B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 101-150 of 2233 for "B" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 ... Page 45

Name Threat Level Description
Backdoor.Agent.LEL High Backdoor.Agent.LEL is a threat that attempts to open backdoor and allows ...
Backdoor.Agent.LHF High Backdoor.Agent.LHF is a malicious application that runs in the background and ...
Backdoor.Agent.LJ High Backdoor.Agent.LJ is a backdoor which opens and listens on a port on a ...
Backdoor.Agent.MO High Backdoor.Agent.MO will open ports on a computer allowing unauthorized access ...
Backdoor.Agent.NC High Backdoor.Agent.NC will open various ports allowing unauthorized access to an ...
Backdoor.Agent.ND Elevated Backdoor.Agent.ND opens port and allows others to access the infected ...
Backdoor.Agent.NL High Backdoor.Agent.NL runs silently in the background as a process which starts up ...
Backdoor.Agent.NS High Backdoor.Agent.NS is used as a remote command prompt, giving a remote intruder ...
Backdoor.Agent.OHS High Backdoor.Agent.OHS is a backdoor Trojan program which opens ports on the ...
BackDoor.Agent.OO High BackDoor.Agent.OO is a backdoor trojan that downloads additional malware ...
Backdoor.Agent.PBE High Backdoor.Agent.PBE is a malicious application that runs in the background and ...
Backdoor.Agent.PO Medium Backdoor.Agent.PO is a backdoor program which runs in stealth mode on the ...
Backdoor.Agent.PX High Backdoor.Agent.PX is a proxy trojan which uses the infected machine as a proxy ...
Backdoor.Agent.QK High Backdor.Agent.QK names itself as "vschosts.exe" and runs in the background. It ...
Backdoor.Agent.QS High Backdoor.Agent.QS is a backdoor which opens and listens on a port and allows an ...
Backdoor.Agent.Rom High Backdor.Agent.Rom names itself as hmznmxs.exe, and runs in the background. It ...
Backdoor.Agent.TJP High Backdoor.Agent.TJP is a malicious backdoor trojan that runs in the background ...
Backdoor.Agent.TX High Backdoor.Agent.TX runs invisibly in the background on an infected machine ...
Backdoor.Agent.UMC Medium Backdoor.Agent.UMC is a malicious application that runs in the background and ...
Backdoor.Agent.US High Backdoor.Agent.US is a backdoor Trojan program which opens ports on the ...
Backdoor.Agent.UWP Medium Backdoor.Agent.UWP allows attackers unauthorized access to infected ma ...
Backdoor.Agent.VUO Medium Backdoor.Agent.VUO allows unauthorized remote access into the infected computer ...
Backdoor.Agent.WCY Elevated Backdoor.Agent.WCY allows unauthorized remote access into the infected computer ...
Backdoor.Agent.WDI High Backdoor.Agent.WDI is a malicious application that runs in the background and ...
Backdoor.Agent.XY High Backdoor.Agent.XY runs silently in the background as a process which starts up ...
Backdoor.Agent.YIF High Backdoor.Agent.YIF is a malicious application that runs in the background and ...
Backdoor.Agent.ZB High Backdoor.Agent.ZB will open a port and allow an attacker to gain remote access ...
Backdoor.Agobot High Backdoor.Agobot is a family of IRC backdoors allowing unauthorized access to an ...
Backdoor.Agobot.AGZ High Backdoor.Agobot.AGZ runs in the background , allowing attackers to connect to ...
Backdoor.Agobot.ATZ High Backdoor.Agobot.ATZ runs in the background, allowing attackers to connect to it ...
Backdoor.Agsdoor Elevated Backdoor.Agsdoor is a malicious application that runs in the background and ...
Backdoor.AimBot High Backdoor.AimBot will install itself into the registry and download malicious ...
Backdoor.Aimbot.AC High Backdoor.Aimbot.AC spreads to network shares by exploiting weak passwords. It ...
Backdoor.AimBot.AG High Backdoor.AimBot.AG is a backdoor trojan which attempts to download malicious ...
Backdoor.AimBot.X High Backdoor.AimBot.X installs itself into the registry forcing it to load up with ...
Backdoor.Aimfrm Elevated Backdoor.Aimfrm is a malicious application that runs in the background and ...
Backdoor.AIMVision Elevated Backdoor.AIMVision is a Trojan horse that allows unauthorized access to an ...
Backdoor.AJS High Backdoor.AJS will open various ports allowing unauthorized access to an ...
Backdoor.Akak Elevated Backdoor.Akak is a backdoor server that also creates a SOCKS proxy on the ...
Backdoor.Akbot Medium Backdoor.Akbot is a threat that enables user to merge two executable files ...
Backdoor.Akcom Elevated Backdoor.Akcom is a malicious application that runs in the background and ...
Backdoor.Akosch Elevated Backdoor.Akosch is a malicious application that runs in the background and ...
Backdoor.Alets Elevated Backdoor.Alets is a back door Trojan horse program that allows a remote ...
Backdoor.Almetyevsk.A High Backdoor.Almetyevsk.A is a trojan that conceals itself as a Windows process ...
Backdoor.Alnica Elevated Backdoor.Alnica is a Backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Amanda High Backdoor.Amanda is remote access trojan that compromises the security of the ...
Backdoor.Amitis Elevated Backdoor.Amitis is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Anakha Elevated Backdoor.Anakha is a backdoor Trojan horse that allows a hacker to use Internet ...
Backdoor.AntiLam Elevated Backdoor.AntiLam is a Backdoor Trojan Horse that gives its creator access to ...
Backdoor.Antilam.GEN High Backdoor.Antilam.GEN has keylogging functionality. It creates a backdoor on the ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware