B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1101-1150 of 2233 for "B" found.

Page 1 ... Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 ... Page 45

Name Threat Level Description
Backdoor.Sinit Elevated Backdoor.Sinit is a Backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Sinups Elevated Backdoor.Sinups is an ASP and a VBScript-based Backdoor Trojan horse. This ...
Backdoor.Sivuxa Medium Backdoor Sivuxa is a malicious application that runs in the background and ...
Backdoor.Sixca Elevated The Backdoor.Sixca backdoor Trojan allows unauthorized access to the infected ...
Backdoor.Skalg Elevated Backdoor.Skalg is a malicious application that runs in the background and ...
Backdoor.SKOSX Elevated Backdoor.SKOSX is a malicious application that runs in the background and ...
Backdoor.SkRat High Backdoor.SkRat opens several ports which starts up with Windows and attempts to ...
Backdoor.SkSocket High Backdoor.SkSocket allows attackers unauthorized access to infected mac ...
Backdoor.Skun Elevated Backdoor.Skun is a Backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Slackbot Elevated Backdoor.Slackbot is a backdoor Trojan horse that allows a hacker to control ...
Backdoor.Slao Elevated Backdoor.Slao is a Backdoor Trojan Horse that allows unauthorized access to an ...
Backdoor.Small High Backdoor.Small installs itself into the system directory. It allows remote ...
Backdoor.Small.CKY High Backdoor.Small.CKY opens up random ports which will allow an attacker ...
Backdoor.Small.DAM High Backdoor.Small.DAM opens up random ports which will allow an attacker ...
Backdoor.Small.EO High Backdoor.Small.EO is a trojan which provides IRC remote access to a users ...
Backdoor.Small.HEZ High Backdoor.Small.HEZ installs and hides itself into the system directory. It ...
Backdoor.Small.HJ High Backdoor.Small.HJ installs itself into the system directory. It then attempts ...
Backdoor.Small.HL High Backdoor.Small.HL is a proxy server trojan which allows remote attackers to ...
Backdoor.Small.JG High Backdoor.Small.JG generates huge amounts of traffic aimed at several web sites. ...
Backdoor.Small.LS High Backdoor.Small.LS installs itself into the system directory. It allows remote ...
Backdoor.Small.NA Elevated Backdoor.Small.NA allows attackers unauthorized access to infected systems and ...
Backdoor.Small.OY High Backdoor.Small.OY attemp to hijack infected computers and allow unauthorized ...
Backdoor.Small.PN Medium Backdoor.Small.PN installs and hides itself into the system directory. It ...
Backdoor.SMBRelay Elevated Backdoor.SMBRelay is a backdoor Trojan. It uses the Man in the Middle attack, ...
Backdoor.Smezy Elevated Backdoor.Smezy is a malicious application that runs in the background and ...
Backdoor.SmokeDown Elevated Backdoor.SmokeDown is a backdoor Trojan horse which tries to connect to a ...
Backdoor.Smokodoor Elevated Backdoor.Smokodoor is a Backdoor Trojan Horse that gives a remote hacker ...
Backdoor.Smorph Elevated Backdoor.Smorph is a polymorphic Trojan horse. It is distributed as an ...
Backdoor.Smother Elevated Backdoor.Smother gives its creator complete access to your computer. By ...
Backdoor.Snami Elevated Backdoor.Snami is a Backdoor Trojan Horse that attempts to connect to an IRC ...
Backdoor.Snex Elevated Backdoor.Snex is a malicious application that runs in the background and allows ...
Backdoor.Snipernet Elevated Backdoor.Snipernet is a malicious application that runs in the background and ...
Backdoor.Snowcap High Backdoor.Snowcap is a remote access trojan which allows attackers unauthorized ...
Backdoor.Snowdoor Elevated Backdoor.Snowdoor is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Sockets23 Elevated Backdoor.Sockets23 is a malicious application that runs in the background and ...
Backdoor.Socksbot Elevated Backdoor.Socksbot is a backdoor Trojan that connects to IRC and allows a hacker ...
Backdoor.Softshell Elevated Backdoor.Softshell is a Backdoor Trojan Horse that gives a hacker remote access ...
Backdoor.Sokacaps Elevated Backdoor.Sokacaps is a Backdoor Trojan Horse that is controlled through IRC. ...
Backdoor.Sokeven Elevated Backdoor.Sokeven is a backdoor Trojan horse that creates a SOCKS proxy on the ...
Backdoor.Solufina Elevated Backdoor.Solufina is a Trojan horse program that acts as a proxy server. It has ...
Backdoor.Spakrab Elevated Backdoor.Spakrab is a Trojan horse that opens a back door and may send spam ...
Backdoor.Sparta Elevated Backdoor.Sparta is Trojan horse that opens a back door, which can be controlled ...
Backdoor.Spartadoor High Backdoor.Spartadoor allows attackers unauthorized access to infected m ...
Backdoor.Specrem Elevated Backdoor.Specrem is a malicious application that runs in the background and ...
Backdoor.Spigot Elevated Backdoor.Spigot is a Trojan horse which allows unauthorized access to an ...
Backdoor.Spoofbot Elevated Backdoor.Spoofbot is a malicious backdoor program that allows a remote hacker ...
Backdoor.Spookdoor Elevated Backdoor.Spookdoor is the client component of the Backdoor.Spookdoor. It allows ...
Backdoor.Spotcom Elevated Backdoor.Spotcom is a Backdoor Trojan Horse that injects itself into Internet ...
Backdoor.Spy.Small.AV High Backdoor.Spy.Small.AV runs in stealth mode and opens TCP ports on the infected ...
Backdoor.Spybot.IA High Backdoor.Spybot.IA is a backdoor that uses a certain Internet Relay Chat ...

Page 1 ... Page 19 | Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware