B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1051-1100 of 2233 for "B" found.

Page 1 ... Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 ... Page 45

Name Threat Level Description
Backdoor.Sdbot.JT High Backdoor.Sdbot.JT is a backdoor trojan which allows an attacker to gain access ...
Backdoor.SDBot.KN High Backdoor.SDBot.KN is a remote access application that runs in the background ...
Backdoor.Sdbot.LD High Backdoor.SdbLot.LD is a backdoor trojan which allows an attacker to gain access ...
Backdoor.Sdbot.MU High Backdoor.Sdbot.MU is an IRC backdoor Trojan for the Windows platform. It allows ...
Backdoor.Sdbot.NL High Backdoor.Sdbot.NL is an IRC backdoor Trojan for the Windows platform. It allows ...
Backdoor.Sdbot.PG High Backdoor.Sdbot.PG runs in the background allowing remote intruders to issue ...
Backdoor.SDBot.PH High Backdoor.SDBot.PH is a backdoor program that acts as a server through ...
Backdoor.SDBot.PQC High Backdoor.SDBot.PQC is a backdoor trojan which allows an attacker unauthorised ...
Backdoor.Sdbot.RB High Backdoor.Sdbot.RB runs in the background allowing remote intruders to issue ...
Backdoor.Sdbot.RY High Backdoor.Sdbot.RY is a trojan with backdoor funcitonality. It spreads through ...
Backdoor.Sdbot.TR High Backdoor.Sdbot.TR runs in the background allowing remote intruders to issue ...
Backdoor.SDBot.WE High Backdoor.SDBot.WE is a backdoor application that allows attackers full control ...
Backdoor.Sdbot.WG High Backdoor.Sdbot.WG is an IRC backdoor Trojan for the Windows platform. It allows ...
Backdoor.SdBot.WL High A worm/trojan which is installed onto user's PC unknowingly through a unsecured ...
Backdoor.SDBot.XD High Backdoor.SDBot.XD connects to an IRC server in order to join a network of other ...
Backdoor.SdBot.XM High Backdoor.SdBot.XM provides a backdoor server which allows a remote intruder to ...
Backdoor.Sdbot.YX High Backdoor.Sdbot.YX allows remote servers to access the infected computer. It can ...
Backdoor.Seamy Elevated Backdoor.Seamy is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.SecretService High Backdoor.SecretService is a Remote Administration Trojan. It installs a client ...
Backdoor.Security_Threat_Open_Port_6667 High Currently your Windows Firewall has port 6667 open. Port 6667 is often used by ...
Backdoor.Sedepex Elevated Backdoor.Sedepex is a Trojan horse that opens a back door on the compromised ...
Backdoor.Sekorbdal Elevated Backdoor.Sekorbdal is a Trojan horse that opens a back door on the compromised ...
Backdoor.Selka Elevated Backdoor.Selka is a backdoor program that allows a remote attacker to obtain ...
Backdoor.Senik High Backdoor.Senik runs silently in the background as a process which starts up ...
Backdoor.Senna Elevated Backdoor.Senna is a malicious application that runs in the background and ...
Backdoor.Sensode High Backdoor.Sensode allows attackers unauthorized access to infected mach ...
Backdoor.Sepro Elevated Backdoor.Sepro is a malicious application that runs in the background and ...
Backdoor.Sequel Elevated Backdoor.Sequel is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Serpa Elevated Backdoor.Serpa is backdoor Trojan that opens a listening port (port 1,871 by ...
Backdoor.Servidor Elevated Backdoor.Servidor is a malicious application that runs in the background and ...
Backdoor.Servsax Elevated Backdoor.Servsax is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Servu High Backdoor.Servu runs silently in the background and opens up a port, which ...
Backdoor.Sfcdis High Backdoor.Sfcdis opens a connection for remote attackers to connect to. It also ...
Backdoor.Shadow High Backdoor.Shadow is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Shangxing Elevated Backdoor.Shangxing is a Trojan horse that opens a back door on the compromised ...
Backdoor.Shareme Elevated Backdoor.Shareme is a malicious application that runs in the background and ...
Backdoor.Shark.QP High Backdoor.Shark.QP is a malicious application that allows remote access to your ...
Backdoor.Shark.X High Backdoor.Shark.X is a backdoor trojan which records keystrokes and sends them ...
Backdoor.Sharp.I High Backdoor.Sharp.I is a backdoor Trojan which when executed installs itself and ...
Backdoor.Shbot High Backdoor.Shbot allows attackers unauthorized access to infected machin ...
Backdoor.Sheldor High Backdoor.Sheldor is a trojan that attempts to open backdoor and allows remote ...
Backdoor.Shellbot Elevated Backdoor.Shellbot is a Trojan horse that opens a back door and allows ...
Backdoor.Shipper Elevated Backdoor.Shipper is a malicious application that runs in the background and ...
Backdoor.Silence Elevated Backdoor.Silence is a malicious application that runs in the background and ...
Backdoor.SilentSpy Elevated Backdoor.SilentSpy is a Backdoor Trojan horse that gives an attacker ...
Backdoor.SilverFTP Elevated Backdoor.SilverFTP is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Simali Elevated Backdoor.Simali is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.Sincom Elevated Backdoor.Sincom is a Backdoor Trojan Horse that gives the Trojan's author ...
Backdoor.Singu High Backdoor.Singu allows attackers unauthorized access to infected machin ...
Backdoor.Sinique Elevated Backdoor.Sinique is a malicious application that runs in the background and ...

Page 1 ... Page 18 | Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware