B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 701-750 of 2233 for "B" found.

Page 1 ... Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 ... Page 45

Name Threat Level Description
Backdoor.Lowtaper Elevated Backdoor.Lowtaper is a backdoor Trojan horse that allows remote command ...
Backdoor.LoxoScam Elevated Backdoor.LoxoScam is a backdoor Trojan that allows a hacker to gain access to ...
Backdoor.Lusillon Elevated Backdoor.Lusillon is a Trojan horse that opens a back door on the compromised ...
Backdoor.Lyshell Elevated Backdoor.Lyshell is a backdoor Trojan horse that gives an attacker complete ...
Backdoor.Madfind Elevated Backdoor.Madfind is a Backdoor Trojan horse that gives a hacker complete access ...
Backdoor.Magicon High Backdoor.Magicon is a malicious backdoor trojan that runs in the background and ...
Backdoor.Mailer_Services High Backdoor.Mailer.Services opens ports and listens for commands from external ...
Backdoor.MailThreads Elevated Backdoor.MailThreads is a malicious application that runs in the background and ...
Backdoor.Malpayo Elevated Backdoor.Malpayo allows a hacker to remotely control an infected computer. It ...
Backdoor.Manmatite Elevated Backdoor.Manmatite is a backdoor Trojan horse that gives an attacker remote ...
Backdoor.Mapsy Elevated Backdoor.Mapsy is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Marotob Elevated Backdoor.Marotob is a Trojan horse that steals email addresses and other ...
Backdoor.Masker Elevated Backdoor.Masker is a malicious application that runs in the background and ...
Backdoor.Massaker Elevated Backdoor.Massaker is a backdoor Trojan that allows complete access to the ...
Backdoor.MasterP Elevated Backdoor.MasterP is a malicious application that runs in the background and ...
Backdoor.MasterParadise High Backdoor.MasterParadise allows attackers unauthorized access to infected ...
Backdoor.Masteseq Elevated Backdoor.Masteseq is a back door Trojan horse, which allows a remote attacker ...
Backdoor.Matrix Elevated Backdoor.Matrix is a malicious application that runs in the background and ...
Backdoor.Maxload Elevated Backdoor.Maxload is a backdoor Trojan horse that affects Linux and Unix ...
Backdoor.Mayhdoor Elevated Backdoor.Mayhdoor is a malicious application that runs in the background and ...
Backdoor.Mechbot High Backdoor.Mechbot is a backdoor trojan which will allow attackers unauthorized ...
Backdoor.Medbot High Backdoor.Medbot is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Medias Elevated Backdoor.Medias is a Trojan horse that installs itself as a Browser Helper ...
Backdoor.Mepcod Elevated Backdoor.Mepcod is a Trojan horse that opens a back door and downloads a file ...
Backdoor.MeteorShell Elevated Backdoor.MeteorShell is a Trojan Horse that allows unauthorized access to an ...
Backdoor.Mex Medium Backdoor.Mex is a malicious application that runs in the background and allows ...
Backdoor.MH High Backdoor.MH will open a communication port on an infected computer and will ...
Backdoor.Microkos Elevated Backdoor.Microkos is a Trojan horse that opens a back door and allows ...
Backdoor.Miffice Elevated Backdoor.Miffice is a backdoor server (Trojan) that allows unauthorized access ...
Backdoor.Migmaf Elevated Backdoor.Migmaf is a reverse proxy Trojan Horse that redirects HTTP requests to ...
Backdoor.Millenium Elevated Backdoor.Millenium is a malicious application that runs in the background and ...
Backdoor.MindControl Elevated Backdoor.MindControl is a malicious application that runs in the background and ...
Backdoor.MiniCommander Elevated Backdoor.MiniCommander is a simple backdoor Trojan that copies itself to the ...
Backdoor.Mipsiv Elevated Backdoor.Mipsiv is a Trojan horse that connects to an IRC server and allows an ...
Backdoor.Mirab Elevated Backdoor.Mirab allows a hacker to remotely control an infected computer. It is ...
Backdoor.Miranda Elevated Backdoor.Miranda allows a hacker to remotely control an infected computer. The ...
Backdoor.mIRC High Backdoor.mIRC is a backdoor trojan which makes use of the popular mIRC client. ...
Backdoor.Mirxy Elevated Backdoor.Mirxy is a Trojan horse program that allows the infected computer to ...
Backdoor.Mite Elevated Backdoor.Mite is a backdoor Trojan with a password-stealing component that is ...
Backdoor.MLink Elevated Backdoor.MLink allows unauthorized access to the infected computer. ...
Backdoor.Monaro High Backdoor.Monaro allows an attacker remote access to an infected machine without ...
Backdoor.Monator Elevated Backdoor.Monator is a Backdoor Trojan that gives a hacker full access to your ...
Backdoor.Montp Elevated Backdoor.Montp is a malicious application that runs in the background and ...
Backdoor.Moonlit Elevated Backdoor.Moonlit is a Trojan horse program that can download and execute files, ...
Backdoor.Moonpie Elevated Backdoor.Moonpie is a malicious application that runs in the background and ...
Backdoor.Mosuc Elevated Backdoor.Mosuc is a Trojan horse that is similar to Backdoor.SubSeven, Netbus ...
Backdoor.Mosuck Elevated Backdoor.Mosuck is a backdoor Trojan horse that can allow unauthorized access ...
Backdoor.MoSucker High Backdoor.MoSucker is a remote access backdoor application that is used for ...
Backdoor.Mots Elevated Backdoor.Mots is a Backdoor Trojan Horse that will connect to an IRC server to ...
Backdoor.Mousey Elevated Backdoor.Mousey is a Trojan horse that opens a back door and allows a remote ...

Page 1 ... Page 11 | Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware