Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3751-3800 of 11067 found.

Page 1 ... Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 ... Page 222

Name Threat Level Description
Backdoor.Shbot High Backdoor.Shbot allows attackers unauthorized access to infected machin ...
Backdoor.Sheldor High Backdoor.Sheldor is a trojan that attempts to open backdoor and allows remote ...
Backdoor.Shellbot Elevated Backdoor.Shellbot is a Trojan horse that opens a back door and allows ...
Backdoor.Shipper Elevated Backdoor.Shipper is a malicious application that runs in the background and ...
Backdoor.Silence Elevated Backdoor.Silence is a malicious application that runs in the background and ...
Backdoor.SilentSpy Elevated Backdoor.SilentSpy is a Backdoor Trojan horse that gives an attacker ...
Backdoor.SilverFTP Elevated Backdoor.SilverFTP is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Simali Elevated Backdoor.Simali is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.Singu High Backdoor.Singu allows attackers unauthorized access to infected machin ...
Backdoor.Sinique Elevated Backdoor.Sinique is a malicious application that runs in the background and ...
Backdoor.Sinit Elevated Backdoor.Sinit is a Backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Sinups Elevated Backdoor.Sinups is an ASP and a VBScript-based Backdoor Trojan horse. This ...
Backdoor.Sivuxa Medium Backdoor Sivuxa is a malicious application that runs in the background and ...
Backdoor.Sixca Elevated The Backdoor.Sixca backdoor Trojan allows unauthorized access to the infected ...
Backdoor.Skalg Elevated Backdoor.Skalg is a malicious application that runs in the background and ...
Backdoor.SKOSX Elevated Backdoor.SKOSX is a malicious application that runs in the background and ...
Backdoor.SkRat High Backdoor.SkRat opens several ports which starts up with Windows and attempts to ...
Backdoor.SkSocket High Backdoor.SkSocket allows attackers unauthorized access to infected mac ...
Backdoor.Skun Elevated Backdoor.Skun is a Backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Slackbot Elevated Backdoor.Slackbot is a backdoor Trojan horse that allows a hacker to control ...
Backdoor.Slao Elevated Backdoor.Slao is a Backdoor Trojan Horse that allows unauthorized access to an ...
Backdoor.Small High Backdoor.Small installs itself into the system directory. It allows remote ...
Backdoor.Small.CKY High Backdoor.Small.CKY opens up random ports which will allow an attacker ...
Backdoor.Small.DAM High Backdoor.Small.DAM opens up random ports which will allow an attacker ...
Backdoor.Small.EO High Backdoor.Small.EO is a trojan which provides IRC remote access to a users ...
Backdoor.Small.HEZ High Backdoor.Small.HEZ installs and hides itself into the system directory. It ...
Backdoor.Small.HJ High Backdoor.Small.HJ installs itself into the system directory. It then attempts ...
Backdoor.Small.HL High Backdoor.Small.HL is a proxy server trojan which allows remote attackers to ...
Backdoor.Small.JG High Backdoor.Small.JG generates huge amounts of traffic aimed at several web sites. ...
Backdoor.Small.LS High Backdoor.Small.LS installs itself into the system directory. It allows remote ...
Backdoor.Small.NA Elevated Backdoor.Small.NA allows attackers unauthorized access to infected systems and ...
Backdoor.Small.OY High Backdoor.Small.OY attemp to hijack infected computers and allow unauthorized ...
Backdoor.Small.PN Medium Backdoor.Small.PN installs and hides itself into the system directory. It ...
Backdoor.SMBRelay Elevated Backdoor.SMBRelay is a backdoor Trojan. It uses the Man in the Middle attack, ...
Backdoor.Smezy Elevated Backdoor.Smezy is a malicious application that runs in the background and ...
Backdoor.SmokeDown Elevated Backdoor.SmokeDown is a backdoor Trojan horse which tries to connect to a ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Smorph Elevated Backdoor.Smorph is a polymorphic Trojan horse. It is distributed as an ...
Backdoor.Smother Elevated Backdoor.Smother gives its creator complete access to your computer. By ...
Backdoor.Snami Elevated Backdoor.Snami is a Backdoor Trojan Horse that attempts to connect to an IRC ...
Backdoor.Snex Elevated Backdoor.Snex is a malicious application that runs in the background and allows ...
Backdoor.Snipernet Elevated Backdoor.Snipernet is a malicious application that runs in the background and ...
Backdoor.Snowcap High Backdoor.Snowcap is a remote access trojan which allows attackers unauthorized ...
Backdoor.Snowdoor Elevated Backdoor.Snowdoor is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Sockets23 Elevated Backdoor.Sockets23 is a malicious application that runs in the background and ...
Backdoor.Socksbot Elevated Backdoor.Socksbot is a backdoor Trojan that connects to IRC and allows a hacker ...
Backdoor.Softshell Elevated Backdoor.Softshell is a Backdoor Trojan Horse that gives a hacker remote access ...
Backdoor.Sokacaps Elevated Backdoor.Sokacaps is a Backdoor Trojan Horse that is controlled through IRC. ...
Backdoor.Sokeven Elevated Backdoor.Sokeven is a backdoor Trojan horse that creates a SOCKS proxy on the ...

Page 1 ... Page 72 | Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware