B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 151-200 of 2233 for "B" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 ... Page 45

Name Threat Level Description
Backdoor.Anyserv Elevated Backdoor.Anyserv is a Trojan horse that gives an attacker remote access to an ...
Backdoor.Aoldoor Elevated Backdoor.Aoldoor is a malicious application that runs in the background and ...
Backdoor.Apdoor Elevated Backdoor.Apdoor is a Backdoor Trojan Horse that is similar to ...
Backdoor.Aphexdoor Elevated Backdoor.Aphexdoor is backdoor Trojan horse that uses the IRC channels to ...
Backdoor.Aphexdoor.B High Backdoor.Aphexdoor.B is a threat that attempts to connect to a certain ...
Backdoor.Arape.A High Backdoor.Arape.A is a Remote Administration Trojan that installs a backdoor on ...
Backdoor.Arcanum Elevated Backdoor.Arcanum is a malicious application that runs in the background and ...
Backdoor.Armageddon Elevated Backdoor.Armageddon is a Backdoor Trojan Horse that allows its author to ...
Backdoor.ASNBot High Backdoor.ASNBot runs in the background opening a backdoor which allows hackers ...
Backdoor.Asniffer Elevated Backdoor.Asniffer is a backdoor Trojan horse that opens a port on the computer, ...
Backdoor.Asoxy Elevated Backdoor.Asoxy is a Trojan horse that runs as a proxy server. ...
Backdoor.Assasin High Backdoor.Assasin is a backdoor which will open a port on a compromised computer ...
Backdoor.Asylum Elevated This Trojan horse has no visual indicators that the computer has been infected. ...
Backdoor.Asylum.Gen High Backdoor.Asylum.Gen allows hackers to compromise remote machines by installing ...
Backdoor.ASync Elevated Backdoor.ASync is a malicious application that runs in the background and ...
Backdoor.Atom Elevated Backdoor.Atom is a malicious application that runs in the background and allows ...
Backdoor.Augodor.GEN High Backdoor.Augodor.GEN listens for intstructions from external hackers through ...
Backdoor.Augudor Elevated Backdoor.Augudor is a Backdoor Trojan Horse that opens TCP port 1011 and waits ...
Backdoor.AutoSpy High Backdoor.AutoSpy opens a backdoor for attackers to access to an infected ...
Backdoor.Autoupder Elevated Backdoor.Autoupder is a backdoor program that can be used as a distribution ...
Backdoor.Avstral High Backdoor.Avstral runs silently in the background which starts up when Windows ...
Backdoor.Back_Orifice_2K High Back Orifice 2K is a backdoor which allows a remote attacker to take full ...
Backdoor.Back_Orifice_XP High Back Orifice XP will open various ports allowing unauthorized access to an ...
Backdoor.Backage Elevated Backdoor.Backage is a backdoor Trojan horse that allows unauthorized access to ...
Backdoor.BackConstructor High Backdoor.BackConstructor is a client program a hacker can use to access a ...
Backdoor.Badcodor Elevated Backdoor.Badcodor is a Backdoor Trojan Horse that gives its creator full ...
Backdoor.Badok High Backdoor.Bagot installs itself in the system folder and adds runkeys to make ...
Backdoor.Badrat.C High Backdoor.Badrat.C runs silently in the background as a process which starts up ...
Backdoor.Badrat.E Medium This threat is a client-server backdoor capable of controlling and monitoring ...
Backdoor.Balkart Elevated Backdoor.Balkart is a backdoor Trojan horse that can act as a HTTP proxy or FTP ...
Backdoor.Bancodor.GEN High Backdoor.Bancodor.Gen installs itself on the users machine without their ...
Backdoor.Bancodor.W High Backdoor.Bancodor.W installs itself on the users machine without their ...
Backdoor.Bandock Elevated Backdoor.Bandock is a Trojan horse that opens a back door on the compromised ...
Backdoor.Bandok High Backdoor.Bandok attempts to allow an attacker unauthorized access to the ...
Backdoor.Bandok.BC High Backdoor.Bandok.BC installs itself on the users machine without their ...
Backdoor.Bandok.J High Backdoor.Bandok.J is a trojan that allow unauthorized access to the infected ...
Backdoor.Bandok.S High Backdoor.Bandok.S is a trojan that will run when the infected system starts up ...
Backdoor.Banger High Backdoor.Banger runs as a hidden process using up all memory and hindering the ...
Backdoor.Banito Elevated Backdoor.Banito is a Trojan horse that logs keystrokes and opens a back door ...
Backdoor.Bapkri Elevated Backdoor.Bapkri is a generic detection for Dynamic Link Library (.dll) files ...
Backdoor.Barbie High Backdoor.Barbie is a threat that disguises as a IP network tool but after the ...
Backdoor.Barok High Backdoor.Barok is a malicious program that usually arrives in package ...
Backdoor.Baste Elevated Backdoor.Baste is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Battack Elevated Backdoor.Battack is a malicious application that runs in the background and ...
Backdoor.Beastdoor High Backdoor.Beastdoor embeds itself into explorer.exe and iexplore.exe which can ...
Backdoor.Beasty Elevated Backdoor.Beasty is a Trojan Horse that opens a listening port on your computer. ...
Backdoor.Bebshell Elevated is a Trojan horse with back door capabilities that may arrive as a Windows Meta ...
Backdoor.Bech Elevated Backdoor.Bech is a malicious application that runs in the background and allows ...
Backdoor.Berbew High Backdoor.Berbew is a Rootkit Trojan which steals sensitive information such as ...
Backdoor.Berbew.N High Backdoor.Berbew.N is a Rootkit Trojan which steals sensitive information such ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware