B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 201-250 of 2233 for "B" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 ... Page 45

Name Threat Level Description
Backdoor.Berpi Elevated Backdoor.Berpi is a back door Trojan that allows the remote attacker to perform ...
Backdoor.BHOLamp Medium Backdoor.BHOLamp is a threat that installed as a Browser Helper Object in the ...
Backdoor.BHOSta High Backdoor.BHOSta is a threat that installed as a Browser Helper Object in the ...
Backdoor.Bias Elevated Backdoor.Bias is a Trojan horse that downloads other risks onto the compromised ...
Backdoor.Bifrose High Backdoor.Bifrose is a backdoor trojan that attempts to propagate by exploiting ...
Backdoor.Bifrose.ACI High Backdoor.Bifrose.ACI is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.ACJ High Backdoor.Bifrose.ACJ is a malicious application that runs in the background and ...
Backdoor.Bifrose.ACL High Backdoor.Bifrose.ACL injects itself into other running processes in attempts to ...
Backdoor.Bifrose.AER High Backdoor.Bifrose.AER is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.AGQ High Backdoor.Bifrose.AGQ is a malicious application that runs in the backgroundand ...
Backdoor.Bifrose.CJ High Backdoor.Bifrose.CJ is an email spamming worm that propagates through the local ...
Backdoor.Bifrose.CY High Backdoor.Bifrose.CY is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.D High Backdoor.Bifrose.D is a backdoor program which gets installed as a legitimate ...
Backdoor.Bifrose.DC High Backdoor.Bifrose.DC can injects itself into other running processes in attempts ...
Backdoor.Bifrose.EF High Backdoor.Bifrose.EF is an internet worm that propagates through the local ...
Backdoor.Bifrose.FV High Backdoor.Bifrose.FV injects itself into other running processes in attempts to ...
Backdoor.Bifrose.PG Medium Backdoor.Bifrose.PG injects itself into other running processes in attempts to ...
Backdoor.Bifrose.QZN High Backdoor.Bifrose.QZN is a backdoor trojan for the Windows platform. It steals ...
Backdoor.Bifrose.R High Backdoor.Bifrose.R is an email spamming Backdoor that propagates through the ...
Backdoor.Bifrose.RT Medium Backdoor.Bifrose.RT injects itself into other running processes in attempts to ...
Backdoor.Bifrose.YH High Backdoor.Bifrose.YH is an internet worm that propagates through the local ...
Backdoor.Bifrose.YW Medium Backdoor.Bifrose.YW injects itself into other running processes in attempts to ...
Backdoor.Bigfoot Elevated Backdoor.Bigfoot is a Backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Binghe Elevated Backdoor.Binghe is a back door Trojan horse program that allows unauthorized ...
Backdoor.Bionet Elevated Backdoor.Bionet is a malicious backdoor Trojan. Backdoor.Bionet behaves similar ...
Backdoor.Bionet.404 High Trojan (Spyware), Bionet variant, allows unauthorized access to an infected ...
Backdoor.Bionet.40a High A BioNet variant. Backdoor.Bionet.40a is a malicious backdoor Trojan. Its ...
Backdoor.Bla Elevated The Backdoor.BlaTrojan allows unauthorized access to your computer. It tries to ...
Backdoor.Black_Dream High Backdoor.Black Dream is a remote access backdoor application that is used for ...
Backdoor.BlackD Elevated Backdoor.BlackD is a malicious application that runs in the background and ...
Backdoor.Blackhole High Backdoor.Blackhole attempts to hijack infected machines and allows attackers ...
Backdoor.BladeRunner Elevated Backdoor.BladeRunner allows a hacker to remotely control an infected c ...
Backdoor.Blarul Elevated Backdoor.Blarul is a Trojan horse that attempts to steal confidential ...
Backdoor.Blizzard Elevated Backdoor.Blizzard is a backdoor Trojan that allows a hacker to remotely access ...
Backdoor.BluanWeb Elevated Backdoor.BluanWeb is a malicious application that runs in the background and ...
Backdoor.Blueang High Backdoor.Blueang is a remote administrative trojan. It allows an attacker to ...
Backdoor.Blueeye High Backdoor.Blueeye is a trojan which allows the attacker unauthorized remote ...
Backdoor.Bmbot Elevated Backdoor.Bmbot is a backdoor Trojan that allows a hacker to gain control of ...
Backdoor.BO Elevated Backdoor.BO is a malicious application that runs in the background and allows ...
Backdoor.BO2K Elevated Backdoor.BO2K is a malicious application that runs in the background and allows ...
Backdoor.Bobic.K High Backdoor.Bobic.K is a trojan backdoor which allows attackers to gain access to ...
Backdoor.Bodombot Medium Backdoor.Bodombot is a backdoor trojan which allows unauthorized access to ...
Backdoor.Bofishy Elevated Backdoor.Bofishy is a family of backdoor Trojans that affect the source code ...
Backdoor.Botax High Backdoor.Botax installs itself into the system folder of the infected machine. ...
Backdoor.Botex Elevated Backdoor.Botex is a backdoor program to allow unauthorized remote access to a ...
Backdoor.Botnachala Elevated Backdoor.Botnachala is a back door Trojan that modifies the Hosts file and may ...
Backdoor.Brabot High Backdoor.Brabot attempts to allow unauthorized access to infected machine via ...
Backdoor.Brador Elevated Backdoor.Brador is the first Windows Mobile backdoor Trojan horse. This ...
Backdoor.BrainSpy Elevated Backdoor.BrainSpy is a malicious application that runs in the background and ...
Backdoor.Brakkeshell Elevated Backdoor.Brakkeshell is a Trojan horse that opens a back door on the ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware