Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3301-3350 of 11067 found.

Page 1 ... Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 ... Page 222

Name Threat Level Description
Backdoor.Kavar Elevated This is a backdoor Trojan that also has the capability to download other ...
Backdoor.Kergez Elevated Backdoor.Kergez is a malicious application that runs in the background and ...
Backdoor.Ketch Elevated Backdoor.Ketch is a backdoor Trojan Horse that allows an attacker to control ...
Backdoor.KeyHook Elevated Backdoor.KeyHook is a malicious application that runs in the background and ...
Backdoor.KeyStart High Backdoor.KeyStart is a malicious backdoor trojan that runs in the background ...
Backdoor.Khaos Elevated Backdoor.Khaos is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Kika Elevated Backdoor.Kika is a backdoor program that allows unauthorized remote access to a ...
Backdoor.Kikz Elevated Backdoor.Kikz is a malicious application that runs in the background and allows ...
Backdoor.Killwi.A High Backdoor.Killwi.A is a backdoor which connects to the internet to download ...
Backdoor.Kilo Elevated Backdoor.Kilo is a backdoor Trojan that uses an IRC channel to contact a ...
Backdoor.Klb Elevated Backdoor.Klb is a backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.Knocker High Backdoor.Knocker is downloaded onto the computer by another threat and installs ...
Backdoor.Kodalo Elevated Backdoor.Kodalo is a Backdoor Trojan Horse that gives the author of the Trojan ...
Backdoor.Kokodoor High Backdoor.Kokodoor allows attackers unauthorized access to an infected m ...
Backdoor.Kol Elevated Backdoor.Kol is a Backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.Komut Elevated Backdoor.Komut is a malicious application that runs in the background and ...
Backdoor.Kotilla Elevated Backdoor.Kotilla is a back door Trojan horse that allows unauthorized access to ...
Backdoor.Krass Elevated Backdoor.Krass is a malicious application that runs in the background and ...
Backdoor.Kredoor High Backdoor.Kredoor attempts to create backdoors and allows an attacker ...
Backdoor.Krei Elevated Backdoor.Krei is a backdoor Trojan that uses Trojan.Slanret to hide its ...
Backdoor.Kryost Elevated Backdoor.Kryost is a backdoor Trojan that allows unauthorized access to an ...
Backdoor.Kurbadur.11 High Backdoor.Kurbadur.11 collects information from the victims PC and e-mails the ...
Backdoor.Kurtse Elevated Backdoor.Kurtse is a malicious application that runs in the background and ...
Backdoor.Kutex Elevated Backdoor.Kutex is a Backdoor Trojan Horse that gives its creator access and ...
Backdoor.Lala Elevated The Backdoor.Lala Trojan Horse is a variant of Backdoor.Lala and allows ...
Backdoor.LameBot High Backdoor.Lamebot will install itself as a server process which opens various ...
Backdoor.Lamer Elevated Backdoor.Lamer is a Trojan horse program that opens a back door on the ...
Backdoor.LamersDeath High Backdoor.LamersDeath attempts to create backdoor and allows unauthorized access ...
Backdoor.Lancafdo Elevated Backdoor.Lancafdo is a Trojan horse that opens a back door on the compromised ...
Backdoor.Lanfilt Elevated Backdoor.Lanfilt is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.Lanfiltrator Elevated Backdoor.Lanfiltrator is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Laphex Elevated Backdoor.Laphex is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Lassrv Elevated Backdoor.Lassrv is a back door and infostealer threat that allows unauthorized ...
Backdoor.Lastdoor Elevated Backdoor.Lastdoor is a backdoor Trojan horse that gives the attacker ...
Backdoor.Lastras Elevated Backdoor.Lastras is a Trojan Horse that gives its creator unauthorized access ...
Backdoor.Lateda Elevated Backdoor.Lateda is a backdoor Trojan horse program that allows an attacker to ...
Backdoor.Latinus Elevated Backdoor.Latinus allows a hacker to remotely control an infected computer. ...
Backdoor.Lax Elevated Backdoor.Lax is a backdoor Trojan Horse that steals system information. It also ...
Backdoor.Lecna High Backdoor.Lecna is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.LegMir.AT High Backdoor.LegMir.AT is a backdoor program which on execution installs itself as ...
Backdoor.LegMir.BZ High Backdoor.LegMir.BZ is a backdoor Trojan horse. On execution it installs itself ...
Backdoor.LeGuardien Elevated Backdoor.LeGuardien is a Backdoor Trojan Horse that gives a hacker access to ...
Backdoor.Leniv Elevated Backdoor.Leniv is a Backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Leon Elevated Backdoor.Leon allows a hacker to have full remote access to the infected ...
Backdoor.Lesbot High Backdoor.Lesbot is a trojan that conceals itself as a Windows service and runs ...
Backdoor.Levelone Elevated Backdoor.Levelone is a malicious application that runs in the background and ...
Backdoor.Lifefournow Elevated Backdoor.Lifefournow is a backdoor Trojan horse program that allows a ...
Backdoor.Lithium Elevated Backdoor.Lithium is a Trojan horse that can open a backdoor on your co ...
Backdoor.Litmus High Backdoor.Litmus attempts to create backdoors and allows unauthorized access to ...
Backdoor.Litmus.D High Backdoor.Litmus.D is a backdoor which opens a port to listen for commands from ...

Page 1 ... Page 63 | Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware