Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3501-3550 of 11067 found.

Page 1 ... Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 | Page 75 ... Page 222

Name Threat Level Description
Backdoor.Pahador.P High Backdoor.Pahador.P attempts to create backdoors and allow unauthorized access ...
Backdoor.Palukka Elevated Backdoor.Palukka is a backdoor Trojan horse that can give a hacker access to ...
Backdoor.Papi Elevated Backdoor.Papi is a Trojan horse that steals sensitive information from the ...
Backdoor.Paproxy High Backdoor.Paproxy is a threat that tries to establish a connection to a remote ...
Backdoor.Pazus Elevated Backdoor.Pazus is a backdoor Trojan horse, which allows unauthorized, remote ...
Backdoor.PCclient High Backdoor.PCclient will open various ports allowing unauthorized access to an ...
Backdoor.PcClient.UAC High Backdoor.PcClient.UAC will open a back door on the compromised system and ...
Backdoor.Peeper Elevated Backdoor.Peeper is a Trojan horse that allows its creator to control an ...
Backdoor.Peepviewer High Backdoor.Peepviewer is a remote access trojan which allows attackers to take ...
Backdoor.Peerdoor Elevated Backdoor.Peerdoor is a Trojan horse that opens a backdoor on the compromised ...
Backdoor.Peers Elevated Backdoor.Peers is a Backdoor Trojan Horse that gives a hacker remote access to ...
Backdoor.Penrox Elevated Backdoor.Penrox is a Backdoor Trojan that allows unauthorized access to a ...
Backdoor.Perlovga.B Elevated Backdoor.Perlovga.B runs silently in the background providing a backdoor ...
Backdoor.Pest Elevated Backdoor.Pest is the client part of a backdoor Trojan horse. This is the part ...
Backdoor.Pestdoor Elevated Backdoor.Pestdoor is a backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Pfinet Elevated Backdoor.Pfinet is a Trojan horse that opens a back door on the compromised ...
Backdoor.Pharvest Elevated Backdoor.Pharvest is a detection for executable files infected by ...
Backdoor.Phoenix Elevated Backdoor.Phoenix is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Phoenix_Keylogger High Phoenix Keylogger is a PC activity monitoring tool. It records all keystrokes ...
Backdoor.PHP.C99Shell High Backdoor.PHP.C99Shell is a malicious PHP script that allows an attacker to gain ...
Backdoor.Ping Elevated Backdoor.Ping is a malicious application that runs in the background and allows ...
Backdoor.Pioneer Elevated Backdoor.Pioneer is a Trojan that allows a hacker to have remote access to ...
Backdoor.Platrash Elevated Backdoor.Platrash is a Trojan horse that can allow unauthorized access to an ...
Backdoor.Plunix High Backdoor.Plunix allows attackers unauthorized access to infected machines. ...
Backdoor.Poebot High Backdoor.Poebot is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Poebot.B High Poebot.B installs itself into the registry forcing it to load up with windows. ...
Backdoor.Poebot.F High Backdoor.Poebot.F installs itself into the registry forcing it to load up with ...
Backdoor.Pointex Elevated Backdoor.Pointex, which is a variant of Backdoor.Pointex, gives a hacker ...
Backdoor.Poison High Backdoor.Poison is a remote access trojan which allows attackers unauthorized ...
Backdoor.Poison.686 Medium ...
Backdoor.Poison.AMX High Backdoor.Poison.AMX is a remote access trojan which allows attackers ...
Backdoor.Poison.KOD High Backdoor.Poison.KOD is a malicious backdoor that acts as a server and executes ...
Backdoor.PoisonIvy Medium Backdoor.PoisonIvy is a threat that will provide a remote malicious user with ...
Backdoor.Poly Elevated Backdoor.Poly is a malicious application that runs in the background and allows ...
Backdoor.PolyDrop Elevated This Trojan horse gives no visual indication that you have been infected. When ...
Backdoor.Popwin Medium Backdoor.Popwin is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Portless Elevated Backdoor.Portless is a backdoor Trojan horse that allows unauthorized access to ...
Backdoor.Powerspider Elevated The Backdoor.Powerspider is a Microsoft Foundation Class (MFC) program that is ...
Backdoor.PPDoor High Backdoor.PPDoor opens a backdoor that allows an attacker to access a ...
Backdoor.PPdoor.BC High Backdoor.PPdoor.BC is a backdoor program which runs in stealth mode, opens ...
Backdoor.PPdoor.BP High Backdoor.PPdoor.BP opens a backdoor that allows an attacker to access a ...
Backdoor.PPdoor.BQ High Backdoor.PPdoor.BQ is a backdoor program which opens random ports on the ...
Backdoor.Priority High Backdoor.Priority opens ports and allows hackers to access the infected ...
Backdoor.Private Elevated Backdoor.Private is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Pronclam Elevated Backdoor.Pronclam is a Trojan horse that opens a back door on the compromised ...
Backdoor.ProRat High Backdoor.ProRat is a remote administrative trojan. It allows an attacker to ...
Backdoor.ProRAT.K High Backdoor.ProRAT.K is a remote administrative trojan. It allows an attacker to ...
Backdoor.Prosiak Elevated Backdoor.Prosiak is the client software corresponding to the Backdoor.Prosiak ...
Backdoor.Prosti High Backdoor.Prosti is a trojan that opens a back door on the compromised comput. ...
Backdoor.Protector High Backdoor.Protector is a malicious backdoor trojan that runs in the background ...

Page 1 ... Page 67 | Page 68 | Page 69 | Page 70 | Page 71 | Page 72 | Page 73 | Page 74 | Page 75 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware