Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3351-3400 of 11067 found.

Page 1 ... Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 ... Page 222

Name Threat Level Description
Backdoor.LittleWitch Elevated Backdoor.LittleWitch is a backdoor Trojan that is similar to ...
Backdoor.Livehar Elevated Backdoor.Livehar is a Linux-based Trojan horse that attempts to open a back ...
Backdoor.Livup Elevated Backdoor.Livup is a malicious application that runs in the background and ...
Backdoor.Lixy Elevated Backdoor.Lixy is a Backdoor Trojan Horse that opens a proxy server and allows ...
Backdoor.Lixy.B High Backdoor.Lixy.B is a variant of Backdoor.Lixy, a Backdoor Trojan Horse that ...
Backdoor.Logged Elevated Backdoor.Logged is a malicious application that runs in the background and ...
Backdoor.Lohocla Elevated Backdoor.Lohocla is a malicious application that runs in the background and ...
Backdoor.Lolok Elevated Backdoor.Lolok is a backdoor Trojan that uses the mIRC client to give a hacker ...
Backdoor.Longnu Elevated Backdoor.Longnu is a Trojan that gives a hacker access to your computer. It ...
Backdoor.Loony.E High Backdoor.Loony.E runs in the background, allowing attackers to connect to it ...
Backdoor.LoopAd High Backdoor.LoopAd runs in the background, opens random number of ports and allows ...
Backdoor.Lowtaper Elevated Backdoor.Lowtaper is a backdoor Trojan horse that allows remote command ...
Backdoor.LoxoScam Elevated Backdoor.LoxoScam is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.Lusillon Elevated Backdoor.Lusillon is a Trojan horse that opens a back door on the compromised ...
Backdoor.Lyshell Elevated Backdoor.Lyshell is a backdoor Trojan horse that gives an attacker complete ...
Backdoor.Madfind Elevated Backdoor.Madfind is a Backdoor Trojan horse that gives a hacker complete access ...
Backdoor.Magicon High Backdoor.Magicon is a malicious backdoor trojan that runs in the background and ...
Backdoor.Mailer_Services High Backdoor.Mailer.Services opens ports and listens for commands from external ...
Backdoor.MailThreads Elevated Backdoor.MailThreads is a malicious application that runs in the background and ...
Backdoor.Malpayo Elevated Backdoor.Malpayo allows a hacker to remotely control an infected computer. It ...
Backdoor.Manmatite Elevated Backdoor.Manmatite is a backdoor Trojan horse that gives an attacker remote ...
Backdoor.Mapsy Elevated Backdoor.Mapsy is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Marotob Elevated Backdoor.Marotob is a Trojan horse that steals email addresses and other ...
Backdoor.Masker Elevated Backdoor.Masker is a malicious application that runs in the background and ...
Backdoor.Massaker Elevated Backdoor.Massaker is a backdoor Trojan that allows complete access to the ...
Backdoor.MasterP Elevated Backdoor.MasterP is a malicious application that runs in the background and ...
Backdoor.MasterParadise High Backdoor.MasterParadise allows attackers unauthorized access to infected ...
Backdoor.Masteseq Elevated Backdoor.Masteseq is a back door Trojan horse, which allows a remote attacker ...
Backdoor.Matrix Elevated Backdoor.Matrix is a malicious application that runs in the background and ...
Backdoor.Maxload Elevated Backdoor.Maxload is a backdoor Trojan horse that affects Linux and Unix ...
Backdoor.Mayhdoor Elevated Backdoor.Mayhdoor is a malicious application that runs in the background and ...
Backdoor.Mechbot High Backdoor.Mechbot is a backdoor trojan which will allow attackers unauthorized ...
Backdoor.Medbot High Backdoor.Medbot is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Medias Elevated Backdoor.Medias is a Trojan horse that installs itself as a Browser Helper ...
Backdoor.Mepcod Elevated Backdoor.Mepcod is a Trojan horse that opens a back door and downloads a file ...
Backdoor.MeteorShell Elevated Backdoor.MeteorShell is a Trojan Horse that allows unauthorized access to an ...
Backdoor.Mex Medium Backdoor.Mex is a malicious application that runs in the background and allows ...
Backdoor.MH High Backdoor.MH will open a communication port on an infected computer and will ...
Backdoor.Microkos Elevated Backdoor.Microkos is a Trojan horse that opens a back door and allows ...
Backdoor.Miffice Elevated Backdoor.Miffice is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Migmaf Elevated Backdoor.Migmaf is a reverse proxy Trojan Horse that redirects HTTP requests to ...
Backdoor.Millenium Elevated Backdoor.Millenium is a malicious application that runs in the background and ...
Backdoor.MindControl Elevated Backdoor.MindControl is a malicious application that runs in the background and ...
Backdoor.MiniCommander Elevated Backdoor.MiniCommander is a simple backdoor Trojan that copies itself to the ...
Backdoor.Mipsiv Elevated Backdoor.Mipsiv is a Trojan horse that connects to an IRC server and allows an ...
Backdoor.Mirab Elevated Backdoor.Mirab allows a hacker to remotely control an infected computer. It is ...
Backdoor.Miranda Elevated Backdoor.Miranda allows a hacker to remotely control an infected computer. The ...
Backdoor.mIRC High Backdoor.mIRC is a backdoor trojan which makes use of the popular mIRC client. ...
Backdoor.Mirxy Elevated Backdoor.Mirxy is a Trojan horse program that allows the infected computer to ...
Backdoor.Mite Elevated Backdoor.Mite is a backdoor Trojan with a password-stealing component that is ...

Page 1 ... Page 64 | Page 65 | Page 66 | Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware