Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2801-2850 of 11067 found.

Page 1 ... Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 ... Page 222

Name Threat Level Description
Backdoor.Akbot Medium Backdoor.Akbot is a threat that enables user to merge two executable files ...
Backdoor.Akcom Elevated Backdoor.Akcom is a malicious application that runs in the background and ...
Backdoor.Akosch Elevated Backdoor.Akosch is a malicious application that runs in the background and ...
Backdoor.Alets Elevated Backdoor.Alets is a back door Trojan horse program that allows a remote ...
Backdoor.Almetyevsk.A High Backdoor.Almetyevsk.A is a trojan that conceals itself as a Windows process ...
Backdoor.Alnica Elevated Backdoor.Alnica is a Backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Amanda High Backdoor.Amanda is remote access trojan that compromises the security of the ...
Backdoor.Amitis Elevated Backdoor.Amitis is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Anakha Elevated Backdoor.Anakha is a backdoor Trojan horse that allows a hacker to use Internet ...
Backdoor.AntiLam Elevated Backdoor.AntiLam is a Backdoor Trojan Horse that gives its creator access to ...
Backdoor.Antilam.GEN High Backdoor.Antilam.GEN has keylogging functionality. It creates a backdoor on the ...
Backdoor.Anyserv Elevated Backdoor.Anyserv is a Trojan horse that gives an attacker remote access to an ...
Backdoor.Aoldoor Elevated Backdoor.Aoldoor is a malicious application that runs in the background and ...
Backdoor.Apdoor Elevated Backdoor.Apdoor is a Backdoor Trojan Horse that is similar to ...
Backdoor.Aphexdoor Elevated Backdoor.Aphexdoor is backdoor Trojan horse that uses the IRC channels to ...
Backdoor.Aphexdoor.B High Backdoor.Aphexdoor.B is a threat that attempts to connect to a certain ...
Backdoor.Arape.A High Backdoor.Arape.A is a Remote Administration Trojan that installs a backdoor on ...
Backdoor.Arcanum Elevated Backdoor.Arcanum is a malicious application that runs in the background and ...
Backdoor.Armageddon Elevated Backdoor.Armageddon is a Backdoor Trojan Horse that allows its author to ...
Backdoor.ASNBot High Backdoor.ASNBot runs in the background opening a backdoor which allows hackers ...
Backdoor.Asniffer Elevated Backdoor.Asniffer is a backdoor Trojan horse that opens a port on the computer, ...
Backdoor.Asoxy Elevated Backdoor.Asoxy is a Trojan horse that runs as a proxy server. ...
Backdoor.Assasin High Backdoor.Assasin is a backdoor which will open a port on a compromised computer ...
Backdoor.Asylum Elevated This Trojan horse has no visual indicators that the computer has been infected. ...
Backdoor.Asylum.Gen High Backdoor.Asylum.Gen allows hackers to compromise remote machines by installing ...
Backdoor.ASync Elevated Backdoor.ASync is a malicious application that runs in the background and ...
Backdoor.Atom Elevated Backdoor.Atom is a malicious application that runs in the background and allows ...
Backdoor.Augodor.GEN High Backdoor.Augodor.GEN listens for intstructions from external hackers through ...
Backdoor.Augudor Elevated Backdoor.Augudor is a Backdoor Trojan Horse that opens TCP port 1011 and waits ...
Backdoor.AutoSpy High Backdoor.AutoSpy opens a backdoor for attackers to access to an infected ...
Backdoor.Autoupder Elevated Backdoor.Autoupder is a backdoor program that can be used as a distribution ...
Backdoor.Avstral High Backdoor.Avstral runs silently in the background which starts up when Windows ...
Backdoor.Back_Orifice_2K High Back Orifice 2K is a backdoor which allows a remote attacker to take full ...
Backdoor.Back_Orifice_XP High Back Orifice XP will open various ports allowing unauthorized access to an ...
Backdoor.Backage Elevated Backdoor.Backage is a backdoor Trojan horse that allows unauthorized access to ...
Backdoor.BackConstructor High Backdoor.BackConstructor is a client program a hacker can use to access a ...
Backdoor.Badcodor Elevated Backdoor.Badcodor is a Backdoor Trojan Horse that gives its creator full ...
Backdoor.Badok High Backdoor.Bagot installs itself in the system folder and adds runkeys to make ...
Backdoor.Badrat.C High Backdoor.Badrat.C runs silently in the background as a process which starts up ...
Backdoor.Badrat.E Medium This threat is a client-server backdoor capable of controlling and monitoring ...
Backdoor.Balkart Elevated Backdoor.Balkart is a backdoor Trojan horse that can act as a HTTP proxy or FTP ...
Backdoor.Bancodor.GEN High Backdoor.Bancodor.Gen installs itself on the users machine without their ...
Backdoor.Bancodor.W High Backdoor.Bancodor.W installs itself on the users machine without their ...
Backdoor.Bandock Elevated Backdoor.Bandock is a Trojan horse that opens a back door on the compromised ...
Backdoor.Bandok High Backdoor.Bandok attempts to allow an attacker unauthorized access to the ...
Backdoor.Bandok.BC High Backdoor.Bandok.BC installs itself on the users machine without their ...
Backdoor.Bandok.J High Backdoor.Bandok.J is a trojan that allow unauthorized access to the infected ...
Backdoor.Bandok.S High Backdoor.Bandok.S is a trojan that will run when the infected system starts up ...
Backdoor.Banger High Backdoor.Banger runs as a hidden process using up all memory and hindering the ...
Backdoor.Banito Elevated Backdoor.Banito is a Trojan horse that logs keystrokes and opens a back door ...

Page 1 ... Page 53 | Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware