Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3801-3850 de 11067 encontradas.

Page 1 ... Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Solufina Elevated Backdoor.Solufina is a Trojan horse program that acts as a proxy server. It has ...
Backdoor.Spakrab Elevated Backdoor.Spakrab is a Trojan horse that opens a back door and may send spam ...
Backdoor.Sparta Elevated Backdoor.Sparta is Trojan horse that opens a back door, which can be controlled ...
Backdoor.Spartadoor High Backdoor.Spartadoor allows attackers unauthorized access to infected m ...
Backdoor.Specrem Elevated Backdoor.Specrem is a malicious application that runs in the background and ...
Backdoor.Spigot Elevated Backdoor.Spigot is a Trojan horse which allows unauthorized access to an ...
Backdoor.Spoofbot Elevated Backdoor.Spoofbot is a malicious backdoor program that allows a remote hacker ...
Backdoor.Spookdoor Elevated Backdoor.Spookdoor is the client component of the Backdoor.Spookdoor. It allows ...
Backdoor.Spotcom Elevated Backdoor.Spotcom is a Backdoor Trojan Horse that injects itself into Internet ...
Backdoor.Spy.Small.AV High Backdoor.Spy.Small.AV runs in stealth mode and opens TCP ports on the infected ...
Backdoor.Spybot.IA High Backdoor.Spybot.IA is a backdoor that uses a certain Internet Relay Chat ...
Backdoor.Spyboter Elevated Backdoor.Spyboter is a detection for a family of Trojans that open a back door ...
Backdoor.SpyBoter.BY High Backdoor.SpyBoter.BY is a backdoor worm which spreads via a network connection. ...
Backdoor.Spymon Elevated Backdoor.Spymon is a Trojan horse that opens a back door on a compromised ...
Backdoor.Srdl Elevated Backdoor.Srdl is a malicious application that runs in the background and allows ...
Backdoor.Stanex Elevated Backdoor.Stanex is a Backdoor Trojan horse that allows a hacker to control an ...
Backdoor.Staprew Elevated Backdoor.Staprew is a back door server program that allows a remote attacker to ...
Backdoor.Stealer Elevated Backdoor.Stealer is a malicious application that runs in the background and ...
Backdoor.StealthEye Elevated Backdoor.StealthEye is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Striker High Backdoor.Striker on execution runs in the background, opens ports on the ...
Backdoor.Stub.N High Backdoor.Stub.N opens and listens on a port and grants the remote hacker ...
Backdoor.Stupa Medium Backdoor.Stupa is a malicious application that runs in the background and ...
Backdoor.Sua Elevated Backdoor.Sua is a malicious application that runs in the background and allows ...
Backdoor.Subhappy Elevated Backdoor.Subhappy is a malicious application that runs in the background and ...
Backdoor.Subot Elevated Backdoor.Subot is a back door program that is loaded with a Serv-U FTP server ...
Backdoor.Subroot High Backdoor.Subroot allows attackers unauthorized access to infected mach ...
Backdoor.Subs Elevated Backdoor.Subs is a malicious application that runs in the background and allows ...
Backdoor.SubSari Elevated Backdoor.SubSari is a Trojan that allows unauthorized access to and control of ...
Backdoor.SubSeven Elevated Backdoor.SubSeven is a Trojan Horse, similar to Netbus or Back Orifice, which ...
Backdoor.SubSeven2 Elevated Backdoor.SubSeven2 is a malicious application that runs in the background and ...
Backdoor.SubSeven21 Elevated Backdoor.SubSeven21 is a malicious application that runs in the background and ...
Backdoor.SubSeven215 Elevated Backdoor.SubSeven215 is a variant of the Backdoor.SubSeven Trojan Horse. ...
Backdoor.SubSeven22 Elevated Backdoor.SubSeven22 is a Trojan horse. It is generally UPX packed; however, ...
Backdoor.SubSeven2gld Elevated Backdoor.SubSeven2gld is a malicious application that runs in the background ...
Backdoor.SubSeven2svr Elevated Backdoor.SubSeven2svr is a malicious application that runs in the background ...
Backdoor.Subwoofer Elevated Backdoor.Subwoofer allows a hacker to remotely control an infected com ...
Backdoor.Sumtax Elevated Backdoor.Sumtax is a Backdoor Trojan Horse that consists of several different ...
Backdoor.Surdux Elevated Backdoor.Surdux is a Backdoor Trojan Horse that allows its creator to control ...
Backdoor.Surgeon Elevated Backdoor.Surgeon allows a hacker to remotely control an infected compu ...
Backdoor.Sweetbomb Elevated Backdoor.Sweetbomb is an IRC backdoor Trojan horse. It can spread itself when ...
Backdoor.Swz High Backdoor.Swz runs silently in the background and opens up a port, which allows ...
Backdoor.Symopro Elevated Backdoor.Symopro is a malicious application that runs in the background and ...
Backdoor.Synrg Elevated Backdoor.Synrg allows unauthorized access to the infected computer. It also ...
Backdoor.Sysbug Elevated Backdoor.Sysbug is a Backdoor Trojan Horse that opens TCP port 5555 and waits ...
Backdoor.Sysdot Elevated Backdoor.Sysdot is a malicious application that runs in the background and ...
Backdoor.SysExploit Elevated Backdoor.SysExploit is a malicious application that runs in the background and ...
Backdoor.sysinst Elevated Backdoor.sysinst is a malicious application that runs in the background and ...
Backdoor.Syskbot Elevated Backdoor.Syskbot is an Backdoor Trojan Horse that gives a hacker access to your ...
Backdoor.Syslok Medium Backdoor.Syslok hijacks infect computers and display a screen warning user that ...
Backdoor.SysOCXDLL Elevated Backdoor.SysOCXDLL is a malicious application that runs in the background and ...

Page 1 ... Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware