a Browser Helper ...
Backdoor.Mepcod Elevated Backdoor.Mepcod is a Trojan horse that opens a back door and downloads a file ...
Backdoor.MeteorShell Elevated Backdoor.MeteorShell is a Trojan Horse that allows unauthorized access to an ...
Backdoor.Mex Medium Backdoor.Mex is a malicious application that runs in the background and allows ...
Backdoor.MH High Backdoor.MH will open a communication port on an infected computer and will ...
Backdoor.Microkos Elevated Backdoor.Microkos is a Trojan horse that opens a back door and allows ...
Backdoor.Miffice Elevated Backdoor.Miffice is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Migmaf Elevated Backdoor.Migmaf is a reverse proxy Trojan Horse that redirects HTTP requests to ...
Backdoor.Millenium Elevated Backdoor.Millenium is a malicious application that runs in the background and ...
Backdoor.MindControl Elevated Backdoor.MindControl is a malicious application that runs in the background and ...
Backdoor.MiniCommander Elevated Backdoor.MiniCommander is a simple backdoor Trojan that copies itself to the ...
Backdoor.Mipsiv Elevated Backdoor.Mipsiv is a Trojan horse that connects to an IRC server and allows an ...
Backdoor.Mirab Elevated Backdoor.Mirab allows a hacker to remotely control an infected computer. It is ...
Backdoor.Miranda Elevated Backdoor.Miranda allows a hacker to remotely control an infected computer. The ...
Backdoor.mIRC High Backdoor.mIRC is a backdoor trojan which makes use of the popular mIRC client. ...
Backdoor.Mirxy Elevated Backdoor.Mirxy is a Trojan horse program that allows the infected computer to ...
Backdoor.Mite Elevated Backdoor.Mite is a backdoor Trojan with a password-stealing component that is ...

Page 1 ... Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware