B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 601-650 of 2233 for "B" found.

Page 1 ... Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 ... Page 45

Name Threat Level Description
Backdoor.IRCBot.EPA High Backdoor.IRCBot.EPA is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.ET High Backdoor.IRCBot.ET is a network worm with backdoor functionality. The backdoor ...
Backdoor.IRCBot.ew Medium Backdoor.IRCBot.ew connects to the internet to download further malware and ...
Backdoor.IRCBot.ex Medium Backdoor.IRCBot.ex connects to the internet to download further malware and ...
Backdoor.IRCBot.EXE High Backdoor.IRCBot.EXE is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.fa Medium Backdoor.IRCBot.fa connects to the internet to download further malware and ...
Backdoor.IRCBot.FAI High Backdoor.IRCBot.FAI is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.fb Medium Backdoor.IRCBot.fb connects to the internet to download further malware and ...
Backdoor.IRCBot.fd Medium Backdoor.IRCBot.fd connects to the internet to download further malware and ...
Backdoor.IRCBot.FP High Backdoor.IRCBot.FP connects to the internet to download further malware and ...
Backdoor.IRCBot.GEN High Backdoor.IRCBot.GEN is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.GEV High Backdoor.IRCBot.GEV is a malicious backdoor trojan that runs in the background ...
Backdoor.IRCBot.GW High Backdoor.IRCBot.GW connects to the internet to download further malware and ...
Backdoor.IRCbot.GZ High Backdoor.IRCBot.GZ connects to the internet to download further malware and ...
Backdoor.IRCbot.HA High Backdoor.IRC.Ha is a backdoor Trojan. It installs an mIRC client that has ...
Backdoor.IRCbot.HD High Backdoor.IRCbot.HD disables the registry editor and the taskmanager and opens ...
Backdoor.IRCBot.ST High Backdoor.IRCBot.ST uses Microsoft MS06-040 Exploit to spread. It opens ports, ...
Backdoor.IRCBot.TA High Backdoor.IRCBot.TA starts up when Windows starts and tires to connect to an IRC ...
Backdoor.IRCBot.WinSMX High Backdoor.IRCBot.WinSMX establishes a connection to a pre-defined IRC server ...
Backdoor.IRCBot.XG High Backdoor.IRCBot.XG is a backdoor that has Worm functionality as well. It ...
Backdoor.IRCBot.YH High Backdoor.IRCBot.YH establishes a connection to a pre-defined server upon ...
Backdoor.IRCBot.ZI High Backdoor.IRCBot.ZI is a Backdoor that transmit img807.zip via the MSN to infect ...
Backdoor.IrcContact Elevated Backdoor.IrcContact is a Backdoor Trojan horse that gives an attacker ...
Backdoor.Iroffer Elevated Iroffer is a potential unwanted application which is used to allow file sharing ...
Backdoor.Isee Elevated Backdoor.Isee is a malicious application that runs in the background and allows ...
Backdoor.Isen Elevated Backdoor.Isen is a backdoor Trojan horse that hides processes and files. In ...
Backdoor.Jaan.T Medium Backdoor.Jaan.T is a trojan which allows unauthorised access to an infected ...
Backdoor.Jacktron Elevated Backdoor.Jacktron is a malicious application that runs in the background and ...
Backdoor.Jeem Elevated Backdoor.Jeem is a Trojan horse that allows a hacker to remotely control an ...
Backdoor.Jinmoze Elevated Backdoor.Jinmoze is a malicious application that runs in the background and ...
Backdoor.Jittar Elevated Backdoor.Jittar is a Backdoor Trojan Horse that gives its creator remote access ...
Backdoor.JokerDoor Medium Backdoor.JokerDoor is a malicious backdoor trojan that runs in the background ...
Backdoor.Jupdate Elevated Backdoor.Jupdate is a backdoor program that allows a remote attacker to ...
Backdoor.Justjoke High Backdoor.Justjoke attempts to hijack the infected computer and allows ...
Backdoor.Kaitex Elevated Backdoor.Kaitex is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Kalasbot Elevated Backdoor.Kalasbot is a Backdoor Trojan Horse that allows a hacker to control a ...
Backdoor.Kamikaze Elevated Backdoor.Kamikaze is a malicious application that runs in the background and ...
Backdoor.Katherdoor Elevated Backdoor.Katherdoor is a malicious application that runs in the background and ...
Backdoor.Katux Elevated Backdoor.Katux is a malicious application that runs in the background and ...
Backdoor.Kavar Elevated This is a backdoor Trojan that also has the capability to download other ...
Backdoor.Kergez Elevated Backdoor.Kergez is a malicious application that runs in the background and ...
Backdoor.Ketch Elevated Backdoor.Ketch is a backdoor Trojan Horse that allows an attacker to control ...
Backdoor.KeyHook Elevated Backdoor.KeyHook is a malicious application that runs in the background and ...
Backdoor.KeyStart High Backdoor.KeyStart is a malicious backdoor trojan that runs in the background ...
Backdoor.Khaos Elevated Backdoor.Khaos is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Kika Elevated Backdoor.Kika is a backdoor program that allows unauthorized remote access to a ...
Backdoor.Kikz Elevated Backdoor.Kikz is a malicious application that runs in the background and allows ...
Backdoor.Killwi.A High Backdoor.Killwi.A is a backdoor which connects to the internet to download ...
Backdoor.Kilo Elevated Backdoor.Kilo is a backdoor Trojan that uses an IRC channel to contact a ...
Backdoor.Klb Elevated Backdoor.Klb is a backdoor Trojan that gives an attacker unauthorized access to ...

Page 1 ... Page 9 | Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware