B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1151-1200 of 2233 for "B" found.

Page 1 ... Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 ... Page 45

Name Threat Level Description
Backdoor.Spyboter Elevated Backdoor.Spyboter is a detection for a family of Trojans that open a back door ...
Backdoor.SpyBoter.BY High Backdoor.SpyBoter.BY is a backdoor worm which spreads via a network connection. ...
Backdoor.Spymon Elevated Backdoor.Spymon is a Trojan horse that opens a back door on a compromised ...
Backdoor.Srdl Elevated Backdoor.Srdl is a malicious application that runs in the background and allows ...
Backdoor.Stanex Elevated Backdoor.Stanex is a Backdoor Trojan horse that allows a hacker to control an ...
Backdoor.Staprew Elevated Backdoor.Staprew is a back door server program that allows a remote attacker to ...
Backdoor.Stealer Elevated Backdoor.Stealer is a malicious application that runs in the background and ...
Backdoor.StealthEye Elevated Backdoor.StealthEye is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Striker High Backdoor.Striker on execution runs in the background, opens ports on the ...
Backdoor.Stub.N High Backdoor.Stub.N opens and listens on a port and grants the remote hacker ...
Backdoor.Stupa Medium Backdoor.Stupa is a malicious application that runs in the background and ...
Backdoor.Sua Elevated Backdoor.Sua is a malicious application that runs in the background and allows ...
Backdoor.Subhappy Elevated Backdoor.Subhappy is a malicious application that runs in the background and ...
Backdoor.Subot Elevated Backdoor.Subot is a back door program that is loaded with a Serv-U FTP server ...
Backdoor.Subroot High Backdoor.Subroot allows attackers unauthorized access to infected mach ...
Backdoor.Subs Elevated Backdoor.Subs is a malicious application that runs in the background and allows ...
Backdoor.SubSari Elevated Backdoor.SubSari is a Trojan that allows unauthorized access to and control of ...
Backdoor.SubSeven Elevated Backdoor.SubSeven is a Trojan Horse, similar to Netbus or Back Orifice, which ...
Backdoor.SubSeven2 Elevated Backdoor.SubSeven2 is a malicious application that runs in the background and ...
Backdoor.SubSeven21 Elevated Backdoor.SubSeven21 is a malicious application that runs in the background and ...
Backdoor.SubSeven215 Elevated Backdoor.SubSeven215 is a variant of the Backdoor.SubSeven Trojan Horse. ...
Backdoor.SubSeven22 Elevated Backdoor.SubSeven22 is a Trojan horse. It is generally UPX packed; however, ...
Backdoor.SubSeven2gld Elevated Backdoor.SubSeven2gld is a malicious application that runs in the background ...
Backdoor.SubSeven2svr Elevated Backdoor.SubSeven2svr is a malicious application that runs in the background ...
Backdoor.Subwoofer Elevated Backdoor.Subwoofer allows a hacker to remotely control an infected com ...
Backdoor.Sumtax Elevated Backdoor.Sumtax is a Backdoor Trojan Horse that consists of several different ...
Backdoor.Surdux Elevated Backdoor.Surdux is a Backdoor Trojan Horse that allows its creator to control ...
Backdoor.Surgeon Elevated Backdoor.Surgeon allows a hacker to remotely control an infected compu ...
Backdoor.Sweetbomb Elevated Backdoor.Sweetbomb is an IRC backdoor Trojan horse. It can spread itself when ...
Backdoor.Swz High Backdoor.Swz runs silently in the background and opens up a port, which allows ...
Backdoor.Symopro Elevated Backdoor.Symopro is a malicious application that runs in the background and ...
Backdoor.Synrg Elevated Backdoor.Synrg allows unauthorized access to the infected computer. It also ...
Backdoor.Sysbug Elevated Backdoor.Sysbug is a Backdoor Trojan Horse that opens TCP port 5555 and waits ...
Backdoor.Sysdot Elevated Backdoor.Sysdot is a malicious application that runs in the background and ...
Backdoor.SysExploit Elevated Backdoor.SysExploit is a malicious application that runs in the background and ...
Backdoor.sysinst Elevated Backdoor.sysinst is a malicious application that runs in the background and ...
Backdoor.Syskbot Elevated Backdoor.Syskbot is an Backdoor Trojan Horse that gives a hacker access to your ...
Backdoor.Syslok Medium Backdoor.Syslok hijacks infect computers and display a screen warning user that ...
Backdoor.SysOCXDLL Elevated Backdoor.SysOCXDLL is a malicious application that runs in the background and ...
Backdoor.SysReg Elevated Backdoor.SysReg is a malicious application that runs in the background and ...
Backdoor.System33 High Backdoor.System33 runs as a process in the background and drops a copy of ...
Backdoor.Systsec Elevated Backdoor.Systsec is a backdoor Trojan horse. It listens on port 1034 and allows ...
Backdoor.SysXXX Elevated Backdoor.SysXXX is a backdoor Trojan program that was written in the Delphi ...
Backdoor.Syzoor Elevated Backdoor.Syzoor is a Trojan horse that opens a back door on the compromised ...
Backdoor.Tabdim Elevated Backdoor.Tabdim is a Trojan horse program that opens a backdoor and allows a ...
Backdoor.Talex Elevated The Backdoor.Talex backdoor Trojan allows complete access to the infected ...
Backdoor.Tankedoor Elevated Backdoor.Tankedoor is a Backdoor Trojan that gives a hacker access to your ...
Backdoor.TapiTroj Elevated Backdoor.TapiTroj is a malicious application that runs in the background and ...
Backdoor.Taskmon Elevated Backdoor.Taskmon is a malicious application that runs in the background and ...
Backdoor.Tasmer Elevated Backdoor.Tasmer is a malicious application that runs in the background and ...

Page 1 ... Page 20 | Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware