Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 4001-4050 of 11067 found.

Page 1 ... Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 | Page 84 | Page 85 ... Page 222

Name Threat Level Description
Backdoor.XU.A Elevated Backdoor.XU.A opens a backdoor on infected computer to allow attackers ...
Backdoor.Y3KRat Elevated Backdoor.Y3KRat is a backdoor Trojan horse that allows a hacker to gain control ...
Backdoor.Yagoda High Backdoor.Yagoda is a backdoor trojan program which opens a TCP/IP port and ...
Backdoor.Yat Elevated Backdoor.Yat is a remote access Trojan which is designed to allow manipulation ...
Backdoor.YEMO High Backdoor.YEMO disguised itself as a Yahoo Emoticons generator. It monitors ...
Backdoor.Yiha Elevated Backdoor.Yiha is a backdoor Trojan horse that allows an attacker to download ...
Backdoor.Yurist High Backdoor.Yurist allows attackers unauthorized access to infected machi ...
Backdoor.Zagaban Elevated Backdoor.Zagaban is a Trojan horse that allows the compromised computer to be ...
Backdoor.Zalivator High Backdoor.Zalivator allows attackers unauthorized access to infected ma ...
Backdoor.Zap Elevated This is a backdoor-type Trojan that can allow unauthorized access to your ...
Backdoor.Zdemon Elevated Backdoor.Zdemon gives its author remote access to your computer. Although the ...
Backdoor.Zdown Elevated Backdoor.Zdown is a backdoor Trojan that gives a hacker unauthorized access to ...
Backdoor.Zebroxy Elevated Backdoor.Zebroxy is a Trojan Horse that opens port 8173 and runs as a proxy ...
Backdoor.Zemac High Backdoor.Zemac allows attackers unauthorized access to infected machin ...
Backdoor.Zenmaster Elevated Backdoor.Zenmaster is a backdoor Trojan horse that gives an attacker ...
Backdoor.Zincite Elevated Backdoor.Zincite is a backdoor server program that allows unauthorized remote ...
Backdoor.Zins Elevated Backdoor.Zins is a back door Trojan horse program with keylogging functions ...
Backdoor.Zinx Elevated Backdoor.Zinx is a trojan program that allows a compromised system to be used ...
Backdoor.Zombam Elevated Backdoor.Zombam is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.Zomby Elevated Backdoor.Zomby is a malicious application that runs in the background and ...
Backdoor.Zomrat Elevated Backdoor.Zomrat is a malicious application that runs in the background and ...
Backdoor.Zvrop Elevated The Backdoor.Zvrop backdoor Trojan allows unauthorized access to the infected ...
Backdoor.Zyklobot Elevated Backdoor.Zyklobot is a Trojan horse that opens an IRC back door and copies its ...
Backdoor.Zyxerv Elevated Backdoor.Zyxerv is a backdoor Trojan that allows a hacker to run arbitrary ...
Backfont.1172 Low Backfont.1172 is a legacy detection of a DOS virus that infects other files in ...
BackFont.765 Low BackFont.765 is a legacy detection of a DOS virus that infects other files in ...
Backfont.821 Low Backfont.821 is a legacy detection of a DOS virus that infects other files in ...
BackFont.896 Low BackFont.896 is a legacy detection of a DOS virus that infects other files in ...
Backfont.900 Low Backfont.900 is a legacy detection of a DOS virus that infects other files in ...
BackFont.905 Low When the virus is active, the fonts on EGA and VGA monitors are changed. A cold ...
Backform Low Backform is a simple .COM file infector that targets the system’s COMMAND.COM ...
Backform.2000(x) Low Backform.2000(x) is a legacy detection of a DOS virus that infects other files ...
BackFormat.2000.B Low BackFormat.2000.B is a legacy detection of a DOS virus that infects other files ...
BackFormat.2345 Low BackFormat.2345 is a legacy detection of a DOS virus that infects other files ...
BackFormat.2381 Low BackFormat.2381 is a legacy detection of a DOS virus that infects other files ...
BackFront.905 Low BackFront.905 is a legacy detection of a DOS virus that infects other files in ...
Backsu.1551 Low Backsu.1551 is a legacy detection of a DOS virus that infects other files in ...
Backsu.1773 Low Backsu.1773 is a legacy detection of a DOS virus that infects other files in ...
Backsu.1776 Low Backsu.1776 is a legacy detection of a DOS virus that infects other files in ...
Backsu.3152 Low Backsu.3152 is a legacy detection of a DOS virus that infects other files in ...
Backsu.3189 Low Backsu.3189 is a legacy detection of a DOS virus that infects other files in ...
Backsu.3192 Low Backsu.3192 is a legacy detection of a DOS virus that infects other files in ...
Backward.1024 Low Backward.1024 is a legacy detection of a DOS virus that infects other files in ...
Backwards.252 Low Backwards.252 is a legacy detection of a DOS virus that infects other files in ...
Baclab Low Baclab is a legacy detection of a DOS virus that infects other files in order ...
Bad Boy Low Bad Boy is a legacy detection of a DOS virus that infects other files in order ...
Bad Boy.1.A Low Bad Boy.1.A is a legacy detection of a DOS virus that infects other files in ...
Bad Boy.1.B Low Bad Boy.1.B is a legacy detection of a DOS virus that infects other files in ...
Bad Boy.B Low Bad Boy.B is a legacy detection of a DOS virus that infects other files in ...
Bad Boy.Worthless.A Low Bad Boy.Worthless.A is a legacy detection of a DOS virus that infects other ...

Page 1 ... Page 77 | Page 78 | Page 79 | Page 80 | Page 81 | Page 82 | Page 83 | Page 84 | Page 85 ... Page 222

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware