Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3751-3800 de 11067 encontradas.

Page 1 ... Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Shbot High Backdoor.Shbot allows attackers unauthorized access to infected machin ...
Backdoor.Sheldor High Backdoor.Sheldor is a trojan that attempts to open backdoor and allows remote ...
Backdoor.Shellbot Elevated Backdoor.Shellbot is a Trojan horse that opens a back door and allows ...
Backdoor.Shipper Elevated Backdoor.Shipper is a malicious application that runs in the background and ...
Backdoor.Silence Elevated Backdoor.Silence is a malicious application that runs in the background and ...
Backdoor.SilentSpy Elevated Backdoor.SilentSpy is a Backdoor Trojan horse that gives an attacker ...
Backdoor.SilverFTP Elevated Backdoor.SilverFTP is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Simali Elevated Backdoor.Simali is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.Singu High Backdoor.Singu allows attackers unauthorized access to infected machin ...
Backdoor.Sinique Elevated Backdoor.Sinique is a malicious application that runs in the background and ...
Backdoor.Sinit Elevated Backdoor.Sinit is a Backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Sinups Elevated Backdoor.Sinups is an ASP and a VBScript-based Backdoor Trojan horse. This ...
Backdoor.Sivuxa Medium Backdoor Sivuxa is a malicious application that runs in the background and ...
Backdoor.Sixca Elevated The Backdoor.Sixca backdoor Trojan allows unauthorized access to the infected ...
Backdoor.Skalg Elevated Backdoor.Skalg is a malicious application that runs in the background and ...
Backdoor.SKOSX Elevated Backdoor.SKOSX is a malicious application that runs in the background and ...
Backdoor.SkRat High Backdoor.SkRat opens several ports which starts up with Windows and attempts to ...
Backdoor.SkSocket High Backdoor.SkSocket allows attackers unauthorized access to infected mac ...
Backdoor.Skun Elevated Backdoor.Skun is a Backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Slackbot Elevated Backdoor.Slackbot is a backdoor Trojan horse that allows a hacker to control ...
Backdoor.Slao Elevated Backdoor.Slao is a Backdoor Trojan Horse that allows unauthorized access to an ...
Backdoor.Small High Backdoor.Small installs itself into the system directory. It allows remote ...
Backdoor.Small.CKY High Backdoor.Small.CKY opens up random ports which will allow an attacker ...
Backdoor.Small.DAM High Backdoor.Small.DAM opens up random ports which will allow an attacker ...
Backdoor.Small.EO High Backdoor.Small.EO is a trojan which provides IRC remote access to a users ...
Backdoor.Small.HEZ High Backdoor.Small.HEZ installs and hides itself into the system directory. It ...
Backdoor.Small.HJ High Backdoor.Small.HJ installs itself into the system directory. It then attempts ...
Backdoor.Small.HL High Backdoor.Small.HL is a proxy server trojan which allows remote attackers to ...
Backdoor.Small.JG High Backdoor.Small.JG generates huge amounts of traffic aimed at several web sites. ...
Backdoor.Small.LS High Backdoor.Small.LS installs itself into the system directory. It allows remote ...
Backdoor.Small.NA Elevated Backdoor.Small.NA allows attackers unauthorized access to infected systems and ...
Backdoor.Small.OY High Backdoor.Small.OY attemp to hijack infected computers and allow unauthorized ...
Backdoor.Small.PN Medium Backdoor.Small.PN installs and hides itself into the system directory. It ...
Backdoor.SMBRelay Elevated Backdoor.SMBRelay is a backdoor Trojan. It uses the Man in the Middle attack, ...
Backdoor.Smezy Elevated Backdoor.Smezy is a malicious application that runs in the background and ...
Backdoor.SmokeDown Elevated Backdoor.SmokeDown is a backdoor Trojan horse which tries to connect to a ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Smorph Elevated Backdoor.Smorph is a polymorphic Trojan horse. It is distributed as an ...
Backdoor.Smother Elevated Backdoor.Smother gives its creator complete access to your computer. By ...
Backdoor.Snami Elevated Backdoor.Snami is a Backdoor Trojan Horse that attempts to connect to an IRC ...
Backdoor.Snex Elevated Backdoor.Snex is a malicious application that runs in the background and allows ...
Backdoor.Snipernet Elevated Backdoor.Snipernet is a malicious application that runs in the background and ...
Backdoor.Snowcap High Backdoor.Snowcap is a remote access trojan which allows attackers unauthorized ...
Backdoor.Snowdoor Elevated Backdoor.Snowdoor is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Sockets23 Elevated Backdoor.Sockets23 is a malicious application that runs in the background and ...
Backdoor.Socksbot Elevated Backdoor.Socksbot is a backdoor Trojan that connects to IRC and allows a hacker ...
Backdoor.Softshell Elevated Backdoor.Softshell is a Backdoor Trojan Horse that gives a hacker remote access ...
Backdoor.Sokacaps Elevated Backdoor.Sokacaps is a Backdoor Trojan Horse that is controlled through IRC. ...
Backdoor.Sokeven Elevated Backdoor.Sokeven is a backdoor Trojan horse that creates a SOCKS proxy on the ...

Page 1 ... Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware