Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3801-3850 of 11067 found.

Page 1 ... Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 ... Page 222

Name Threat Level Description
Backdoor.Solufina Elevated Backdoor.Solufina is a Trojan horse program that acts as a proxy server. It has ...
Backdoor.Spakrab Elevated Backdoor.Spakrab is a Trojan horse that opens a back door and may send spam ...
Backdoor.Sparta Elevated Backdoor.Sparta is Trojan horse that opens a back door, which can be controlled ...
Backdoor.Spartadoor High Backdoor.Spartadoor allows attackers unauthorized access to infected m ...
Backdoor.Specrem Elevated Backdoor.Specrem is a malicious application that runs in the background and ...
Backdoor.Spigot Elevated Backdoor.Spigot is a Trojan horse which allows unauthorized access to an ...
Backdoor.Spoofbot Elevated Backdoor.Spoofbot is a malicious backdoor program that allows a remote hacker ...
Backdoor.Spookdoor Elevated Backdoor.Spookdoor is the client component of the Backdoor.Spookdoor. It allows ...
Backdoor.Spotcom Elevated Backdoor.Spotcom is a Backdoor Trojan Horse that injects itself into Internet ...
Backdoor.Spy.Small.AV High Backdoor.Spy.Small.AV runs in stealth mode and opens TCP ports on the infected ...
Backdoor.Spybot.IA High Backdoor.Spybot.IA is a backdoor that uses a certain Internet Relay Chat ...
Backdoor.Spyboter Elevated Backdoor.Spyboter is a detection for a family of Trojans that open a back door ...
Backdoor.SpyBoter.BY High Backdoor.SpyBoter.BY is a backdoor worm which spreads via a network connection. ...
Backdoor.Spymon Elevated Backdoor.Spymon is a Trojan horse that opens a back door on a compromised ...
Backdoor.Srdl Elevated Backdoor.Srdl is a malicious application that runs in the background and allows ...
Backdoor.Stanex Elevated Backdoor.Stanex is a Backdoor Trojan horse that allows a hacker to control an ...
Backdoor.Staprew Elevated Backdoor.Staprew is a back door server program that allows a remote attacker to ...
Backdoor.Stealer Elevated Backdoor.Stealer is a malicious application that runs in the background and ...
Backdoor.StealthEye Elevated Backdoor.StealthEye is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Striker High Backdoor.Striker on execution runs in the background, opens ports on the ...
Backdoor.Stub.N High Backdoor.Stub.N opens and listens on a port and grants the remote hacker ...
Backdoor.Stupa Medium Backdoor.Stupa is a malicious application that runs in the background and ...
Backdoor.Sua Elevated Backdoor.Sua is a malicious application that runs in the background and allows ...
Backdoor.Subhappy Elevated Backdoor.Subhappy is a malicious application that runs in the background and ...
Backdoor.Subot Elevated Backdoor.Subot is a back door program that is loaded with a Serv-U FTP server ...
Backdoor.Subroot High Backdoor.Subroot allows attackers unauthorized access to infected mach ...
Backdoor.Subs Elevated Backdoor.Subs is a malicious application that runs in the background and allows ...
Backdoor.SubSari Elevated Backdoor.SubSari is a Trojan that allows unauthorized access to and control of ...
Backdoor.SubSeven Elevated Backdoor.SubSeven is a Trojan Horse, similar to Netbus or Back Orifice, which ...
Backdoor.SubSeven2 Elevated Backdoor.SubSeven2 is a malicious application that runs in the background and ...
Backdoor.SubSeven21 Elevated Backdoor.SubSeven21 is a malicious application that runs in the background and ...
Backdoor.SubSeven215 Elevated Backdoor.SubSeven215 is a variant of the Backdoor.SubSeven Trojan Horse. ...
Backdoor.SubSeven22 Elevated Backdoor.SubSeven22 is a Trojan horse. It is generally UPX packed; however, ...
Backdoor.SubSeven2gld Elevated Backdoor.SubSeven2gld is a malicious application that runs in the background ...
Backdoor.SubSeven2svr Elevated Backdoor.SubSeven2svr is a malicious application that runs in the background ...
Backdoor.Subwoofer Elevated Backdoor.Subwoofer allows a hacker to remotely control an infected com ...
Backdoor.Sumtax Elevated Backdoor.Sumtax is a Backdoor Trojan Horse that consists of several different ...
Backdoor.Surdux Elevated Backdoor.Surdux is a Backdoor Trojan Horse that allows its creator to control ...
Backdoor.Surgeon Elevated Backdoor.Surgeon allows a hacker to remotely control an infected compu ...
Backdoor.Sweetbomb Elevated Backdoor.Sweetbomb is an IRC backdoor Trojan horse. It can spread itself when ...
Backdoor.Swz High Backdoor.Swz runs silently in the background and opens up a port, which allows ...
Backdoor.Symopro Elevated Backdoor.Symopro is a malicious application that runs in the background and ...
Backdoor.Synrg Elevated Backdoor.Synrg allows unauthorized access to the infected computer. It also ...
Backdoor.Sysbug Elevated Backdoor.Sysbug is a Backdoor Trojan Horse that opens TCP port 5555 and waits ...
Backdoor.Sysdot Elevated Backdoor.Sysdot is a malicious application that runs in the background and ...
Backdoor.SysExploit Elevated Backdoor.SysExploit is a malicious application that runs in the background and ...
Backdoor.sysinst Elevated Backdoor.sysinst is a malicious application that runs in the background and ...
Backdoor.Syskbot Elevated Backdoor.Syskbot is an Backdoor Trojan Horse that gives a hacker access to your ...
Backdoor.Syslok Medium Backdoor.Syslok hijacks infect computers and display a screen warning user that ...
Backdoor.SysOCXDLL Elevated Backdoor.SysOCXDLL is a malicious application that runs in the background and ...

Page 1 ... Page 73 | Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware