B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 251-300 of 2233 for "B" found.

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 ... Page 45

Name Threat Level Description
Backdoor.Breach Elevated Backdoor.Breach is a malicious application that runs in the background and ...
Backdoor.Bredolab High Backdoor.Bredolab allows attackers unauthorized access to infected mac ...
Backdoor.Breplibot High Breplibot is a backdoor trojan which allows attackers to gain access to the ...
Backdoor.Bridco Elevated Backdoor.Bridco is a backdoor Trojan that uses MSN Messenger (.NET messenger). ...
Backdoor.BrownOrifice Elevated Backdoor.BrownOrifice uses Java to allow users to download and view files from ...
Backdoor.Cabro Elevated Backdoor.Cabro allows unauthorized access to the infected computer. ...
Backdoor.Cafeini High Backdoor.Cafeini is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Cakl High Backdoor.Cakl attempts to allow an attacker unauthorized access to an infected ...
Backdoor.CamKing Elevated Backdoor.CamKing allows the author of this Trojan Horse to activate your ...
Backdoor.Carool Elevated Backdoor.Carool is a back door server program that allows unauthorized remote ...
Backdoor.Carufax Elevated Backdoor.Carufax is a trojan horse that will attempt to download files, open a ...
Backdoor.Cazdoor High Backdoor.Cazdoor opens port allowing unauthorized access to the infected ...
Backdoor.Cazno Elevated Backdoor.Cazno is a Trojan editor or client that allows an attacker to control ...
Backdoor.CCInvader High Backdoor.CCInvader opens and listens on a port and grants the remote hacker ...
Backdoor.Ceckno High Backdoor.Ceckno hides itself to avoid detection. It injects its code into the ...
Backdoor.Ceckno.BHX High Backdoor.Ceckno.BHX is a backdoor that will provide remote access on infected ...
Backdoor.Chalex Elevated Backdoor.Chalex is a malicious application that runs in the background and ...
Backdoor.Charge Elevated Backdoor.Charge gives a remote attacker unobstructed access to a compromised ...
Backdoor.CHCP Elevated Backdoor.CHCP is a backdoor Trojan that is written in the Microsoft Visual ...
Backdoor.Checkesp Elevated Backdoor.Checkesp is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Cheeser High Backdoor.Cheeser opens ports and allows hackers to access the infected computer ...
Backdoor.Christmas_Blessing-4 High Opening this Powerpoint file will infect your PC with Hupigon Trojans. A ...
Backdoor.Chupa High Backdoor.Chupa is a trojan that opens a backdoor program and allows an attacker ...
Backdoor.Chupam Elevated Backdoor.Chupam is a malicious application that runs in the background and ...
Backdoor.CIA Elevated Backdoor.CIA is a malicious application that runs in the background and allows ...
Backdoor.CIADoor High Backdoor.CIADoor is a Trojan which on execution installs itself as a legitimate ...
Backdoor.CIADoor.13 High Backdoor.CIADoor.13 is a backdoor application which runs in the background, ...
Backdoor.CIADoor.AR High Backdoor.CIADoor.AR is a backdoor application that runs in the background, ...
Backdoor.CIADoor.B High Backdoor.CIADoor.B is a backdoor application that runs in the background, ...
Backdoor.Cigivip Elevated Backdoor.Cigivip is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Cindyc.YW High Backdoor.Cindyc.YW is a malicious program that modify system file in order to ...
Backdoor.Civcat Elevated Backdoor.Civcat is a Trojan horse that opens a back door on the compromised ...
Backdoor.Clt Elevated Backdoor.Clt is a Backdoor Trojan Horse that gives a hacker complete access to ...
Backdoor.CMDer High Backdoor.CMDer is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Cmdkill Elevated Backdoor.Cmdkill is a Trojan Horse script that can be added to HTML files. The ...
Backdoor.Cmjspy Elevated Backdoor.Cmjspy is a Backdoor Trojan Horse that logs keystrokes. ...
Backdoor.CNK Elevated Backdoor.CNK is the client portion of the Backdoor.CNK.A Trojan Horse. Using ...
Backdoor.Codbot.Gen High Backdoor.Codbot.Gen is an IRC controlled backdoor (or "bot") that can be used ...
Backdoor.ColdLoad Elevated Backdoor.ColdLoad is a malicious application that runs in the background and ...
Backdoor.Colfusion Elevated The Backdoor.Colfusion Backdoor Trojan gives an attacker unauthorized access to ...
Backdoor.CommInet High Backdoor.CommInet is a backdoor program which runs in stealth mode on the ...
Backdoor.Common_Components_for_Backdoor.Bifrose High These are common components used by Backdoor.Bifrose variants and ...
Backdoor.ConstructKit Elevated Backdoor.ConstructKit itself is not a virus, worm, or Trojan horse. It is a ...
Backdoor.CookieMonster High Backdoor.CookieMonster is a malicious application that runs in the background ...
Backdoor.Coolkey High Backdoor.Coolkey is a malicious program that allows attacker unauthorize access ...
Backdoor.Coreflood Elevated Backdoor.Coreflood is a detection for infected Web pages that can install a ...
Backdoor.Corrupt Elevated Backdoor.Corrupt is a malicious application that runs in the background and ...
Backdoor.Cow Elevated Backdoor.Cow is backdoor Trojan that allows a hacker to control the computer. ...
Backdoor.CrashCool Elevated Backdoor.CrashCool is a Trojan Horse that allows unauthorized access to the ...
Backdoor.Crat Elevated Backdoor.Crat allows a hacker to remotely control an infected computer. It is ...

Page 1 | Page 2 | Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware