B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 651-700 of 2233 for "B" found.

Page 1 ... Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 ... Page 45

Name Threat Level Description
Backdoor.Knocker High Backdoor.Knocker is downloaded onto the computer by another threat and installs ...
Backdoor.Kodalo Elevated Backdoor.Kodalo is a Backdoor Trojan Horse that gives the author of the Trojan ...
Backdoor.Kokodoor High Backdoor.Kokodoor allows attackers unauthorized access to an infected m ...
Backdoor.Kol Elevated Backdoor.Kol is a Backdoor Trojan that gives an attacker unauthorized access to ...
Backdoor.Komut Elevated Backdoor.Komut is a malicious application that runs in the background and ...
Backdoor.Kotilla Elevated Backdoor.Kotilla is a back door Trojan horse that allows unauthorized access to ...
Backdoor.Krass Elevated Backdoor.Krass is a malicious application that runs in the background and ...
Backdoor.Kredoor High Backdoor.Kredoor attempts to create backdoors and allows an attacker ...
Backdoor.Krei Elevated Backdoor.Krei is a backdoor Trojan that uses Trojan.Slanret to hide its ...
Backdoor.Kryost Elevated Backdoor.Kryost is a backdoor Trojan that allows unauthorized access to an ...
Backdoor.Kurbadur.11 High Backdoor.Kurbadur.11 collects information from the victims PC and e-mails the ...
Backdoor.Kurtse Elevated Backdoor.Kurtse is a malicious application that runs in the background and ...
Backdoor.Kutex Elevated Backdoor.Kutex is a Backdoor Trojan Horse that gives its creator access and ...
Backdoor.Lala Elevated The Backdoor.Lala Trojan Horse is a variant of Backdoor.Lala and allows ...
Backdoor.LameBot High Backdoor.Lamebot will install itself as a server process which opens various ...
Backdoor.Lamer Elevated Backdoor.Lamer is a Trojan horse program that opens a back door on the ...
Backdoor.LamersDeath High Backdoor.LamersDeath attempts to create backdoor and allows unauthorized access ...
Backdoor.Lancafdo Elevated Backdoor.Lancafdo is a Trojan horse that opens a back door on the compromised ...
Backdoor.Lanfilt Elevated Backdoor.Lanfilt is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.Lanfiltrator Elevated Backdoor.Lanfiltrator is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Laphex Elevated Backdoor.Laphex is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Lassrv Elevated Backdoor.Lassrv is a back door and infostealer threat that allows unauthorized ...
Backdoor.Lastdoor Elevated Backdoor.Lastdoor is a backdoor Trojan horse that gives the attacker ...
Backdoor.Lastras Elevated Backdoor.Lastras is a Trojan Horse that gives its creator unauthorized access ...
Backdoor.Lateda Elevated Backdoor.Lateda is a backdoor Trojan horse program that allows an attacker to ...
Backdoor.Latinus Elevated Backdoor.Latinus allows a hacker to remotely control an infected computer. ...
Backdoor.Lax Elevated Backdoor.Lax is a backdoor Trojan Horse that steals system information. It also ...
Backdoor.Lecna High Backdoor.Lecna is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.LegMir.AT High Backdoor.LegMir.AT is a backdoor program which on execution installs itself as ...
Backdoor.LegMir.BZ High Backdoor.LegMir.BZ is a backdoor Trojan horse. On execution it installs itself ...
Backdoor.LeGuardien Elevated Backdoor.LeGuardien is a Backdoor Trojan Horse that gives a hacker access to ...
Backdoor.Leniv Elevated Backdoor.Leniv is a Backdoor Trojan horse that allows unauthorized remote ...
Backdoor.Leon Elevated Backdoor.Leon allows a hacker to have full remote access to the infected ...
Backdoor.Lesbot High Backdoor.Lesbot is a trojan that conceals itself as a Windows service and runs ...
Backdoor.Levelone Elevated Backdoor.Levelone is a malicious application that runs in the background and ...
Backdoor.Lifefournow Elevated Backdoor.Lifefournow is a backdoor Trojan horse program that allows a ...
Backdoor.Lithium Elevated Backdoor.Lithium is a Trojan horse that can open a backdoor on your co ...
Backdoor.Litmus High Backdoor.Litmus attempts to create backdoors and allows unauthorized access to ...
Backdoor.Litmus.D High Backdoor.Litmus.D is a backdoor which opens a port to listen for commands from ...
Backdoor.LittleWitch Elevated Backdoor.LittleWitch is a backdoor Trojan that is similar to ...
Backdoor.Livehar Elevated Backdoor.Livehar is a Linux-based Trojan horse that attempts to open a back ...
Backdoor.Livup Elevated Backdoor.Livup is a malicious application that runs in the background and ...
Backdoor.Lixy Elevated Backdoor.Lixy is a Backdoor Trojan Horse that opens a proxy server and allows ...
Backdoor.Lixy.B High Backdoor.Lixy.B is a variant of Backdoor.Lixy, a Backdoor Trojan Horse that ...
Backdoor.Logged Elevated Backdoor.Logged is a malicious application that runs in the background and ...
Backdoor.Lohocla Elevated Backdoor.Lohocla is a malicious application that runs in the background and ...
Backdoor.Lolok Elevated Backdoor.Lolok is a backdoor Trojan that uses the mIRC client to give a hacker ...
Backdoor.Longnu Elevated Backdoor.Longnu is a Trojan that gives a hacker access to your computer. It ...
Backdoor.Loony.E High Backdoor.Loony.E runs in the background, allowing attackers to connect to it ...
Backdoor.LoopAd High Backdoor.LoopAd runs in the background, opens random number of ports and allows ...

Page 1 ... Page 10 | Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware