Main Menu
Contact Us

GSpot Bot Backdoor Information

Name: GSpot Bot
Category: Backdoor
Alias: - Alias: HTMLEdit
Advice: Remove
Risk: Severe Risk Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.

Signatures: process: doomed8.3.exe: MD5 Hash: fd420684c7ab1477a57... process: g-spot bot editor.exe: MD5 Hash: 6ee7ee3afde4d3ebcdb... process: g-spot bot editor.exe: MD5 Hash: 547010325a57de2d3c6... process: gspot bot 2.0.exe: MD5 Hash: 4e7d2a05bc114733883... process: gspotbot.exe: MD5 Hash: 9e60e474c3202ea282f... process: g-spot bot editor.exe: MD5 Hash: ad041567766fd4f659a... process: gspotbot.exe: MD5 Hash: ... process: gspotbot.exe: MD5 Hash: ..
Type: Backdoor - A backdoor is a means of access to a computer program that bypasses any computer security mechanisms. Computer attackers often use backdoors as part of an exploit or Trojan to gain access to a user's computer. In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack.

Top Backdoor Visited Pages:
Unicorn - 268 visits
Blue Eye IRC Bot V 2.0 - 208 visits
SkatanBot - Alias: Backdoor.VB.kl - 138 visits
Backdoor:Win32/Lamebot.A - 127 visits
Backdoor.Perl.AEI.16 - 107 visits
RBot.sysdat - Alias: Backdoor:Win32/Rbot!E89C - 107 visits
Trojan.Backdoor.Darkmoon - Alias: Backdoor:Win32/Darkmoon.AZ - 105 visits - Alias: RVP - 103 visits
Trojan.Fakespy.A - Alias: Trojan.Zlob.B - 101 visits
BackDoor.Galapop.A - Alias: Trojan.Abwiz.D (Symantec), Galapoper (Mcafee) - 100 visits

Random Backdoor Pages:
Backdoor:Win32/Agent.JN - Alias: Backdoor:Win32/Agent.JN
RBot.mdns - Alias: Backdoor:Win32/Rbot.FU
Trojan.Backdoor.Codbot.O - Alias: W32/Codbot-O, Backdoor.Win32.Codbot.ah
Lixy - Alias: HTMLEdit


2006-2008 - Privacy Policy