B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 551-600 of 2233 for "B" found.

Page 1 ... Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 ... Page 45

Name Threat Level Description
Backdoor.Iexplore5 Elevated Backdoor.Iexplore5 is a malicious application that runs in the background and ...
Backdoor.Igloo High Backdoor.Igloo is a backdoor trojan which has the ability to open ports and ...
Backdoor.IISCrack Elevated This backdoor Trojan is a Dynamic Link Library (DLL) that is used to attack and ...
Backdoor.IK High Backdoor.IK allows hackers to change security settings and gain access to your ...
Backdoor.Imiserv Elevated Backdoor.Imiserv connects and sends data to a predefined Web site. It is ...
Backdoor.InCommander Elevated Backdoor.InCommander is a malicious application that runs in the background and ...
Backdoor.InfecDoor High Backdoor.InfecDoor attempts to create backdoors and allows an attacker ...
Backdoor.Infra High Backdoor.Infra is a trojan which allows the attacker unauthorized remote access ...
Backdoor.Insane Elevated Backdoor.Insane is a malicious application that runs in the background and ...
Backdoor.Intended Elevated Backdoor.Intended is a malicious application that runs in the background and ...
Backdoor.Intruzzo Elevated Backdoor.Intruzzo is a remote access Trojan that was coded using Visual Basic ...
Backdoor.IO_Brisa High IO Brisa is a hack tool that is used by attackers to gain backdoor access on an ...
Backdoor.IRC Elevated Backdoor.IRC is a backdoor Trojan horse that uses malicious scripts in the mIRC ...
Backdoor.IRC.ABN High Backdoor.IRC.ABN is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Besik Medium Backdoor.IRC.Besik is a malicious application that runs in the background and ...
Backdoor.IRC.Bnc.A High Backdoor.IRC.Bnc.A allows an attacker unauthorized access to an infected ...
Backdoor.IRC.Client.a High This backdoor opens port 6667 in the windows firewall. It then lies dormant ...
Backdoor.IRC.Flood High Backdoor.IRC.Flood is a backdoor Trojan. It installs an mIRC client that has ...
Backdoor.IRC.Kelebek Medium Backdoor.IRC.Kelebek is a backdoor which allows an attacker unauthorized remote ...
Backdoor.IRC.Logare High Backdoor.IRC.Logare is a tool for generating IRC backdoor trojans which can ...
Backdoor.IRC.LSA High Backdoor.IRC.LSA attempts to connect to an external IRC server to allow an ...
Backdoor.IRC.Mimic High Backdoor.IRC.Mimic installs its own modified version of mIRC client onto ...
Backdoor.IRC.Zapchast High Backdoor.IRC.Zapchast installs IRC clients on infected machines and serves as a ...
Backdoor.IRCBot High Backdoor.IRCBot is a family of IRC backdoors allowing unauthorized access to an ...
Backdoor.IRCBot_FactorLibrary High ...
Backdoor.IRCBot.AAC High Backdoor.IRCBot.AAC starts up when Windows starts and tries to connect to an ...
Backdoor.IRCBot.AAQ High Backdoor.IRCBot.AAQ is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.ACD High Backdoor.IRCBot.ACD is backdoor worm that spreads through Microsoft instant ...
Backdoor.IRCBot.ACF High Backdoor.IRCBot.ACF connects to the internet to download further malware and ...
Backdoor.IRCBot.ACU High Backdoor.IRCBot.ACU is a Backdoor that transmit itself via the instant ...
Backdoor.IRCBot.ADF High Backdoor.IRCBot.ADF is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.ADJ High Backdoor.IRCBot.ADJ connects to the internet to download further malware and ...
Backdoor.IRCBot.AE High Backdoor.IRCBot.AE uses mIRC client to remote control infected machines giving ...
Backdoor.IRCBot.AHJ Medium Backdoor.Ircbot.AHJ is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.AJU High Backdoor.IRCBot.AJU is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.AZ High Backdoor.IRCBot.AZ connects to the internet to download further malware and ...
Backdoor.IRCBot.AZC High Backdoor.IRCBot.AZC is a trojan which runs in the background providing a ...
Backdoor.IRCBot.BAM Medium This backdoor program is propagated by other malware through instant messenger ...
Backdoor.IRCBot.BAR High Backdoor.IRCBot.BAR allows an attacker unauthorized access to the infected ...
Backdoor.IRCBot.BFB High Backdoor.IRCBot.BFB connects to the internet to download further malware and ...
Backdoor.IRCBot.BMD High Backdoor.IRCBot.BMD connects to the internet to download further malware and ...
Backdoor.IRCBot.BOG High Backdoor.IRCBot.BOG is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.BSQ Medium Backdoor.IRCBot.BSQ is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.CJD High Backdoor.IRCBot.CJD is an IRC backdoor that attempts to connect to a predefined ...
Backdoor.IRCBot.COM High Backdoor.IRCBot.COM is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DD High Backdoor.IRCBot.DD connects to the internet to download further malware and ...
Backdoor.IRCBot.DHH High Backdoor.IRCBot.DHH is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.DOK High Backdoor.IRCBot.DOK is a malicious backdoor trojan that runs in the background ...
Backdoor.Ircbot.E High Backdoor.Ircbot.E is a backdoor threat that uses the mirc network to control ...
Backdoor.IRCBot.EKX Medium Backdoor.IRCBot.EKX is a malicious backdoor trojan that runs in the background ...

Page 1 ... Page 8 | Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware