B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1201-1250 of 2233 for "B" found.

Page 1 ... Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 ... Page 45

Name Threat Level Description
Backdoor.TDS Elevated Backdoor.TDS is a backdoor Trojan that is written in the Delphi language. When ...
Backdoor.TDSS.BKV High Backdoor.TDSS.BKV is a backdoor trojan which allows the attacker access to the ...
Backdoor.Tela Elevated Backdoor.Tela is a backdoor Trojan horse that allows unauthorized access to the ...
Backdoor.Tervserv Elevated Backdoor.Tervserv is a Trojan horse that opens a back door on the compromised ...
Backdoor.Theef Elevated Backdoor.Theef is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.TheThing Elevated Backdoor.TheThing is a malicious application that runs in the background and ...
Backdoor.TheThing-1 Elevated Backdoor.TheThing-1 is a malicious application that runs in the background and ...
Backdoor.Threadsys Elevated Backdoor.Threadsys is a backdoor Trojan horse that connects to a predefined ...
Backdoor.Thredsys High Backdoor.Thredsys is a backdoor trojan which attempts to open a port leaving ...
Backdoor.Thunderkiss Elevated Backdoor.Thunderkiss is a malicious application that runs in the background and ...
Backdoor.Thunk.E High The backdoor opens a random TCP port to listen for commands from a remote host. ...
Backdoor.Thunk.I High Backdoor.Thunk.I is a backdoor trojan which attempts to open a port leaving the ...
Backdoor.Thunker Elevated Backdoor.Thunker is a Trojan Horse that runs as a proxy server. It randomly ...
Backdoor.Tidserv High Backdoor.Tidserv is a Trojan that opens a back door and allows remote ...
Backdoor.Tilebot.AF High Backdoor.Tilebot.AF is a malicious application that runs in the background, ...
Backdoor.Tiny.C High Backdoor.Tiny.C is a malicious backdoor trojan that runs in the background and ...
Backdoor.Tinydog Elevated Backdoor.Tinydog is a Backdoor Trojan Horse that creates a remote shell on your ...
Backdoor.Tixanbot Elevated Backdoor.Tixanbot is a Trojan horse that gives a remote attacker control over ...
Backdoor.Tjserv Elevated Backdoor.Tjserv is a back door Trojan horse that acts as a HTTP, SOCKSv4, and ...
Backdoor.Tofger Elevated Backdoor.Tofger is a keylogging Trojan horse program that may be included as an ...
Backdoor.Tompai.C High Backdoor.Tompai.C is a backdoor application that allows intruders to perform ...
Backdoor.Toob Elevated Backdoor.Toob is a Trojan horse that opens a back door and allows a remote ...
Backdoor.Tourniq Elevated Backdoor.Tourniq allows a hacker to remotely control an infected computer. It ...
Backdoor.TQLL Elevated Backdoor.TQLL is a malicious application that runs in the background and allows ...
Backdoor.Translat Elevated Backdoor.Translat is a Backdoor Trojan Horse that gives a remote attacker ...
Backdoor.Tricker Elevated Backdoor.Tricker is a back door Trojan horse that replaces MSN Instant ...
Backdoor.Trodal Elevated Backdoor.Trodal is a backdoor Trojan horse that gives a remote attacker ...
Backdoor.Trojan Elevated Programs detected as Backdoor.Trojan are utility applications that are used by ...
Backdoor.Tron Elevated Backdoor.Tron is a backdoor Trojan which allows unauthorized access to an ...
Backdoor.Trynoma Elevated Backdoor.Trynoma is a typical Backdoor Trojan that gives a hacker full access ...
Backdoor.TSADBOT Medium TSADBOT displays a stream of flashing ad banners when certain software is ...
Backdoor.TScout Elevated Backdoor.TScout is a malicious application that runs in the background and ...
Backdoor.Tsunami High Backdoor.Tsunami attempts to allow attackers unauthorized access to infected ...
Backdoor.TTY.G Medium ...
Backdoor.Tubma Elevated Backdoor.Tubma is a remote access Trojan which allows a hacker to manipulate ...
Backdoor.Tuckist Elevated Backdoor.Tuckist is a Trojan horse program that runs on Linux systems running ...
Backdoor.Tuimer Elevated Backdoor.Tuimer is a back door Trojan horse that connects to the 0503.pass.as ...
Backdoor.Tumag Elevated Backdoor.Tumag allows unauthorized remote access to an infected computer. By ...
Backdoor.Turkojan High Backdoor.Turkojan provides a remote attacker unauthorized access to an infected ...
Backdoor.Tuxder Elevated Backdoor.Tuxder enables the remote attacker to execute commands on your ...
Backdoor.Ubriel.F High Backdoor.Ubriel.F opens random ports and allows an attacker complete ...
Backdoor.Udps Elevated Backdoor.Udps is a typical backdoor Trojan that gives a remote attacker full ...
Backdoor.Ugy Elevated Backdoor.Ugy is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.UKS Elevated Backdoor.UKS is a Backdoor Trojan Horse that allows unauthorized access to an ...
Backdoor.Ullysee High Backdoor.Ullysee allows attackers unauthorized access to infected mach ...
Backdoor.UltimateDefender High Backdoor.UltimateDefender runs in the background and allows remote access to ...
Backdoor.UltimateDefender.GVW High Backdoor.UltimateDefender.GVW runs in the background and allows remote access ...
Backdoor.UltimateRAT High Backdoor.UltimateRAT is a Remote Administration Tool that provides an attacker ...
Backdoor.Ultor Elevated Backdoor.Ultor is a backdoor Trojan that allows unauthorized access to an ...
Backdoor.Uncap Elevated Backdoor.Uncap is a malicious application that runs in the background and ...

Page 1 ... Page 21 | Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware