B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 451-500 of 2233 for "B" found.

Page 1 ... Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 ... Page 45

Name Threat Level Description
Backdoor.FTP_Ana Elevated Backdoor.FTP_Ana is a Backdoor Trojan that gives a hacker unauthorized access ...
Backdoor.FTP_Bmail Elevated Backdoor.FTP_Bmail is a Trojan horse that allows a hacker to remotely control ...
Backdoor.FTP_Simpel High Backdoor.FTP.Simpel runs silently in the background and opens a port which ...
Backdoor.Fulamer Elevated Backdoor.Fulamer is a typical backdoor Trojan which gives a remote attacker ...
Backdoor.FunFactory Elevated Backdoor.FunFactory allows unauthorized access to an infected computer. It also ...
Backdoor.Futh Elevated Backdoor.Futh is a backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Futro Elevated Backdoor.Futro is a typical backdoor server program. Presence of the file ...
Backdoor.Fuwudoor Elevated Backdoor.Fuwudoor is a back door Trojan that allows unauthorized access to a ...
Backdoor.Fxsvc Elevated Backdoor.Fxsvc is a Backdoor Trojan Horse that gives its author access to your ...
Backdoor.G_Door Elevated Backdoor.G_Door is a utility that is used to control the Backdoor.G_Door ...
Backdoor.G_Door.B High Backdoor.G_Door.B is a backdoor trojan that starts up with windows and runs ...
Backdoor.Gaobot Elevated Backdoor.Gaobot is the server component of the worm, W32.HLLW.Gaobot.P, which ...
Backdoor.Gapin Elevated Backdoor.Gapin is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Gargamel Elevated Backdoor.Gargamel is a malicious application that runs in the background and ...
Backdoor.Gaster Elevated Backdoor.Gaster is a Trojan that gives an attacker access to your computer. It ...
Backdoor.GateCrasher Elevated Backdoor.GateCrasher is a malicious application that runs in the background and ...
Backdoor.GDoor Elevated Backdoor.GDoor is a malicious application that runs in the background and ...
Backdoor.Gecky Elevated Backdoor.Gecky is a malicious application that runs in the background and ...
Backdoor.Generic High These common components have files and keys that are in different threats but ...
Backdoor.GF Elevated Backdoor.GF is a backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.GGDoor High Backdoor.GGDoor allows an attacker unauthorized access to infected mach ...
Backdoor.Ghoice Elevated Backdoor.Ghoice allows unauthorized access to the infected computer. By default ...
Backdoor.Gholame Elevated Backdoor.Gholame is a backdoor Trojan that opens two ports on the computer; ...
Backdoor.Ghost High Backdoor.Ghost allows unauthorized access to an infected machine. ...
Backdoor.Ghostnet Elevated Backdoor.Ghostnet is a Trojan horse that opens a back door on the compromised ...
Backdoor.Ghostvoice High Ghostvoice is a remote access trojan which opens a port allowing an attacker ...
Backdoor.Ginwui High Backdoor.Ginwui attempts to create backdoors and allows an attacker ...
Backdoor.GirlFriend High Backdoor.GirlFriend is a backdoor trojan that allows attackers to gain access ...
Backdoor.GirlinRed High Backdoor GirlinRed is a backdoor which will let infected system to be ...
Backdoor.Globe Elevated Backdoor.Globe is a proof-of-concept Trojan horse program that exploits the ...
Backdoor.Glupzy Elevated Backdoor.Glupzy is a malicious application that runs in the background and ...
Backdoor.Gobot High Backdoor.Gobot is a backdoor trojan which attempts to create a backdoor and ...
Backdoor.Gobot.GEN High Backdoor.Gobot.GEN is an IRC-controlled malware that spreads through through ...
Backdoor.GOL Elevated The Backdoor.GOL backdoor is used to compromise AOL accounts. The backdoor is ...
Backdoor.Goster Elevated Backdoor.Goster is a backdoor Trojan that works under ICQ Messenger. It allows ...
Backdoor.Goweh High Backdoor.Goweh is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Grab Elevated Backdoor.Grab is a malicious application that runs in the background and allows ...
Backdoor.Granst Elevated Backdoor.Granst is a malicious application that runs in the background and ...
Backdoor.Graybird Elevated Backdoor.Graybird is a Trojan horse that hides its presence on the compromised ...
Backdoor.GrayBird.AJ High Backdoor.GrayBird.AJ is a backdoor trojan which places itself in the system ...
Backdoor.Graybird.GEN High Backdoor.Graybird.GEN has rootkit functionality. It injects itself into various ...
Backdoor.GrayBird.GU High Backdoor.GrayBird.GU is a backdoor trojan which places itself in the windows ...
Backdoor.Graybird.HF High Backdoor.GrayBird.HF is a backdoor trojan which places itself in the system ...
Backdoor.GrayBird.K High Backdoor.GrayBird.K is a backdoor trojan which places itself in the system ...
Backdoor.GrayBird.Q High Backdoor.GrayBird.Q is a backdoor trojan which places itself in the system ...
Backdoor.GrayBird.X High Backdoor.GrayBird.X is a backdoor trojan which places itself in the system ...
Backdoor.Graybird.YF High Backdoor.Graybird.YF is a malicious backdoor trojan that runs in the background ...
Backdoor.Grez Elevated Backdoor.Grez is a malicious application that runs in the background and allows ...
Backdoor.GRM Elevated Backdoor.GRM is a backdoor Trojan that allows unauthorized remote access to an ...
Backdoor.Grobodor Elevated Backdoor.Grobodor is a back door Trojan horse that gives its creator ...

Page 1 ... Page 6 | Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware