Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3401-3450 de 11067 encontradas.

Page 1 ... Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 ... Page 222

Name Nível da ameaça Descrição
Backdoor.MLink Elevated Backdoor.MLink allows unauthorized access to the infected computer. ...
Backdoor.Monaro High Backdoor.Monaro allows an attacker remote access to an infected machine without ...
Backdoor.Monator Elevated Backdoor.Monator is a Backdoor Trojan that gives a hacker full access to your ...
Backdoor.Montp Elevated Backdoor.Montp is a malicious application that runs in the background and ...
Backdoor.Moonlit Elevated Backdoor.Moonlit is a Trojan horse program that can download and execute files, ...
Backdoor.Moonpie Elevated Backdoor.Moonpie is a malicious application that runs in the background and ...
Backdoor.Mosuc Elevated Backdoor.Mosuc is a Trojan horse that is similar to Backdoor.SubSeven, Netbus ...
Backdoor.Mosuck Elevated Backdoor.Mosuck is a backdoor Trojan horse that can allow unauthorized access ...
Backdoor.MoSucker High Backdoor.MoSucker is a remote access backdoor application that is used for ...
Backdoor.Mots Elevated Backdoor.Mots is a Backdoor Trojan Horse that will connect to an IRC server to ...
Backdoor.Mousey Elevated Backdoor.Mousey is a Trojan horse that opens a back door and allows a remote ...
Backdoor.Mprox Elevated Backdoor.Mprox is a Backdoor Trojan Horse that opens a proxy server on TCP port ...
Backdoor.Msic Elevated Backdoor.Msic is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.MSNCorrupt Elevated Backdoor.MSNCorrupt is a backdoor Trojan that uses MSN Messenger to connect to ...
Backdoor.MSNMaker.B High Backdoor.MSNMaker.B registers itself to start each time Windows starts up. It ...
Backdoor.Mtron Elevated Backdoor.Mtron is a backdoor Trojan that records financial activity and sends ...
Backdoor.Muharam.A High Backdoor.Muharam.A opens up a backdoor allowing a remote attacker control over ...
Backdoor.Muie Elevated Backdoor.Muie is a Trojan horse, similar to Netbus or Back Orifice. It enables ...
Backdoor.Mulim Elevated Backdoor.Mulim is a Trojan horse that opens a back door on the compromised ...
Backdoor.Muska Elevated Backdoor.Muska is a malicious application that runs in the background and ...
Backdoor.Mutny Elevated Backdoor.Mutny is a Backdoor Trojan horse that can steal passwords, log ...
Backdoor.Mutter High Backdoor.Mutter is a malicious application that runs in the background and ...
Backdoor.Mxsender Elevated Backdoor.Mxsender is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Mydopam Elevated Backdoor.Mydopam is a Trojan horse with back door capabilities that sends out ...
Backdoor.Myparty Elevated Backdoor.Myparty is a malicious application that runs in the background and ...
Backdoor.Naninf Elevated Backdoor.Naninf is a Trojan horse with back door capabilities that lowers ...
Backdoor.Nark High Backdoor.Nark allows attackers unauthorized access to infected machines via IRC ...
Backdoor.NBSpy Elevated Backdoor.NBSpy is a malicious application that runs in the background and ...
Backdoor.NCX Elevated Backdoor.NCX is a malicious application that runs in the background and allows ...
Backdoor.Ndad Elevated Backdoor.Ndad provides a graphical user interface to perform administrative ...
Backdoor.Nemesis Elevated Backdoor.Nemesis is a malicious application that runs in the background and ...
Backdoor.Nemog Elevated Backdoor.Nemog is a back door Trojan horse program that allows a compromised ...
Backdoor.Neodurk Elevated Backdoor.Neodurk is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Nepoe High Backdoor.Nepoe allows attackers unauthorized access to infected machin ...
Backdoor.Nerte Elevated Backdoor.Nerte is a backdoor Trojan that allows a hacker complete access your ...
Backdoor.Net_Pay_GmbH High Net Pay GmbH connects to various domain name registrars when installed on a ...
Backdoor.NetBus Elevated This is a variant of the well-known backdoor Trojan, Netbus. This variant ...
Backdoor.NetControle Elevated Backdoor.NetControle is a Trojan horse that allows a hacker to remotely control ...
Backdoor.NetCrack Elevated Backdoor.NetCrack is a Backdoor Trojan horse that gives an attacker ...
Backdoor.NetDevil Elevated Backdoor.NetDevil allows a hacker to remotely control an infected comp ...
Backdoor.Netdex Elevated Backdoor.Netdex consists of several components, including JavaScript (JS) ...
Backdoor.Netget Elevated Backdoor.Netget is a malicious application that runs in the background and ...
Backdoor.NetJoe Elevated Backdoor.NetJoe is a backdoor Trojan horse program that allows a remote ...
Backdoor.NetMetro Elevated Backdoor.NetMetro is a malicious application that runs in the background and ...
Backdoor.NetObserve High NetObserve is used to monitor and log the users activity without their ...
Backdoor.Netshadow Elevated Backdoor.Netshadow is a Trojan horse that opens a back door and allows a remote ...
Backdoor.Netsnake High Backdoor.Netsnake steals password information and sends them to a pre-defined ...
Backdoor.NetSnake.H High Backdoor.NetSnake.H steals cached passwords and e-mails them to a pre-defined ...
Backdoor.NetSnooper High Backdoor NetSnooper is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.NetSpy Elevated Backdoor.NetSpy is a malicious application that runs in the background and ...

Page 1 ... Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware