Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3101-3150 of 11067 found.

Page 1 ... Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 ... Page 222

Name Threat Level Description
Backdoor.Foobot Elevated Backdoor.Foobot is a Trojan horse that opens a back door on the compromised ...
Backdoor.Forbot High Backdoor.Forbot connects to a remote IRC server from which attackers can gain ...
Backdoor.Formador Elevated Backdoor.Formador is a back door server that allows unauthorized remote access ...
Backdoor.Fox Elevated Backdoor.Fox gives a hacker full remote access to the comnputer. ...
Backdoor.Fraggle Elevated Backdoor.Fraggle is a backdoor Trojan horse that allows another person to have ...
Backdoor.Frango Elevated Backdoor.Frango is a Backdoor Trojan Horse that gives an attacker unauthorized ...
Backdoor.Frauder High Backdoor.Frauder runs in the background and allows remote access to the ...
Backdoor.Freddy Elevated Backdoor.Freddy is a malicious application that runs in the background and ...
Backdoor.Freefors Elevated Backdoor.Freefors is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Frenzy Elevated Backdoor.Frenzy is a malicious application that runs in the background and ...
Backdoor.FTP Elevated The Backdoor.FTP Trojan allows unauthorized access to the infected computer. By ...
Backdoor.FTP_Ana Elevated Backdoor.FTP_Ana is a Backdoor Trojan that gives a hacker unauthorized access ...
Backdoor.FTP_Bmail Elevated Backdoor.FTP_Bmail is a Trojan horse that allows a hacker to remotely control ...
Backdoor.FTP_Simpel High Backdoor.FTP.Simpel runs silently in the background and opens a port which ...
Backdoor.Fulamer Elevated Backdoor.Fulamer is a typical backdoor Trojan which gives a remote attacker ...
Backdoor.FunFactory Elevated Backdoor.FunFactory allows unauthorized access to an infected computer. It also ...
Backdoor.Futh Elevated Backdoor.Futh is a backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Futro Elevated Backdoor.Futro is a typical backdoor server program. Presence of the file ...
Backdoor.Fuwudoor Elevated Backdoor.Fuwudoor is a back door Trojan that allows unauthorized access to a ...
Backdoor.Fxsvc Elevated Backdoor.Fxsvc is a Backdoor Trojan Horse that gives its author access to your ...
Backdoor.G_Door Elevated Backdoor.G_Door is a utility that is used to control the Backdoor.G_Door ...
Backdoor.G_Door.B High Backdoor.G_Door.B is a backdoor trojan that starts up with windows and runs ...
Backdoor.Gaobot Elevated Backdoor.Gaobot is the server component of the worm, W32.HLLW.Gaobot.P, which ...
Backdoor.Gapin Elevated Backdoor.Gapin is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Gargamel Elevated Backdoor.Gargamel is a malicious application that runs in the background and ...
Backdoor.Gaster Elevated Backdoor.Gaster is a Trojan that gives an attacker access to your computer. It ...
Backdoor.GateCrasher Elevated Backdoor.GateCrasher is a malicious application that runs in the background and ...
Backdoor.GDoor Elevated Backdoor.GDoor is a malicious application that runs in the background and ...
Backdoor.Gecky Elevated Backdoor.Gecky is a malicious application that runs in the background and ...
Backdoor.Generic High These common components have files and keys that are in different threats but ...
Backdoor.GF Elevated Backdoor.GF is a backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.GGDoor High Backdoor.GGDoor allows an attacker unauthorized access to infected mach ...
Backdoor.Ghoice Elevated Backdoor.Ghoice allows unauthorized access to the infected computer. By default ...
Backdoor.Gholame Elevated Backdoor.Gholame is a backdoor Trojan that opens two ports on the computer; ...
Backdoor.Ghost High Backdoor.Ghost allows unauthorized access to an infected machine. ...
Backdoor.Ghostnet Elevated Backdoor.Ghostnet is a Trojan horse that opens a back door on the compromised ...
Backdoor.Ghostvoice High Ghostvoice is a remote access trojan which opens a port allowing an attacker ...
Backdoor.Ginwui High Backdoor.Ginwui attempts to create backdoors and allows an attacker ...
Backdoor.GirlFriend High Backdoor.GirlFriend is a backdoor trojan that allows attackers to gain access ...
Backdoor.GirlinRed High Backdoor GirlinRed is a backdoor which will let infected system to be ...
Backdoor.Globe Elevated Backdoor.Globe is a proof-of-concept Trojan horse program that exploits the ...
Backdoor.Glupzy Elevated Backdoor.Glupzy is a malicious application that runs in the background and ...
Backdoor.Gobot High Backdoor.Gobot is a backdoor trojan which attempts to create a backdoor and ...
Backdoor.Gobot.GEN High Backdoor.Gobot.GEN is an IRC-controlled malware that spreads through through ...
Backdoor.GOL Elevated The Backdoor.GOL backdoor is used to compromise AOL accounts. The backdoor is ...
Backdoor.Goster Elevated Backdoor.Goster is a backdoor Trojan that works under ICQ Messenger. It allows ...
Backdoor.Goweh High Backdoor.Goweh is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Grab Elevated Backdoor.Grab is a malicious application that runs in the background and allows ...
Backdoor.Granst Elevated Backdoor.Granst is a malicious application that runs in the background and ...
Backdoor.Graybird Elevated Backdoor.Graybird is a Trojan horse that hides its presence on the compromised ...

Page 1 ... Page 59 | Page 60 | Page 61 | Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware