Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2751-2800 of 11067 found.

Page 1 ... Page 52 | Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 ... Page 222

Name Threat Level Description
Backdoor.Agent.FO Medium This backdoor is capable of downloading files over the internet and uploading ...
Backdoor.Agent.FWT Medium Backdoor.Agent.FWT is a malicious backdoor trojan that runs in the background ...
Backdoor.Agent.GCD High Backdoor.Agent.GCD installs itself on the affected system without user ...
Backdoor.Agent.GDZ High Backdoor.Agent.GDZ runs in the background and allows attackers to gain remote ...
Backdoor.Agent.GT High Backdoor.Agent.GT runs in the background as a service, allowing attackers to ...
Backdoor.Agent.HKP High Backdoor.Agent.HKP is a malicious application that runs in the background and ...
Backdoor.Agent.HMT High Backdoor.Agent.HMT is a backdoor which will let infected system to be ...
Backdoor.Agent.JJ High Backdoor.Agent.JJ will open a port and allow an attacker to gain remote access ...
Backdoor.Agent.JN High Backdoor.Agent.JN drops itself under the Windows folder and conceals itself as ...
Backdoor.Agent.JZK High Backdoor.Agent.JZK attempts to create backdoors and allows an attacker ...
Backdoor.Agent.LEA High Backdoor.Agent.LEA is a malicious application that runs in the background and ...
Backdoor.Agent.LEL High Backdoor.Agent.LEL is a threat that attempts to open backdoor and allows ...
Backdoor.Agent.LHF High Backdoor.Agent.LHF is a malicious application that runs in the background and ...
Backdoor.Agent.LJ High Backdoor.Agent.LJ is a backdoor which opens and listens on a port on a ...
Backdoor.Agent.MO High Backdoor.Agent.MO will open ports on a computer allowing unauthorized access ...
Backdoor.Agent.NC High Backdoor.Agent.NC will open various ports allowing unauthorized access to an ...
Backdoor.Agent.ND Elevated Backdoor.Agent.ND opens port and allows others to access the infected ...
Backdoor.Agent.NL High Backdoor.Agent.NL runs silently in the background as a process which starts up ...
Backdoor.Agent.NS High Backdoor.Agent.NS is used as a remote command prompt, giving a remote intruder ...
Backdoor.Agent.OHS High Backdoor.Agent.OHS is a backdoor Trojan program which opens ports on the ...
BackDoor.Agent.OO High BackDoor.Agent.OO is a backdoor trojan that downloads additional malware ...
Backdoor.Agent.PBE High Backdoor.Agent.PBE is a malicious application that runs in the background and ...
Backdoor.Agent.PO Medium Backdoor.Agent.PO is a backdoor program which runs in stealth mode on the ...
Backdoor.Agent.PX High Backdoor.Agent.PX is a proxy trojan which uses the infected machine as a proxy ...
Backdoor.Agent.QK High Backdor.Agent.QK names itself as "vschosts.exe" and runs in the background. It ...
Backdoor.Agent.QS High Backdoor.Agent.QS is a backdoor which opens and listens on a port and allows an ...
Backdoor.Agent.Rom High Backdor.Agent.Rom names itself as hmznmxs.exe, and runs in the background. It ...
Backdoor.Agent.TJP High Backdoor.Agent.TJP is a malicious backdoor trojan that runs in the background ...
Backdoor.Agent.TX High Backdoor.Agent.TX runs invisibly in the background on an infected machine ...
Backdoor.Agent.UMC Medium Backdoor.Agent.UMC is a malicious application that runs in the background and ...
Backdoor.Agent.US High Backdoor.Agent.US is a backdoor Trojan program which opens ports on the ...
Backdoor.Agent.UWP Medium Backdoor.Agent.UWP allows attackers unauthorized access to infected ma ...
Backdoor.Agent.VUO Medium Backdoor.Agent.VUO allows unauthorized remote access into the infected computer ...
Backdoor.Agent.WCY Elevated Backdoor.Agent.WCY allows unauthorized remote access into the infected computer ...
Backdoor.Agent.WDI High Backdoor.Agent.WDI is a malicious application that runs in the background and ...
Backdoor.Agent.XY High Backdoor.Agent.XY runs silently in the background as a process which starts up ...
Backdoor.Agent.YIF High Backdoor.Agent.YIF is a malicious application that runs in the background and ...
Backdoor.Agent.ZB High Backdoor.Agent.ZB will open a port and allow an attacker to gain remote access ...
Backdoor.Agobot High Backdoor.Agobot is a family of IRC backdoors allowing unauthorized access to an ...
Backdoor.Agobot.AGZ High Backdoor.Agobot.AGZ runs in the background , allowing attackers to connect to ...
Backdoor.Agobot.ATZ High Backdoor.Agobot.ATZ runs in the background, allowing attackers to connect to it ...
Backdoor.Agsdoor Elevated Backdoor.Agsdoor is a malicious application that runs in the background and ...
Backdoor.AimBot High Backdoor.AimBot will install itself into the registry and download malicious ...
Backdoor.Aimbot.AC High Backdoor.Aimbot.AC spreads to network shares by exploiting weak passwords. It ...
Backdoor.AimBot.AG High Backdoor.AimBot.AG is a backdoor trojan which attempts to download malicious ...
Backdoor.AimBot.X High Backdoor.AimBot.X installs itself into the registry forcing it to load up with ...
Backdoor.Aimfrm Elevated Backdoor.Aimfrm is a malicious application that runs in the background and ...
Backdoor.AIMVision Elevated Backdoor.AIMVision is a Trojan horse that allows unauthorized access to an ...
Backdoor.AJS High Backdoor.AJS will open various ports allowing unauthorized access to an ...
Backdoor.Akak Elevated Backdoor.Akak is a backdoor server that also creates a SOCKS proxy on the ...

Page 1 ... Page 52 | Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware