B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 1251-1300 of 2233 for "B" found.

Page 1 ... Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 ... Page 45

Name Threat Level Description
Backdoor.Unifida Elevated Backdoor.Unifida is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Unix Elevated Backdoor.Unix is a malicious application that runs in the background and allows ...
Backdoor.Unpdoor Elevated Backdoor.Unpdoor is a Trojan horse that opens a random port and connects to a ...
Backdoor.UnrealIRC Medium Backdoor.UnrealIRC is a backdoor trojan which opens ports on the infected ...
Backdoor.Upfudoor Elevated Backdoor.Upfudoor is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Uprootkit Elevated Backdoor.Uprootkit is a backdoor Trojan Horse that gives a remote attacker ...
Backdoor.Urat Elevated Backdoor.Urat allows unauthorized access to an infected computer. This Trojan ...
Backdoor.URCS Elevated Backdoor.URCS is a remote control server application and a security risk. It is ...
Backdoor.Usirf Elevated Backdoor.Usirf is a general class of Trojan Horses that uses an FTP server as a ...
Backdoor.Uzbet Elevated Backdoor.Uzbet is a Trojan that runs as a proxy server under Windows 20 ...
Backdoor.VagrNocker Elevated Backdoor.VagrNocker is a backdoor Trojan written in the Delphi programming ...
Backdoor.Vampire Elevated Backdoor.Vampire is a malicious application that runs in the background and ...
Backdoor.Vanbot High Backdoor.Vanbot allows attackers unauthorized access to infected machi ...
Backdoor.VB Elevated Backdoor.VB is a backdoor Trojan that opens a port on the computer. It also ...
Backdoor.VB.AAF High Backdoor.VB.AAF logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AAL High Backdoor.VB.AAL opens random port and allows attacker to gain unauthorized ...
Backdoor.VB.ACW High Trojan.VB.ACW attempts to monitors users activities on the infected system. It ...
Backdoor.VB.AEA High Backdoor.VB.AEA logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AFU High Backdoor.VB.AFU will log all keystrokes that are entered into any active ...
Backdoor.VB.Age High Backdoor.VB.Age runs in the background and opens a port allowing attackers to ...
Backdoor.VB.AJX High Backdoor.VB.AJX opens a random port on the infected machine and allows ...
Backdoor.VB.AKX High Backdoor.VB.AKX is a backdoor which steals information from the affected ...
Backdoor.VB.AWR High Backdoor.VB.AWR logs all keystrokes that are entered into any active window. It ...
Backdoor.VB.AWU Medium This backdoor is capable of compromising the infected machine to outside attack ...
Backdoor.VB.AYS High Backdoor.VB.AYS is capable of compromising the infected machine to outside ...
Backdoor.VB.BDZ High Backdoor.VB.BDZ allows attackers unauthorized access to infected machi ...
Backdoor.VB.BK High Backdoor.VB.BK attempts to log all keystrokes that are entered into any active ...
Backdoor.VB.E High Backdoor.VB.E opens various port allowing attackers to access infected ...
Backdoor.VB.EVC Elevated Backdoor.VB.EVC opens a port allowing attackers to connect and gain control of ...
Backdoor.VB.FRA High Backdoor.VB.FRA is a malicious backdoor that acts as a server and executes ...
Backdoor.VB.gby High Backdoor.VB.gby is a malicious program that runs in the background and allows ...
Backdoor.VB.GEN High Backdoor.VB.GEN attempts to log all keystrokes that are entered into any active ...
Backdoor.VB.GRP High Backdoor.VB.GRP copy itself as explore.exe on system directory and create ...
Backdoor.VB.HX High Backdoor.VB.HX is a threat that tries to take control of the affected system by ...
Backdoor.VB.JV High Backdoor.VB.JV opens a random port on the infected machine and allows attackers ...
Backdoor.VB.jy High Backdoor.VB.jy is a malicious program that runs in the background and allows ...
Backdoor.VB.NI High Backdoor.VB.NI logs keystrokes and recovers contents of the cache to steal ...
Backdoor.VB.ZK High Backdoor.VB.ZK is a remote access trojan (RAT) client that is used to connect ...
Backdoor.VB.ZN High Backdoor.VB.ZN attempts to log all keystrokes that are entered into any active ...
Backdoor.VBBot High Backdoor.VBBot allows attackers unauthorized access to infected machin ...
Backdoor.VBBot.G High Backdoor.VBBot.G is a backdoor application that allows attackers to gain remote ...
Backdoor.VBbot.I High Backdoor.VBbot.I will open various ports allowing unauthorized access to an ...
Backdoor.Verify Elevated Backdoor.Verify is a back door Trojan that allows unauthorised remote access to ...
Backdoor.VHM Elevated Backdoor.VHM is a malicious application that runs in the background and allows ...
Backdoor.Viking High Backdoor.Viking will open a communication port disguised as an Internet ...
Backdoor.Virkel High Backdoor.Virkel spreads via MSN messenger. It disables security problems and ...
Backdoor.Visel Elevated Backdoor.Visel is a malicious application that runs in the background and ...
Backdoor.Vision Elevated Backdoor.Vision is a malicious application that runs in the background and ...
Backdoor.Visitrol Elevated Backdoor.Visitrol is a malicious application that runs in the background and ...
Backdoor.Vmz Elevated Backdoor.Vmz is a Trojan that installs an IRC client on the computer; this ...

Page 1 ... Page 22 | Page 23 | Page 24 | Page 25 | Page 26 | Page 27 | Page 28 | Page 29 | Page 30 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware