B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 501-550 of 2233 for "B" found.

Page 1 ... Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 ... Page 45

Name Threat Level Description
Backdoor.Guzu Elevated The Backdoor.Guzu Trojan Horse allows its creator to send email using your ...
Backdoor.GWGhost Elevated Backdoor.GWGhost is the server portion of a backdoor Trojan. It allows ...
Backdoor.GWGirl Elevated Backdoor.GWGirl is a Trojan that allows unauthorized access to an infected ...
Backdoor.Hacarmy Elevated Backdoor.Hacarmy is a Trojan horse that connects to a predetermined IRC server ...
Backdoor.HacDef Medium Backdoor.HacDef is backdoor program which registers itself as a service in the ...
Backdoor.HackDefender Elevated Backdoor.HackDefender is a backdoor Trojan component that hides processes, ...
Backdoor.Hackdoor High Backdoor.Hackdoor is a Trojan horse program that opens a back door on the ...
Backdoor.Hackers_Door High Hackers Door is a Remote Administrative Trojan (RAT) that offers an attacker ...
Backdoor.HackTack Elevated Backdoor.HackTack is a backdoor Trojan horse. It has extensive control ...
Backdoor.Hacore Elevated Backdoor.Hacore is a malicious application that runs in the background and ...
Backdoor.Haiyangweng Elevated Backdoor.Haiyangweng is a back door Trojan horse that allows a remote attacker ...
Backdoor.Hale Elevated Backdoor.Hale is a package of programs that provide backdoor access to an ...
Backdoor.Harvester High Backdoor.Harvester cracks CD keys of certain games such as Half Life, Gun Man, ...
Backdoor.Hatckel Elevated Backdoor.Hatckel is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Havar Medium Backdoor Havar is a malicious application that runs in the background and ...
Backdoor.Haxdoor Elevated Backdoor.Haxdoor is a Trojan horse program that opens a back door on the ...
Backdoor.Haxdoor.AM High Backdoor.Haxdoor.AM secretly monitors the users activity and logs keystrokes. ...
Backdoor.Hebolani Elevated Backdoor.Hebolani is a Trojan that exploits the Windows User32.DLL ANI File ...
Backdoor.Helios Elevated Backdoor.Helios is a backdoor Trojan horse that is a variant of ...
Backdoor.Heplane Elevated Backdoor.Heplane is a back door Trojan that allows a remote attacker to have ...
Backdoor.Hesive Elevated Backdoor.Hesive is a malformed Microsoft Access database file that uses an ...
Backdoor.Hethat Elevated Backdoor.Hethat is a backdoor Trojan that attempts to steal the login name and ...
Backdoor.Himba Elevated Backdoor.Himba is a Backdoor Trojan Horse that allows a hacker to gain access ...
Backdoor.Hipo Elevated Backdoor.Hipo is a typical Backdoor Trojan that allows a hacker to gain access ...
Backdoor.Hitcap Elevated Backdoor.Hitcap is a Backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Hogle Elevated Backdoor.Hogle is a proxy SMTP server that may be used as an anonymous spam ...
Backdoor.Homutex Elevated Backdoor.Homutex is a Trojan horse with back door capabilities that allows a ...
Backdoor.Hornet Elevated Backdoor.Hornet is backdoor Trojan that allows a hacker to control the computer ...
Backdoor.Hostil High Backdoor.Hostil is a Trojan horse program that opens a back door on the ...
Backdoor.Httpbot High Backdoor.Httpbot allows attackers to have unauthorized remote access in an ...
Backdoor.Httserv.B High Backdoor.Httserv.B is a remote administration tool designed to take over ...
Backdoor.Hupigeon Elevated Backdoor.Hupigeon is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Hupigon High Backdoor.Hupigon is a backdoor trojan which allows unauthorized remote access ...
Backdoor.Hupigon.BOI Medium Backdoor.Hupigon.BOI is a malicious application that runs in the background and ...
Backdoor.Hupigon.BV High Backdoor.Hupigon.BV is a backdoor trojan which attempts to create a backdoor in ...
Backdoor.Hupigon.BYCA High Backdoor.Hupigon.BYCA is a backdoor trojan which allows unauthorized remote ...
Backdoor.Hupigon.DKL High Backdoor.Hupigon.DKL allows unauthorized access into infected computers to ...
Backdoor.Hupigon.DKWY Medium Backdoor.Hupigon.DKWY is a backdoor trojan that allows an attacker unauthorised ...
Backdoor.Hupigon.DTVS High Backdoor.Hupigon.DTVS runs in the background and allows remote access to the ...
Backdoor.Hupigon.EQZD High Backdoor.Hupigon.EQZD is a backdoor trojan which shuts down latest Kaspersky ...
Backdoor.Hupigon.EVG High Backdoor.Hupigon.EVG is a threat that attempts to connect to a certain ...
Backdoor.Hupigon.GEN High Backdoor.Hupigon.GEN has rootkit functionality. It injects itself into Internet ...
Backdoor.Hupigon.HXV High Backdoor.Hupigon.HXV is a backdoor trojan which opens a backdoor on infected ...
Backdoor.Hupigon.KVZ High Backdoor.Hupigon.KVZ injects itself into the Internet Explorer to evade ...
Backdoor.Hupigon.LH High Backdoor.Hupigon.LH is a malicious application that runs in the background and ...
Backdoor.Hupigon.MHP Elevated Backdoor.Hupigon.MHP is a backdoor trojan which allows unauthorized access to ...
Backdoor.IceBraker Elevated Backdoor.IceBraker is a malicious application that runs in the background and ...
Backdoor.ICQ Elevated Backdoor.ICQ is a malicious application that runs in the background and allows ...
Backdoor.IDDO Elevated Backdoor.IDDO is a malicious application that runs in the background and allows ...
Backdoor.IE High Backdoor.IE is a tool for generating IE backdoor trojans which can allow an ...

Page 1 ... Page 7 | Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware