Ciadoor.121 Backdoor Information
Severe threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. There exists a high possibility of potential system damage or security flaw. Attacker has complete control over your computer or install new software on your machine.
||process: server builder.exe: MD5 Hash: 71fca7fe7650e575962..
||Backdoor - A backdoor is a means of access to a computer program that bypasses any computer security mechanisms. Computer attackers often use backdoors as part of an exploit or Trojan to gain access to a user's computer. In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack.
Top Backdoor Visited Pages:
Unicorn - 268 visits
Blue Eye IRC Bot V 2.0 - 208 visits
SkatanBot - Alias: Backdoor.VB.kl - 138 visits
Backdoor:Win32/Lamebot.A - 127 visits
Backdoor.Perl.AEI.16 - 107 visits
RBot.sysdat - Alias: Backdoor:Win32/Rbot!E89C - 107 visits
Trojan.Backdoor.Darkmoon - Alias: Backdoor:Win32/Darkmoon.AZ - 106 visits
Delf.gb - Alias: RVP - 103 visits
Trojan.Fakespy.A - Alias: Trojan.Zlob.B - 102 visits
BackDoor.Galapop.A - Alias: Trojan.Abwiz.D (Symantec), Galapoper (Mcafee) - 100 visits
Random Backdoor Pages:
SynSpy - Alias: Backdoor.SynSpy