B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 301-350 of 2233 for "B" found.

Page 1 ... Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 ... Page 45

Name Threat Level Description
Backdoor.Crazynet Elevated When Backdoor.Crazynet runs, it inserts itself onto your computer and runs in ...
Backdoor.Cuhmap Elevated Backdoor.Cuhmap is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.CVM Elevated Backdoor.CVM is a Trojan horse that opens a back door and can provide ...
Backdoor.CWD High Backdoor.CWD is a trojan with rootkit capabilities which is able to hide ...
Backdoor.CXH High Backdoor.CXH connects to a web based centralized bot aministration system and ...
Backdoor.CyberG High Backdoor.CyberG is a backdoor trojan that attempts to install malicious ...
Backdoor.Cybspy Elevated The Backdoor.Cybspy Backdoor Trojan opens a port on the computer and allows a ...
Backdoor.Cycbot.GEN High Backdoor.Cycbot.GEN is a backdoor that allows an attacker unauthorised access ...
Backdoor.CyJack Elevated Backdoor.CyJack is a malicious application that runs in the background and ...
Backdoor.Cyn Elevated Backdoor.Cyn is a Backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.Dados High Backdoor.Dados will open a port and allow an attacker to gain remote access to ...
Backdoor.Daemonize Elevated Backdoor.Daemonize is a Trojan Horse that runs as a proxy server. It is packed ...
Backdoor.Daer Elevated Backdoor.Daer is a backdoor Trojan that is written in Delphi and compressed ...
Backdoor.Dagger High Backdoor.Dagger is a malicious application that runs in the background and ...
Backdoor.Dagonit Elevated Backdoor.Dagonit is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dani Elevated Backdoor.Dani is a backdoor Trojan that is written in the Microsoft Visual ...
Backdoor.Danrit Elevated Backdoor.Danrit is a Trojan horse that logs keystrokes and opens a back do ...
Backdoor.Danton Elevated Backdoor.Danton allows unauthorized remote access. By default, the backdoor ...
Backdoor.DarkFtp Elevated Backdoor.DarkFtp is a backdoor Trojan horse that gives an attacker unauthorized ...
Backdoor.Darkirc Elevated This Trojan horse gives unauthorized people access to your computer by a ...
Backdoor.Darkmoon Elevated Backdoor.Darkmoon is a Trojan horse that opens a back door and may download ...
Backdoor.DarkMoon.YW Medium Backdoor.DarkMoon.YW can give unauthorized access to attackers and if the ...
Backdoor.Darksill Elevated Backdoor.Darksill is a malicious application that runs in the background and ...
Backdoor.DarkSky Elevated Backdoor.DarkSky is a Trojan Horse that is used to gain unauthorized access to ...
Backdoor.Darksun Elevated Backdoor.Darksun steals passwords, logs keystrokes, and sends information about ...
Backdoor.Darmenu Elevated Backdoor.Darmenu is a backdoor Trojan that accesses a page on the Web site, ...
Backdoor.Daserf Elevated Backdoor.Daserf is a Trojan horse that opens a back door on the compromised ...
Backdoor.Dckane Elevated Backdoor.Dckane is a back door program that allows a remote attacker to have ...
Backdoor.Death Elevated Backdoor.Death is a typical Backdoor Trojan, which gives a remote attacker ...
Backdoor.DeepThroat Elevated Backdoor.DeepThroat is a malicious application that runs in the background and ...
Backdoor.Deftcode Elevated The Backdoor.Deftcode Backdoor Trojan gives an attacker unauthorized access to ...
Backdoor.Delf Elevated Backdoor.Delf is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Delf.ACH High Backdoor.Delf.ACH creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.AEO High Backdoor.Delf.AEO opens random ports on the infected machine, allowing other ...
Backdoor.Delf.AFY High Backdoor.Delf.AFY creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.AGQ High Backdoor.Delf.AGQ is a backdoor Trojan which runs silently in the background ...
Backdoor.Delf.AKI High Backdoor.Delf.AKI is a backdoor program that allows an attacker to gain ...
Backdoor.Delf.AQD High Backdoor.Delf.AQD is a backdoor application that uses rootkit stealthing to ...
Backdoor.Delf.ASH High Backdoor.Delf.ASH creates a backdoor to allow an attacker to gain access to the ...
Backdoor.Delf.AUU High Backdoor.Delf.AUU can possibly be obstacle for specific security software such ...
Backdoor.Delf.AWY High Backdoor.Delf.AWY is a backdoor trojan that encompasses functionality to ...
Backdoor.Delf.CEG High Backdoor.Delf.CEG attempts to connect to several remote sites in order to give ...
Backdoor.Delf.DIP High Backdoor.Delf.DIP is attempts to allow an attacker unauthorized access to the ...
Backdoor.Delf.EE High Backdoor.Delf.EE creates a copy of itself to the Windows system folder and adds ...
Backdoor.Delf.GEN High Backdoor.Delf.GEN creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.GY High Backdoor.Delf.GY is a backdoor program which opens a random number of ports on ...
Backdoor.Delf.IHE Medium Backdoor.Delf.IHE creates a backdoor to allow an attacker to gain remote access ...
Backdoor.Delf.JFL High Backdoor.Delf.JFL is a backdoor program that allows an attacker to gain ...
Backdoor.Delf.JJD Medium Backdoor.Delf.JJD creates a backdoor to allow an attacker to gain access to the ...
Backdoor.Delf.JZ High Backdoor.Delf.JZ creates a backdoor to allow an attacker to gain remote access ...

Page 1 ... Page 3 | Page 4 | Page 5 | Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware