Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 2951-3000 of 11067 found.

Page 1 ... Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 ... Page 222

Name Threat Level Description
Backdoor.Colfusion Elevated The Backdoor.Colfusion Backdoor Trojan gives an attacker unauthorized access to ...
Backdoor.CommInet High Backdoor.CommInet is a backdoor program which runs in stealth mode on the ...
Backdoor.Common_Components_for_Backdoor.Bifrose High These are common components used by Backdoor.Bifrose variants and ...
Backdoor.ConstructKit Elevated Backdoor.ConstructKit itself is not a virus, worm, or Trojan horse. It is a ...
Backdoor.CookieMonster High Backdoor.CookieMonster is a malicious application that runs in the background ...
Backdoor.Coolkey High Backdoor.Coolkey is a malicious program that allows attacker unauthorize access ...
Backdoor.Coreflood Elevated Backdoor.Coreflood is a detection for infected Web pages that can install a ...
Backdoor.Corrupt Elevated Backdoor.Corrupt is a malicious application that runs in the background and ...
Backdoor.Cow Elevated Backdoor.Cow is backdoor Trojan that allows a hacker to control the computer. ...
Backdoor.CrashCool Elevated Backdoor.CrashCool is a Trojan Horse that allows unauthorized access to the ...
Backdoor.Crat Elevated Backdoor.Crat allows a hacker to remotely control an infected computer. It is ...
Backdoor.Crazynet Elevated When Backdoor.Crazynet runs, it inserts itself onto your computer and runs in ...
Backdoor.Cuhmap Elevated Backdoor.Cuhmap is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.CVM Elevated Backdoor.CVM is a Trojan horse that opens a back door and can provide ...
Backdoor.CWD High Backdoor.CWD is a trojan with rootkit capabilities which is able to hide ...
Backdoor.CXH High Backdoor.CXH connects to a web based centralized bot aministration system and ...
Backdoor.CyberG High Backdoor.CyberG is a backdoor trojan that attempts to install malicious ...
Backdoor.Cybspy Elevated The Backdoor.Cybspy Backdoor Trojan opens a port on the computer and allows a ...
Backdoor.Cycbot.GEN High Backdoor.Cycbot.GEN is a backdoor that allows an attacker unauthorised access ...
Backdoor.CyJack Elevated Backdoor.CyJack is a malicious application that runs in the background and ...
Backdoor.Cyn Elevated Backdoor.Cyn is a Backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.Dados High Backdoor.Dados will open a port and allow an attacker to gain remote access to ...
Backdoor.Daemonize Elevated Backdoor.Daemonize is a Trojan Horse that runs as a proxy server. It is packed ...
Backdoor.Daer Elevated Backdoor.Daer is a backdoor Trojan that is written in Delphi and compressed ...
Backdoor.Dagger High Backdoor.Dagger is a malicious application that runs in the background and ...
Backdoor.Dagonit Elevated Backdoor.Dagonit is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dani Elevated Backdoor.Dani is a backdoor Trojan that is written in the Microsoft Visual ...
Backdoor.Danrit Elevated Backdoor.Danrit is a Trojan horse that logs keystrokes and opens a back do ...
Backdoor.Danton Elevated Backdoor.Danton allows unauthorized remote access. By default, the backdoor ...
Backdoor.DarkFtp Elevated Backdoor.DarkFtp is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Darkirc Elevated This Trojan horse gives unauthorized people access to your computer by a ...
Backdoor.Darkmoon Elevated Backdoor.Darkmoon is a Trojan horse that opens a back door and may download ...
Backdoor.DarkMoon.YW Medium Backdoor.DarkMoon.YW can give unauthorized access to attackers and if the ...
Backdoor.Darksill Elevated Backdoor.Darksill is a malicious application that runs in the background and ...
Backdoor.DarkSky Elevated Backdoor.DarkSky is a Trojan Horse that is used to gain unauthorized access to ...
Backdoor.Darksun Elevated Backdoor.Darksun steals passwords, logs keystrokes, and sends information about ...
Backdoor.Darmenu Elevated Backdoor.Darmenu is a backdoor Trojan that accesses a page on the Web site, ...
Backdoor.Daserf Elevated Backdoor.Daserf is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dckane Elevated Backdoor.Dckane is a back door program that allows a remote attacker to have ...
Backdoor.Death Elevated Backdoor.Death is a typical Backdoor Trojan, which gives a remote attacker ...
Backdoor.DeepThroat Elevated Backdoor.DeepThroat is a malicious application that runs in the background and ...
Backdoor.Deftcode Elevated The Backdoor.Deftcode Backdoor Trojan gives an attacker unauthorized access to ...
Backdoor.Delf Elevated Backdoor.Delf is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Delf.ACH High Backdoor.Delf.ACH creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.AEO High Backdoor.Delf.AEO opens random ports on the infected machine, allowing other ...
Backdoor.Delf.AFY High Backdoor.Delf.AFY creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.AGQ High Backdoor.Delf.AGQ is a backdoor Trojan which runs silently in the background ...
Backdoor.Delf.AKI High Backdoor.Delf.AKI is a backdoor program that allows an attacker to gain ...
Backdoor.Delf.AQD High Backdoor.Delf.AQD is a backdoor application that uses rootkit stealthing to ...
Backdoor.Delf.ASH High Backdoor.Delf.ASH creates a backdoor to allow an attacker to gain access to the ...

Page 1 ... Page 56 | Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware