Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3001-3050 of 11067 found.

Page 1 ... Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 ... Page 222

Name Threat Level Description
Backdoor.Delf.AUU High Backdoor.Delf.AUU can possibly be obstacle for specific security software such ...
Backdoor.Delf.AWY High Backdoor.Delf.AWY is a backdoor trojan that encompasses functionality to ...
Backdoor.Delf.CEG High Backdoor.Delf.CEG attempts to connect to several remote sites in order to give ...
Backdoor.Delf.DIP High Backdoor.Delf.DIP is attempts to allow an attacker unauthorized access to the ...
Backdoor.Delf.EE High Backdoor.Delf.EE creates a copy of itself to the Windows system folder and adds ...
Backdoor.Delf.GEN High Backdoor.Delf.GEN creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.GY High Backdoor.Delf.GY is a backdoor program which opens a random number of ports on ...
Backdoor.Delf.IHE Medium Backdoor.Delf.IHE creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.JFL High Backdoor.Delf.JFL is a backdoor program that allows an attacker to gain ...
Backdoor.Delf.JJD Medium Backdoor.Delf.JJD creates a backdoor to allow an attacker to gain access to the ...
Backdoor.Delf.JZ High Backdoor.Delf.JZ creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.JZF High Backdoor.Delf.JZF is a threat that can compromise the affected system and gain ...
Backdoor.Delf.QI High Backdoor.Delf.QI creates a copy of itself in the 'System' directory and also ...
Backdoor.Delf.RAN High Backdoor.Delf.RAN is a threat that possesses abilities such as keylogging, ...
Backdoor.Delf.S High Backdoor.Delf.S poses as a fake signature modifier but actually is a backdoor ...
Backdoor.Delf.SY High Backdoor.Delf.SY is a keylogger that runs silently in the background and ...
Backdoor.Delf.TZ High Backdoor.Delf.TZ runs silently in the backgound and can open up a port to allow ...
Backdoor.Denwp Elevated Backdoor.Denwp allows a hacker to remotely control an infected computer. It is ...
Backdoor.DeskProxy Elevated Backdoor.DeskProxy is a Trojan horse that runs as a proxy server. ...
Backdoor.Destiny Elevated Backdoor.Destiny is a backdoor Trojan horse. It is a dynamic-link library (DLL) ...
Backdoor.Devil Elevated Backdoor.Devil is a malicious application that runs in the background and ...
Backdoor.Dewin Elevated Backdoor.Dewin allows a hacker to gain access to and remotely control an ...
Backdoor.Dextenea Elevated Backdoor.Dextenea is a Linux-based Trojan horse that attempts to open a back ...
Backdoor.DGRat Medium Backdoor.DGRat is a remote administrative trojan. It connects to remote host ...
Backdoor.DGS Elevated Backdoor.DGS is a malicious application that runs in the background and allows ...
Backdoor.DGSDrop Elevated Backdoor.DGSDrop is a malicious application that runs in the background and ...
Backdoor.DHCPCom High Backdoor.DHCPCom installs itself as a service called DHCP COM. The process ...
Backdoor.DialUp Elevated Backdoor.DialUp is a malicious application that runs in the background and ...
Backdoor.Dindang Elevated Backdoor.Dindang is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.DirectConnection High Backdoor.DirectConnection is a remote administration tool which provides an ...
Backdoor.Disgufa Elevated Backdoor.Disgufa is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dister Elevated Backdoor.Dister is a Trojan horse that periodically contacts a server for ...
Backdoor.Djump Elevated Backdoor.Delf.G is a Trojan Horse that opens TCP ports 21009 and 2485 on your ...
Backdoor.DKAngel Elevated Backdoor.DKAngel is a Backdoor Trojan Horse that allows an attacker to remotely ...
Backdoor.DMSpammer Elevated Backdoor.DMSpammer is a Backdoor Trojan Horse that relays spam email m ...
Backdoor.Doebyt High Backdoor.Doebyt attempt to hijack infected machines and allow unauthorized ...
Backdoor.DogRev Elevated Backdoor.DogRev is a malicious application that runs in the background and ...
Backdoor.Doly Elevated Backdoor.Doly is a client program that can be used to remotely control the ...
Backdoor.Domwis Elevated Backdoor.Domwis is a back door Trojan horse, which allows unauthorized remote ...
Backdoor.DonaldDick Elevated Backdoor.DonaldDick is a malicious application that runs in the background and ...
Backdoor.Doom Elevated Backdoor.Doom is a malicious application that runs in the background and allows ...
Backdoor.Doroku Elevated Backdoor.Doroku is a Trojan horse that opens a back door on the Winny ...
Backdoor.Doster Elevated Backdoor.Doster is a backdoor server program that allows unauthorized remote ...
Backdoor.Doyorg Elevated Backdoor.Doyorg is a back door Trojan which allows unauthorized remote access. ...
Backdoor.DRA Elevated Backdoor.DRA is a malicious application that runs in the background and allows ...
Backdoor.Dragodor Elevated Backdoor.Dragodor is a Trojan horse that downloads and executes remote files ...
Backdoor.Dragonbot High Backdoor.Dragonbot attempts to open ports and allows unauthorized access to an ...
Backdoor.Dragonqq Elevated Backdoor.Dragonqq is a Trojan Horse that attempts to steal passwords from a ...
Backdoor.Drat Elevated Backdoor.Drat is a malicious application that runs in the background and allows ...
Backdoor.Drator Elevated The Backdoor.Drator backdoor Trojan copies itself to the %Windir% folder and ...

Page 1 ... Page 57 | Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware