Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 3901-3950 de 11067 encontradas.

Page 1 ... Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 ... Page 222

Name Nível da ameaça Descrição
Backdoor.Tuxder Elevated Backdoor.Tuxder enables the remote attacker to execute commands on your ...
Backdoor.Ubriel.F High Backdoor.Ubriel.F opens random ports and allows an attacker complete ...
Backdoor.Udps Elevated Backdoor.Udps is a typical backdoor Trojan that gives a remote attacker full ...
Backdoor.Ugy Elevated Backdoor.Ugy is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.UKS Elevated Backdoor.UKS is a Backdoor Trojan Horse that allows unauthorized access to an ...
Backdoor.Ullysee High Backdoor.Ullysee allows attackers unauthorized access to infected mach ...
Backdoor.UltimateDefender High Backdoor.UltimateDefender runs in the background and allows remote access to ...
Backdoor.UltimateDefender.GVW High Backdoor.UltimateDefender.GVW runs in the background and allows remote access ...
Backdoor.UltimateRAT High Backdoor.UltimateRAT is a Remote Administration Tool that provides an attacker ...
Backdoor.Ultor Elevated Backdoor.Ultor is a backdoor Trojan that allows unauthorized access to an ...
Backdoor.Uncap Elevated Backdoor.Uncap is a malicious application that runs in the background and ...
Backdoor.Unifida Elevated Backdoor.Unifida is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Unix Elevated Backdoor.Unix is a malicious application that runs in the background and allows ...
Backdoor.Unpdoor Elevated Backdoor.Unpdoor is a Trojan horse that opens a random port and connects to a ...
Backdoor.UnrealIRC Medium Backdoor.UnrealIRC is a backdoor trojan which opens ports on the infected ...
Backdoor.Upfudoor Elevated Backdoor.Upfudoor is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Uprootkit Elevated Backdoor.Uprootkit is a backdoor Trojan Horse that gives a remote attacker ...
Backdoor.Urat Elevated Backdoor.Urat allows unauthorized access to an infected computer. This Trojan ...
Backdoor.URCS Elevated Backdoor.URCS is a remote control server application and a security risk. It is ...
Backdoor.Usirf Elevated Backdoor.Usirf is a general class of Trojan Horses that uses an FTP server as a ...
Backdoor.Uzbet Elevated Backdoor.Uzbet is a Trojan that runs as a proxy server under Windows 20 ...
Backdoor.VagrNocker Elevated Backdoor.VagrNocker is a backdoor Trojan written in the Delphi programming ...
Backdoor.Vampire Elevated Backdoor.Vampire is a malicious application that runs in the background and ...
Backdoor.Vanbot High Backdoor.Vanbot allows attackers unauthorized access to infected machi ...
Backdoor.VB Elevated Backdoor.VB is a backdoor Trojan that opens a port on the computer. It also ...
Backdoor.VB.AAF High Backdoor.VB.AAF logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AAL High Backdoor.VB.AAL opens random port and allows attacker to gain unauthorized ...
Backdoor.VB.ACW High Trojan.VB.ACW attempts to monitors users activities on the infected system. It ...
Backdoor.VB.AEA High Backdoor.VB.AEA logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AFU High Backdoor.VB.AFU will log all keystrokes that are entered into any active ...
Backdoor.VB.Age High Backdoor.VB.Age runs in the background and opens a port allowing attackers to ...
Backdoor.VB.AJX High Backdoor.VB.AJX opens a random port on the infected machine and allows ...
Backdoor.VB.AKX High Backdoor.VB.AKX is a backdoor which steals information from the affected ...
Backdoor.VB.AWR High Backdoor.VB.AWR logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AWU Medium This backdoor is capable of compromising the infected machine to outside attack ...
Backdoor.VB.AYS High Backdoor.VB.AYS is capable of compromising the infected machine to outside ...
Backdoor.VB.BDZ High Backdoor.VB.BDZ allows attackers unauthorized access to infected machi ...
Backdoor.VB.BK High Backdoor.VB.BK attempts to log all keystrokes that are entered into any active ...
Backdoor.VB.E High Backdoor.VB.E opens various port allowing attackers to access infected ...
Backdoor.VB.EVC Elevated Backdoor.VB.EVC opens a port allowing attackers to connect and gain control of ...
Backdoor.VB.FRA High Backdoor.VB.FRA is a malicious backdoor that acts as a server and executes ...
Backdoor.VB.gby High Backdoor.VB.gby is a malicious program that runs in the background and allows ...
Backdoor.VB.GEN High Backdoor.VB.GEN attempts to log all keystrokes that are entered into any active ...
Backdoor.VB.GRP High Backdoor.VB.GRP copy itself as explore.exe on system directory and create ...
Backdoor.VB.HX High Backdoor.VB.HX is a threat that tries to take control of the affected system by ...
Backdoor.VB.JV High Backdoor.VB.JV opens a random port on the infected machine and allows attackers ...
Backdoor.VB.jy High Backdoor.VB.jy is a malicious program that runs in the background and allows ...
Backdoor.VB.NI High Backdoor.VB.NI logs keystrokes and recovers contents of the cache to steal ...
Backdoor.VB.ZK High Backdoor.VB.ZK is a remote access trojan (RAT) client that is used to connect ...
Backdoor.VB.ZN High Backdoor.VB.ZN attempts to log all keystrokes that are entered into any active ...

Page 1 ... Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware