Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3601-3650 de 11067 encontradas.

Page 1 ... Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Rbot.XE High Backdoor.Rbot.XE steals your personal information and allows others to have ...
Backdoor.Rbot.XG High Backdoor.Rbot.XG runs silently in the background providing a backdoor service ...
Backdoor.Rbot.YH High Backdoor.Rbot.YH is capable of spreading to computers on the local network ...
Backdoor.Rbot.ZJ High Backdoor.Rbot.ZJ attempts to open ports allowing a remote attacker unauthorized ...
Backdoor.RCServ Elevated Backdoor.RCServ is a Backdoor Trojan Horse that gives a hacker unauthorized ...
Backdoor.Recerv Elevated Backdoor.Recerv is a Trojan Horse that gives a hacker complete access to your ...
Backdoor.Recub High Backdoor.Recub hooks itself to explorer.exe. The process is not visible and has ...
Backdoor.Redghost High Backdoor.Redghost is a trojan which allows the attacker unauthorized remote ...
Backdoor.Redkod Elevated Backdoor.Redkod is a Backdoor Trojan that gives its creator full control over ...
Backdoor.Redvoz Medium Backdoor.Redvoz allows attackers unauthorized access to infected machi ...
Backdoor.Refpron High Backdoor.Refpron opens a backdoor on infected computer to allow attackers ...
Backdoor.Regdor Elevated Backdoor.Regdor is a Trojan horse that opens a back door on the compromised ...
Backdoor.Reload High Backdoor.Reload runs in the background, opens a port and allows attackers to ...
Backdoor.Reload.K High Backdoor.Reload.K runs in the background, opens a port and allows attackers to ...
Backdoor.Reload.M High Backdoor.Reload.M runs in the background, opens a port and allows attackers to ...
Backdoor.Remnet Elevated Backdoor.Remnet is a backdoor trojan that allows unauthorized remote access. By ...
Backdoor.Remocy Elevated Backdoor.Remocy is a Backdoor Trojan Horse that gives its creator full control ...
Backdoor.Remohak Elevated Backdoor.Remohak allows a hacker to remotely control an infected computer. It ...
Backdoor.RemoteNC Elevated Backdoor.RemoteNC is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.RemoteSOB Elevated The Backdoor.RemoteSOB Backdoor Trojan allows unauthorized access to the ...
Backdoor.Renomb Elevated Backdoor.Renomb is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Rephlex Elevated Backdoor.Rephlex is backdoor Trojan that allows a hacker to control the ...
Backdoor.Retrib Elevated Backdoor.Retrib is a malicious application that runs in the background and ...
Backdoor.Retrieve High Backdoor.Retrieve is a backdoor application that can be used to retrieve ...
Backdoor.Retro64 Elevated Backdoor.Retro64 is a Trojan that downloads and executes malicious files via ...
Backdoor.Revacc Elevated Backdoor.Revacc is a malicious application that runs in the background and ...
Backdoor.Revenge High Backdoor.Revenge allows attackers unauthorized access to infected mach ...
Backdoor.Revird Elevated Backdoor.Revird is a Trojan horse that opens a back door on the compromised ...
Backdoor.Revrs Elevated Backdoor.Revrs is the client that is used to control the Backdoor.Revrs Trojan. ...
Backdoor.RipClient Elevated Backdoor.RipClient is a malicious application that runs in the background and ...
Backdoor.Ripgof Elevated Backdoor.Ripgof is a Trojan horse that opens a back door on the compromised ...
Backdoor.Ripiner Elevated Backdoor.Ripiner is a back door Trojan horse that provides unauthorized access ...
Backdoor.Ripjac Elevated Backdoor.Ripjac is a backdoor Trojan that allows a hacker to gain access to the ...
Backdoor.RMFDoor Elevated Backdoor.RMFDoor is the client for the backdoor Trojan RMFdoor (the ser ...
Backdoor.RmtSvc.A Elevated Backdoor.RmtSvc.a is a malicious application that runs in the background and ...
Backdoor.Robi Elevated Backdoor.Robi is a backdoor server that allows unauthorized access to the ...
Backdoor.Robobot High Backdoor.Robobot will open various ports allowing unauthorized access to an ...
Backdoor.Robofo Elevated Backdoor.Robofo is a Trojan horse program that opens a back door on the ...
Backdoor.Rockse Elevated Backdoor.Rockse is a Backdoor Trojan Horse that allows unauthorized, remote ...
Backdoor.Rootcip High Backdoor.Rootcip opens ports on infected computer to allow attackers ...
Backdoor.Roxe Elevated Backdoor.Roxe is a backdoor Trojan horse that exploits the Microsoft GDI+ ...
Backdoor.Roxrat Elevated Backdoor.Roxrat is a variant of Backdoor.Roxrat. It gives an attacker ...
Backdoor.Roxy Elevated Backdoor.Roxy is a Trojan Horse that runs as a proxy server. It listens on a ...
Backdoor.RPCBot Elevated Backdoor.IRC.RPCBot.E is an Internet Relay Chat (IRC) Trojan horse that allows ...
Backdoor.Rsbot Elevated Backdoor.Rsbot is a back door Trojan horse that gives a hacker unauthorized ...
Backdoor.Rsock Elevated Backdoor.Rsock is a malicious application that runs in the background and ...
Backdoor.Rtkit Elevated Backdoor.Rtkit is a backdoor server program that allows a remote attacker to ...
Backdoor.Rukap High Backdoor.Rukap allows attackers unauthorized access to infected machin ...
Backdoor.Runar High Backdoor.Runar is a remote access trojan which allows attackers unauthorized ...
Backdoor.Runnet Elevated Backdoor.Runnet is a backdoor Trojan horse, which allows unauthorized, remote ...

Page 1 ... Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware