Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3851-3900 of 11067 found.

Page 1 ... Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 ... Page 222

Name Threat Level Description
Backdoor.SysReg Elevated Backdoor.SysReg is a malicious application that runs in the background and ...
Backdoor.System33 High Backdoor.System33 runs as a process in the background and drops a copy of ...
Backdoor.Systsec Elevated Backdoor.Systsec is a backdoor Trojan horse. It listens on port 1034 and allows ...
Backdoor.SysXXX Elevated Backdoor.SysXXX is a backdoor Trojan program that was written in the Delphi ...
Backdoor.Syzoor Elevated Backdoor.Syzoor is a Trojan horse that opens a back door on the compromised ...
Backdoor.Tabdim Elevated Backdoor.Tabdim is a Trojan horse program that opens a backdoor and allows a ...
Backdoor.Talex Elevated The Backdoor.Talex backdoor Trojan allows complete access to the infected ...
Backdoor.Tankedoor Elevated Backdoor.Tankedoor is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.TapiTroj Elevated Backdoor.TapiTroj is a malicious application that runs in the background and ...
Backdoor.Taskmon Elevated Backdoor.Taskmon is a malicious application that runs in the background and ...
Backdoor.Tasmer Elevated Backdoor.Tasmer is a malicious application that runs in the background and ...
Backdoor.TDS Elevated Backdoor.TDS is a backdoor Trojan that is written in the Delphi language. When ...
Backdoor.TDSS.BKV High Backdoor.TDSS.BKV is a backdoor trojan which allows the attacker access to the ...
Backdoor.Tela Elevated Backdoor.Tela is a backdoor Trojan horse that allows unauthorized access to the ...
Backdoor.Tervserv Elevated Backdoor.Tervserv is a Trojan horse that opens a back door on the compromised ...
Backdoor.Theef Elevated Backdoor.Theef is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.TheThing Elevated Backdoor.TheThing is a malicious application that runs in the background and ...
Backdoor.TheThing-1 Elevated Backdoor.TheThing-1 is a malicious application that runs in the background and ...
Backdoor.Threadsys Elevated Backdoor.Threadsys is a backdoor Trojan horse that connects to a predefined ...
Backdoor.Thredsys High Backdoor.Thredsys is a backdoor trojan which attempts to open a port leaving ...
Backdoor.Thunderkiss Elevated Backdoor.Thunderkiss is a malicious application that runs in the background and ...
Backdoor.Thunk.E High The backdoor opens a random TCP port to listen for commands from a remote host. ...
Backdoor.Thunk.I High Backdoor.Thunk.I is a backdoor trojan which attempts to open a port leaving the ...
Backdoor.Thunker Elevated Backdoor.Thunker is a Trojan Horse that runs as a proxy server. It randomly ...
Backdoor.Tidserv High Backdoor.Tidserv is a Trojan that opens a back door and allows remote ...
Backdoor.Tilebot.AF High Backdoor.Tilebot.AF is a malicious application that runs in the background, ...
Backdoor.Tiny.C High Backdoor.Tiny.C is a malicious backdoor trojan that runs in the background and ...
Backdoor.Tinydog Elevated Backdoor.Tinydog is a Backdoor Trojan Horse that creates a remote shell on your ...
Backdoor.Tixanbot Elevated Backdoor.Tixanbot is a Trojan horse that gives a remote attacker control over ...
Backdoor.Tjserv Elevated Backdoor.Tjserv is a back door Trojan horse that acts as a HTTP, SOCKSv4, and ...
Backdoor.Tofger Elevated Backdoor.Tofger is a keylogging Trojan horse program that may be included as an ...
Backdoor.Tompai.C High Backdoor.Tompai.C is a backdoor application that allows intruders to perform ...
Backdoor.Toob Elevated Backdoor.Toob is a Trojan horse that opens a back door and allows a remote ...
Backdoor.Tourniq Elevated Backdoor.Tourniq allows a hacker to remotely control an infected computer. It ...
Backdoor.TQLL Elevated Backdoor.TQLL is a malicious application that runs in the background and allows ...
Backdoor.Translat Elevated Backdoor.Translat is a Backdoor Trojan Horse that gives a remote attacker ...
Backdoor.Tricker Elevated Backdoor.Tricker is a back door Trojan horse that replaces MSN Instant ...
Backdoor.Trodal Elevated Backdoor.Trodal is a backdoor Trojan horse that gives a remote attacker ...
Backdoor.Trojan Elevated Programs detected as Backdoor.Trojan are utility applications that are used by ...
Backdoor.Tron Elevated Backdoor.Tron is a backdoor Trojan which allows unauthorized access to an ...
Backdoor.Trynoma Elevated Backdoor.Trynoma is a typical Backdoor Trojan that gives a hacker full access ...
Backdoor.TSADBOT Medium TSADBOT displays a stream of flashing ad banners when certain software is ...
Backdoor.TScout Elevated Backdoor.TScout is a malicious application that runs in the background and ...
Backdoor.Tsunami High Backdoor.Tsunami attempts to allow attackers unauthorized access to infected ...
Backdoor.TTY.G Medium ...
Backdoor.Tubma Elevated Backdoor.Tubma is a remote access Trojan which allows a hacker to manipulate ...
Backdoor.Tuckist Elevated Backdoor.Tuckist is a Trojan horse program that runs on Linux systems running ...
Backdoor.Tuimer Elevated Backdoor.Tuimer is a back door Trojan horse that connects to the 0503.pass.as ...
Backdoor.Tumag Elevated Backdoor.Tumag allows unauthorized remote access to an infected computer. By ...
Backdoor.Turkojan High Backdoor.Turkojan provides a remote attacker unauthorized access to an infected ...

Page 1 ... Page 74 | Page 75 | Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware