Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3451-3500 de 11067 encontradas.

Page 1 ... Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 ... Page 222

Name Nível da ameaça Descrição
Backdoor.NetTerrorist Elevated Backdoor.NetTerrorist is a malicious application that runs in the background ...
Backdoor.NetThief Elevated Backdoor.NetThief is a Backdoor Trojan that allows a hacker to remotely control ...
Backdoor.NetTrojan Elevated Backdoor.NetTrojan is a Backdoor Trojan Horse that allows unauthorized use of ...
Backdoor.Newfure Elevated Backdoor.Newfure is a malicious application that runs in the background and ...
Backdoor.NewRest High Backdoor.NewRest is a malicious backdoor trojan that may use rootkit technique ...
Backdoor.Nibu Elevated Backdoor.Nibu opens a back door Trojan horse on a compromised computer and ...
Backdoor.Nightmare Elevated Backdoor.Nightmare is a malicious application that runs in the background and ...
Backdoor.Niklaus Elevated Backdoor.Niklaus is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Niovadoor Elevated Backdoor.Niovadoor is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Nithsys Elevated Backdoor.Nithsys is a Trojan horse that opens a back door on the compromised ...
Backdoor.Nitmo Elevated Backdoor.Nitmo is a malicious application that runs in the background and ...
Backdoor.Nodelm Elevated Backdoor.Nodelm is a Trojan horse with back door capabilities that allows a ...
Backdoor.Noknok Elevated Backdoor.Noknok is a malicious application that runs in the background and ...
Backdoor.Nota Elevated Backdoor.Nota is a typical Backdoor Trojan that allows a hacker to gain access ...
Backdoor.Notpa High Backdoor.Notpa is a malicious application that runs in the background and ...
Backdoor.Novacal Elevated Backdoor.Novacal is a back door server program that allows a remote attacker ...
Backdoor.Novadoor High Backdoor.Novadoor is a Remote Administration Tool that allows an attacker to ...
Backdoor.NssKill Elevated Backdoor.NssKill is a malicious application that runs in the background and ...
Backdoor.NSSX Elevated Backdoor.NSSX is a malicious application that runs in the background and allows ...
Backdoor.NTHack Elevated Backdoor.NTHack is a backdoor Trojan that steals passwords. ...
Backdoor.Nuclear High Backdoor.Nuclear allows attackers unauthorized access to infected mach ...
Backdoor.Nuclear_RAT High Nuclear R.A.T is a remote access trojan which allows an attacker complete ...
Backdoor.Nucledor High Backdoor.Nucledor allows attackers unauthorized access to infected mac ...
Backdoor.Nucleroot High Backdoor.Nucleroot is a rootkit trojan which is used to hide processes, ...
Backdoor.Oblivion Elevated Backdoor.Oblivion is the detection of an executable file that inserts ...
Backdoor.Oderoor High Backdoor.Oderoor on execution runs in the background and allows unauthorized ...
Backdoor.Ohpass Elevated Backdoor.Ohpass is a Backdoor Trojan that gives a remote attacker full control ...
Backdoor.OICQSer Elevated Backdoor.OICQSer is a Trojan that allows unauthorized access to the infected ...
Backdoor.Olinger High Backdoor.Olinger opens ports and allows hackers to access the infected computer ...
Backdoor.Olourk Elevated Backdoor.Olourk is a Trojan horse that opens a back door on the compromised ...
Backdoor.Omega Elevated Backdoor.Omega is a back door Trojan horse program that allows a remote ...
Backdoor.Omerta Elevated Backdoor.Omerta is a Trojan horse that lowers security settings and opens a ...
Backdoor.Ompnmagic Elevated Backdoor.Ompnmagic is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Omygo Elevated Backdoor.Omygo is a Backdoor Trojan Horse that provides unauthorized remote ...
Backdoor.OneTime Elevated Backdoor.OneTime is a malicious application that runs in the background and ...
Backdoor.Onliner Elevated Backdoor.Onliner is a malicious application that runs in the background and ...
Backdoor.Ontarg Elevated Backdoor.Ontarg is a remote access Trojan Horse that consists of server and ...
Backdoor.Optix High Backdoor.Optix is a backdoor Trojan program which opens ports on the infected ...
Backdoor.Optix.AA High Backdoor.Optix.AA is a Trojan program which opens ports on the infected ...
Backdoor.OptixDDoS Elevated Backdoor.OptixDDoS is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.OptixPro Elevated Backdoor.OptixPro is a Trojan horse that gives a remote attacker full remote ...
Backdoor.Oscar High Backdoor.Oscar runs in the background and connects to an IRC server. The threat ...
Backdoor.Osirdoor Elevated Backdoor.Osirdoor is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Outbreak High Backdoor.Outbreak allows attackers unauthorized access to infected mac ...
Backdoor.OutLaster Elevated Outlaster exploits a vulnerability in a system to create a backdoor that can be ...
Backdoor.Packbot High Backdoor.Packbot allows attackers unauthorized access to infected mach ...
Backdoor.Padmin Elevated Backdoor.Padmin is a Trojan Horse that has backdoor capabilities. ...
Backdoor.Padodor High Backdoor.Padodor will allow unauthorised access to an infected computer. It ...
Backdoor.Padonock Elevated Backdoor.Padonock is a backdoor Trojan horse that gives an attacker access to ...
Backdoor.Pahador Elevated Backdoor.Pahador is a Trojan horse that opens a back door on the compromised ...

Page 1 ... Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware