Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3051-3100 of 11067 found.

Page 1 ... Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 ... Page 222

Name Threat Level Description
Backdoor.DsBot High Backdoor.DsBot is a malicious backdoor trojan that runs in the background and ...
Backdoor.Dsklite Elevated Backdoor.Dsklite is the client side of Backdoor.Dsklite, and allows ...
Backdoor.DSNX Elevated Backdoor.DSNX is a Backdoor Trojan Horse that can give its creator access to ...
Backdoor.DSSDoor.A High Backdoor.DSSDoor.A is a backdoor trojan which when executed invokes a hidden ...
Backdoor.DTR Elevated Backdoor.DTR is a Trojan horse that allows unauthorized access to an infected ...
Backdoor.DU Elevated Backdoor.DU is a malicious application that runs in the background and allows ...
Backdoor.Ducktoy Elevated Backdoor.Ducktoy allows unauthorized access to an infected computer. ...
Backdoor.Ducy Elevated Backdoor.Ducy is a backdoor Trojan horse that uses MSN Messenger to give an ...
Backdoor.Dumbot Elevated Backdoor.Dumbot is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dvldr Elevated Backdoor.Dvldr is a backdoor Trojan that gives a hacker unauthorized access to ...
Backdoor.Easyserv Elevated Backdoor.Easyserv is a backdoor Trojan that gives an attacker limited access to ...
Backdoor.Eclipse Elevated Backdoor.Eclipse is a malicious application that runs in the background and ...
Backdoor.Eclypse Elevated Backdoor.Eclypse is a malicious application that runs in the background and ...
Backdoor.EggDrop High Backdoor.EggDrop registers itself as a service which runs at Windows start up ...
Backdoor.EggHead Elevated Backdoor.EggHead is a backdoor Trojan horse program that uses a freeware IRC ...
Backdoor.Elitem Elevated Backdoor.Elitem is a Trojan horse that works under MSN Messenger. It allows a ...
Backdoor.Emcommander Elevated Backdoor.Emcommander is a Backdoor Trojan distributed as an EMF image file ...
Backdoor.Emogen High Backdoor Emogen is a malicious application that runs in the background and ...
Backdoor.Emoz Elevated Backdoor.Emoz is a malicious application that runs in the background and allows ...
Backdoor.Endool Elevated Backdoor.Endool is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Eparssa Elevated Backdoor.Eparssa is a Trojan horse that opens a back door on a compromised ...
Backdoor.Erman Elevated Backdoor.Erman is a malicious application that runs in the background and ...
Backdoor.Eterok Elevated Backdoor.Eterok is a back door that opens a network port on a compromised ...
Backdoor.Evilbot Elevated Backdoor.Evilbot is a variant of Backdoor.Evilbot that allows unauthorized ...
Backdoor.Evilsock High Backdoor.Evilsock opens port and allows remote access to an infected machine ...
Backdoor.Evivinc Elevated Backdoor.Evivinc is a Backdoor Trojan horse that installs WinVNC without a ...
Backdoor.Evologger Elevated Backdoor.Evologger is a malicious application that runs in the background and ...
Backdoor.Exdis Elevated Backdoor.Exdis is a backdoor Trojan horse that allows a hacker to remotely ...
Backdoor.Expjan Elevated Backdoor.Expjan is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Explorer32 Elevated Backdoor.Explorer32 is a malicious application that runs in the background and ...
Backdoor.EZBot Elevated Backdoor.EZBot is a Backdoor Trojan Horse that allows its creator to use ...
Backdoor.EzKilla High Backdoor.EzKilla creates a backdoor to allow an attacker to gain remote access ...
Backdoor.F_Door High Backdoor.F_Door is a remote access trojan (RAT) which allows an attacker access ...
Backdoor.F3bot Elevated Backdoor.F3bot allows unauthorized access to the infected computer. It requires ...
Backdoor.Fadedoor High Backdoor.Fadedoor is a Remote Administrative Trojan (RAT), which gives ...
Backdoor.Fakedos.C High Backdoor.Fakedos.C is a trojan that conceals itself as a DOS application. It ...
Backdoor.Fantasy Elevated Backdoor.Fantasy is a malicious application that runs in the background and ...
Backdoor.Fatroj Elevated Backdoor.Fatroj is the client component of the Backdoor.Fatroj Trojan Horse. ...
Backdoor.Feap Elevated Backdoor.Feap is a malicious application that runs in the background and allows ...
Backdoor.Feardoor Elevated Backdoor.Feardoor is a backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Fearic Elevated Backdoor.Fearic is a backdoor Trojan horse that allows a hacker to use America ...
Backdoor.Fearles Elevated Backdoor.Fearles is a Trojan horse that gives an attacker remote access to your ...
Backdoor.Feeth Elevated Backdoor.Feeth is a malicious application that runs in the background and ...
Backdoor.Femo Elevated Backdoor.Femo is a Backdoor Trojan Horse with process injection capabilities. ...
Backdoor.Firefly Elevated Backdoor.Firefly is a malicious application that runs in the background and ...
Backdoor.Fivsec Elevated Backdoor.Fivsec is a Trojan horse that opens a back door on a randomly chosen ...
Backdoor.Flux High Backdoor.Flux attempts to open ports and allows unauthorized access to infected ...
Backdoor.Fluxay Elevated Backdoor.Fluxay is a Backdoor Trojan Horse that uses pipes to allow an ...
Backdoor.Fof Elevated Backdoor.Fof is a malicious application that runs in the background and allows ...
Backdoor.Fonamebot Elevated Backdoor.Fonamebot is a proof-of-concept Trojan horse that uses DNS query ...

Page 1 ... Page 58 | Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware