Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3251-3300 of 11067 found.

Page 1 ... Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 ... Page 222

Name Threat Level Description
Backdoor.IRCBot.BFB High Backdoor.IRCBot.BFB connects to the internet to download further malware and ...
Backdoor.IRCBot.BMD High Backdoor.IRCBot.BMD connects to the internet to download further malware and ...
Backdoor.IRCBot.BOG High Backdoor.IRCBot.BOG is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.BSQ Medium Backdoor.IRCBot.BSQ is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.CJD High Backdoor.IRCBot.CJD is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.COM High Backdoor.IRCBot.COM is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DD High Backdoor.IRCBot.DD connects to the internet to download further malware and ...
Backdoor.IRCBot.DHH High Backdoor.IRCBot.DHH is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DOK High Backdoor.IRCBot.DOK is a malicious backdoor trojan that runs in the background ...
Backdoor.Ircbot.E High Backdoor.Ircbot.E is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.EKX Medium Backdoor.IRCBot.EKX is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.EPA High Backdoor.IRCBot.EPA is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.ET High Backdoor.IRCBot.ET is a network worm with backdoor functionality. The backdoor ...
Backdoor.IRCBot.ew Medium Backdoor.IRCBot.ew connects to the internet to download further malware and ...
Backdoor.IRCBot.ex Medium Backdoor.IRCBot.ex connects to the internet to download further malware and ...
Backdoor.IRCBot.EXE High Backdoor.IRCBot.EXE is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.fa Medium Backdoor.IRCBot.fa connects to the internet to download further malware and ...
Backdoor.IRCBot.FAI High Backdoor.IRCBot.FAI is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.fb Medium Backdoor.IRCBot.fb connects to the internet to download further malware and ...
Backdoor.IRCBot.fd Medium Backdoor.IRCBot.fd connects to the internet to download further malware and ...
Backdoor.IRCBot.FP High Backdoor.IRCBot.FP connects to the internet to download further malware and ...
Backdoor.IRCBot.GEN High Backdoor.IRCBot.GEN is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.GEV High Backdoor.IRCBot.GEV is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.GW High Backdoor.IRCBot.GW connects to the internet to download further malware and ...
Backdoor.IRCbot.GZ High Backdoor.IRCBot.GZ connects to the internet to download further malware and ...
Backdoor.IRCbot.HA High Backdoor.IRC.Ha is a backdoor Trojan. It installs an mIRC client that has ...
Backdoor.IRCbot.HD High Backdoor.IRCbot.HD disables the registry editor and the taskmanager and opens ...
Backdoor.IRCBot.ST High Backdoor.IRCBot.ST uses Microsoft MS06-040 Exploit to spread. It opens ports, ...
Backdoor.IRCBot.TA High Backdoor.IRCBot.TA starts up when Windows starts and tires to connect to an IRC ...
Backdoor.IRCBot.WinSMX High Backdoor.IRCBot.WinSMX establishes a connection to a pre-defined IRC server ...
Backdoor.IRCBot.XG High Backdoor.IRCBot.XG is a backdoor that has Worm functionality as well. It ...
Backdoor.IRCBot.YH High Backdoor.IRCBot.YH establishes a connection to a pre-defined server upon ...
Backdoor.IRCBot.ZI High Backdoor.IRCBot.ZI is a Backdoor that transmit img807.zip via the MSN to infect ...
Backdoor.IrcContact Elevated Backdoor.IrcContact is a Backdoor Trojan horse that gives an attacker ...
Backdoor.Iroffer Elevated Iroffer is a potential unwanted application which is used to allow file sharing ...
Backdoor.Isee Elevated Backdoor.Isee is a malicious application that runs in the background and allows ...
Backdoor.Isen Elevated Backdoor.Isen is a backdoor Trojan horse that hides processes and files. In ...
Backdoor.Jaan.T Medium Backdoor.Jaan.T is a trojan which allows unauthorised access to an infected ...
Backdoor.Jacktron Elevated Backdoor.Jacktron is a malicious application that runs in the background and ...
Backdoor.Jeem Elevated Backdoor.Jeem is a Trojan horse that allows a hacker to remotely control an ...
Backdoor.Jinmoze Elevated Backdoor.Jinmoze is a malicious application that runs in the background and ...
Backdoor.Jittar Elevated Backdoor.Jittar is a Backdoor Trojan Horse that gives its creator remote access ...
Backdoor.JokerDoor Medium Backdoor.JokerDoor is a malicious backdoor trojan that runs in the background ...
Backdoor.Jupdate Elevated Backdoor.Jupdate is a backdoor program that allows a remote attacker to ...
Backdoor.Justjoke High Backdoor.Justjoke attempts to hijack the infected computer and allows ...
Backdoor.Kaitex Elevated Backdoor.Kaitex is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Kalasbot Elevated Backdoor.Kalasbot is a Backdoor Trojan Horse that allows a hacker to control a ...
Backdoor.Kamikaze Elevated Backdoor.Kamikaze is a malicious application that runs in the background and ...
Backdoor.Katherdoor Elevated Backdoor.Katherdoor is a malicious application that runs in the background and ...
Backdoor.Katux Elevated Backdoor.Katux is a malicious application that runs in the background and ...

Page 1 ... Page 62 | Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware