Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 3951-4000 of 11067 found.

Page 1 ... Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 | Page 84 ... Page 222

Name Threat Level Description
Backdoor.VBBot High Backdoor.VBBot allows attackers unauthorized access to infected machin ...
Backdoor.VBBot.G High Backdoor.VBBot.G is a backdoor application that allows attackers to gain remote ...
Backdoor.VBbot.I High Backdoor.VBbot.I will open various ports allowing unauthorized access to an ...
Backdoor.Verify Elevated Backdoor.Verify is a back door Trojan that allows unauthorised remote access to ...
Backdoor.VHM Elevated Backdoor.VHM is a malicious application that runs in the background and allows ...
Backdoor.Viking High Backdoor.Viking will open a communication port disguised as an Internet ...
Backdoor.Virkel High Backdoor.Virkel spreads via MSN messenger. It disables security problems and ...
Backdoor.Visel Elevated Backdoor.Visel is a malicious application that runs in the background and ...
Backdoor.Vision Elevated Backdoor.Vision is a malicious application that runs in the background and ...
Backdoor.Visitrol Elevated Backdoor.Visitrol is a malicious application that runs in the background and ...
Backdoor.Vmz Elevated Backdoor.Vmz is a Trojan that installs an IRC client on the computer; this ...
Backdoor.Volac Elevated Backdoor.Volac is a backdoor Trojan horse server that allows unauthorized ...
Backdoor.Wardoor High Backdoor.Wardoor attempts to allow attackers unauthorized access to infected ...
Backdoor.Warin High Backdoor.Warin opens ports and allows hackers to access the infected computer ...
Backdoor.Wasil Elevated Backdoor.Wasil is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Way Elevated Backdoor.Way is a backdoor Trojan horse that allows unauthorized access to a ...
Backdoor.Way.2002 Medium Backdoor.Way.2002 opens ports on infected computer to allow attackers ...
Backdoor.WebDL Elevated Backdoor.WebDL is a malicious application that runs in the background and ...
Backdoor.Webdor High Backdoor.Webdor is a backdoor trojan that allow hackers to remotely control an ...
Backdoor.Webex High Backdoor.Webex attempts to allow attackers unauthorized access to infected ...
Backdoor.Winbach Medium Backdoor.Winbach enable the attacker to perform malicious activity remotely via ...
Backdoor.Wincrash Elevated When installed on a Microsoft Windows system, this backdoor Trojan horse ...
Backdoor.Windos High Backdoor.Windos allows attackers unauthorized access to infected machi ...
Backdoor.Winet Elevated Backdoor.Winet is a Backdoor Trojan Horse that will install itself in the ...
Backdoor.WinJank Elevated Backdoor.WinJank is a Trojan Horse that gives its creator unobstructed access ...
Backdoor.Winker Elevated Backdoor.Winker is a Trojan Horse that attempts to download files from the ...
Backdoor.WinMap Elevated Backdoor.WinMap is a Backdoor Trojan horse that opens a port on the system and ...
Backdoor.WinMapClient Elevated Backdoor.WinMapClient is a malicious application that runs in the background ...
Backdoor.WinShell Elevated Backdoor.WinShell is a server program that allows unauthorized access to an ...
Backdoor.WinterLove High Backdoor.WinterLove allows attackers unauthorized access to infected m ...
Backdoor.Wisdoor High Backdoor.Wisdoor allows attackers unauthorized access to infected mach ...
Backdoor.Wiween Elevated Backdoor.Wiween is a Trojan horse that affects Linux systems. It poses as an ...
Backdoor.WizBot High Backdoor.WizBot monitors and logs the web activity on an infected system. This ...
Backdoor.WLF Elevated Backdoor.WLF is a backdoor program that works along with Backdo ...
Backdoor.Wnetpols Elevated Backdoor.Wnetpols is a malicious application that runs in the background and ...
Backdoor.Wold Elevated Backdoor.Wold is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Wollf Elevated Backdoor.Wollf is a Backdoor Trojan Horse that installs itself as a server and ...
Backdoor.Wootbot Medium Backdoor.Wootbot is an IRC backdoor and a network worm for the Windows ...
Backdoor.Wootbot.Gen High This backdoor allows attackers access to the machine on multiple ports. When ...
Backdoor.Wortbot Elevated Backdoor.Wortbot is a Trojan horse program that opens a back door and allows ...
Backdoor.Wualess Elevated Backdoor.Wualess is a Trojan horse that opens a back door on the compromised ...
Backdoor.Xdoor High Backdoor.Xdoor attempts to allow attackers unauthorized access to infected ...
Backdoor.Xebiz Elevated Backdoor.Xebiz is a Backdoor Trojan horse that allows a remote attacker to ...
Backdoor.Xenozbot Elevated The Backdoor.Xenozbot Backdoor Trojan copies itself to the %Windir% folder as ...
Backdoor.Xeory Elevated Backdoor.Xeory is backdoor Trojan that, by default, opens ports 80 and 81 on an ...
Backdoor.Xibo Elevated Backdoor.Xibo is a Backdoor Trojan Horse that opens TCP ports, allowing ...
Backdoor.XLog Elevated Backdoor.XLog is a Backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Xone Elevated Backdoor.Xone is a malicious application that runs in the background and allows ...
Backdoor.Xordoor Elevated Backdoor.Xordoor is a Backdoor Trojan horse that allows unauthorized remote ...
Backdoor.XTS Elevated Backdoor.XTS is a Backdoor Trojan that gives a hacker access to your computer. ...

Page 1 ... Page 76 | Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 | Page 84 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware