Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2851-2900 of 11067 found.

Page 1 ... Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 ... Page 222

Name Threat Level Description
Backdoor.Bapkri Elevated Backdoor.Bapkri is a generic detection for Dynamic Link Library (.dll) files ...
Backdoor.Barbie High Backdoor.Barbie is a threat that disguises as a IP network tool but after the ...
Backdoor.Barok High Backdoor.Barok is a malicious program that usually arrives in package ...
Backdoor.Baste Elevated Backdoor.Baste is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Battack Elevated Backdoor.Battack is a malicious application that runs in the background and ...
Backdoor.Beastdoor High Backdoor.Beastdoor embeds itself into explorer.exe and iexplore.exe which can ...
Backdoor.Beasty Elevated Backdoor.Beasty is a Trojan Horse that opens a listening port on your computer. ...
Backdoor.Bebshell Elevated is a Trojan horse with back door capabilities that may arrive as a Windows Meta ...
Backdoor.Bech Elevated Backdoor.Bech is a malicious application that runs in the background and allows ...
Backdoor.Berbew High Backdoor.Berbew is a Rootkit Trojan which steals sensitive information such as ...
Backdoor.Berbew.N High Backdoor.Berbew.N is a Rootkit Trojan which steals sensitive information such ...
Backdoor.Berpi Elevated Backdoor.Berpi is a back door Trojan that allows the remote attacker to perform ...
Backdoor.BHOLamp Medium Backdoor.BHOLamp is a threat that installed as a Browser Helper Object in the ...
Backdoor.BHOSta High Backdoor.BHOSta is a threat that installed as a Browser Helper Object in the ...
Backdoor.Bias Elevated Backdoor.Bias is a Trojan horse that downloads other risks onto the compromised ...
Backdoor.Bifrose High Backdoor.Bifrose is a backdoor trojan that attempts to propagate by exploiting ...
Backdoor.Bifrose.ACI High Backdoor.Bifrose.ACI is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.ACJ High Backdoor.Bifrose.ACJ is a malicious application that runs in the background and ...
Backdoor.Bifrose.ACL High Backdoor.Bifrose.ACL injects itself into other running processes in attempts to ...
Backdoor.Bifrose.AER High Backdoor.Bifrose.AER is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.AGQ High Backdoor.Bifrose.AGQ is a malicious application that runs in the backgroundand ...
Backdoor.Bifrose.CJ High Backdoor.Bifrose.CJ is an email spamming worm that propagates through the local ...
Backdoor.Bifrose.CY High Backdoor.Bifrose.CY is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.D High Backdoor.Bifrose.D is a backdoor program which gets installed as a legitimate ...
Backdoor.Bifrose.DC High Backdoor.Bifrose.DC can injects itself into other running processes in attempts ...
Backdoor.Bifrose.EF High Backdoor.Bifrose.EF is an internet worm that propagates through the local ...
Backdoor.Bifrose.FV High Backdoor.Bifrose.FV injects itself into other running processes in attempts to ...
Backdoor.Bifrose.PG Medium Backdoor.Bifrose.PG injects itself into other running processes in attempts to ...
Backdoor.Bifrose.QZN High Backdoor.Bifrose.QZN is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.R High Backdoor.Bifrose.R is an email spamming Backdoor that propagates through the ...
Backdoor.Bifrose.RT Medium Backdoor.Bifrose.RT injects itself into other running processes in attempts to ...
Backdoor.Bifrose.YH High Backdoor.Bifrose.YH is an internet worm that propagates through the local ...
Backdoor.Bifrose.YW Medium Backdoor.Bifrose.YW injects itself into other running processes in attempts to ...
Backdoor.Bigfoot Elevated Backdoor.Bigfoot is a Backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Binghe Elevated Backdoor.Binghe is a back door Trojan horse program that allows unauthorized ...
Backdoor.Bionet Elevated Backdoor.Bionet is a malicious backdoor Trojan. Backdoor.Bionet behaves similar ...
Backdoor.Bionet.404 High Trojan (Spyware), Bionet variant, allows unauthorized access to an infected ...
Backdoor.Bionet.40a High A BioNet variant. Backdoor.Bionet.40a is a malicious backdoor Trojan. Its ...
Backdoor.Bla Elevated The Backdoor.BlaTrojan allows unauthorized access to your computer. It tries to ...
Backdoor.Black_Dream High Backdoor.Black Dream is a remote access backdoor application that is used for ...
Backdoor.BlackD Elevated Backdoor.BlackD is a malicious application that runs in the background and ...
Backdoor.Blackhole High Backdoor.Blackhole attempts to hijack infected machines and allows attackers ...
Backdoor.BladeRunner Elevated Backdoor.BladeRunner allows a hacker to remotely control an infected c ...
Backdoor.Blarul Elevated Backdoor.Blarul is a Trojan horse that attempts to steal confidential ...
Backdoor.Blizzard Elevated Backdoor.Blizzard is a backdoor Trojan that allows a hacker to remotely access ...
Backdoor.BluanWeb Elevated Backdoor.BluanWeb is a malicious application that runs in the background and ...
Backdoor.Blueang High Backdoor.Blueang is a remote administrative trojan. It allows an attacker to ...
Backdoor.Blueeye High Backdoor.Blueeye is a trojan which allows the attacker unauthorized remote ...
Backdoor.Bmbot Elevated Backdoor.Bmbot is a backdoor Trojan that allows a hacker to gain control of ...
Backdoor.BO Elevated Backdoor.BO is a malicious application that runs in the background and allows ...

Page 1 ... Page 54 | Page 55 | Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware