Banco de Dados de Infecções

Essas páginas indicam todas as infecções que o Spyware Doctor é capaz de remover. As infecções são apresentadas por nome, nível de risco e uma sucinta descrição e foram organizadas em ordem alfabética por nome.

Nesta página você pode:

  • Vasculhar as infecções usando os hyperlinks.
  • Procurar uma infecção específica usando o campo Procurar.
  • Clique em uma infecção da lista abaixo para ver mais detalhes sobre uma infecção específica

Procurar infecções que comecem com

Todas as infecções | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Mostrando infecções 9951-10000 de 11067 encontradas.

Page 1 ... Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 ... Page 222

Name Nível da ameaça Descrição
Trojan-Spy.VB.AWX High Trojan-Spy.VB.AWX is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.CR High Trojan-Spy.VB.CR is a trojan that collects information by monitoring user ...
Trojan-Spy.VB.EK High Trojan-Spy.VB.EK steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.EY High Trojan-Spy.VB.EY steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.FF High Trojan-Spy.VB.FF steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.FX High Trojan-Spy.VB.FX is a trojan that attempts to collect information by collected ...
Trojan-Spy.VB.GG High Trojan.Spy.VB.GG steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.GT High Trojan-Spy.VB.GT is a threat that monitors all user activities and logs them ...
Trojan-Spy.VB.HJ High Trojan.Spy.VB.HJ logs keystrokes and send them to the attacker via email. ...
Trojan-Spy.VB.HK High Trojan-Spy.VB.HK is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.HXE High Trojan-Spy.VB.HXE is a threat that affects system by logging information such ...
Trojan-Spy.VB.HY High Trojan-Spy.VB.HY is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.IV High Trojan-Spy.VB.IV is a trojan that collects information by monitoring user ...
Trojan-Spy.VB.JB High Trojan-Spy.VB.JB is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.JF High Trojan-Spy.VB.JF is a threat that tries to monitor user activities related to ...
Trojan-Spy.VB.JR High Trojan-Spy.VB.JR capture all keystrokes from infected machine and then send ...
Trojan-Spy.VB.KA High Trojan-Spy.VB.KA steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.KC High Trojan-Spy.VB.KC is a trojan that monitors user activities and has capabilities ...
Trojan-Spy.VB.KE High Trojan-Spy.VB.KE steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.KJ High Trojan-Spy.VB.KJ attempts to create backdoors and allows an attacker ...
Trojan-Spy.VB.MS High Trojan-Spy.VB.MS steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.NB High Trojan.Spy.VB.NB is a trojan which will capture all keystrokes from users and ...
Trojan-Spy.VB.OI High Trojan-Spy.VB.OI steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.PR High Trojan-Spy.VB.PR steals information gathered from your computer and sends it to ...
Trojan-Spy.VB.QF Medium Trojan.Spy.VB.QF tries to download malicious files, searches the URL cache to ...
Trojan-Spy.VB.QL High Trojan-Spy.VB.QL is a trojan which monitors and logs keystrokes without user's ...
Trojan-Spy.VB.W High Trojan-Spy.VB.W attempts to create backdoors and allows an attacker ...
Trojan-Spy.VBS.IEStart Medium Trojan.VBS.IEStart attempts to hijacks users Internet Explorer startpage to ...
Trojan-Spy.VxDemulator High Trojan-Spy.VxDemulator is a malicious application that attempts to steal ...
Trojan-Spy.Webmoner.AB High Trojan.Spy.Webmoner.AB is a trojan that pretends to be a system process and ...
Trojan-Spy.WebMoner.AG High Trojan-Spy.WebMoner.AG is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.AL High Trojan-Spy.Webmoner.AL is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.AR High Trojan-Spy.Webmoner.AR is a trojan that pretends to be a system process and ...
Trojan-Spy.Webmoner.CO High Trojan-Spy.Webmoner.CO is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.FQ High Trojan-Spy.Webmoner.FQ is a trojan which logs keystrokes and steals information ...
Trojan-Spy.Webmoner.FU High Trojan-Spy.Webmoner.FU is a trojan that tries to steal information from ...
Trojan-Spy.Webmoner.GM Medium Trojan-Spy.Webmoner.GM is a trojan that attempts to steal passwords, login ...
Trojan-Spy.Webmoner.I High Trojan-Spy.Webmoner.I is a trojan that tries to steal information from affected ...
Trojan-Spy.Webmoner.J High Trojan-Spy.Webmoner.J is a trojan that tries to steal information from affected ...
Trojan-Spy.Webmoner.S High Trojan-Spy.Webmoner.S is a threat that tries to steal information from ...
Trojan-Spy.Webmoner.X High Trojan-Spy.Webmoner.X is a trojan that tries to steal information from affected ...
Trojan-Spy.Win32.Banker.CIJ High Trojan-Spy.Win32.Banker.CIJ monitors users browsing activities and logs ...
Trojan-Spy.WinFlux High Trojan.Spy.WinFlux is a Trojan which monitors users activities on the computer. ...
Trojan-Spy.Winhawk Medium Trojan-Spy.Winhawk is a malicious application that attempts to steal passwords, ...
Trojan-Spy.Winspy.K High Trojan-Spy.WinSpy.K is a trojan that tries to monitor user activities in hopes ...
Trojan-Spy.WinSpy.U High Trojan-Spy.WinSpy.U is a trojan that attempts to steal important user ...
Trojan-Spy.WinSpy.XD Medium Trojan-Spy.WinSpy.XD is a trojan that tries to monitor user activities in hopes ...
Trojan-Spy.WMForce High Trojan-Spy.WMForce is a malicious application that attempts to steal ...
Trojan-Spy.Wmhack High Trojan-Spy.Wmhack is a trojan that poses as a certain fake application to ...
Trojan-Spy.Wostel.A High Trojan-Spy.Wostel.A is a trojan that attempts to steal valuable information ...

Page 1 ... Page 196 | Page 197 | Page 198 | Page 199 | Page 200 | Page 201 | Page 202 | Page 203 | Page 204 ... Page 222

Ir para outra página: Página Inicial MRC, Banco de Dados de Infecções, Níveis de Risco, Glossário, Formulário de Contestação de Malware, Enviar Spyware