B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 751-800 of 2233 for "B" found.

Page 1 ... Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 ... Page 45

Name Threat Level Description
Backdoor.Mprox Elevated Backdoor.Mprox is a Backdoor Trojan Horse that opens a proxy server on TCP port ...
Backdoor.Msic Elevated Backdoor.Msic is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.MSNCorrupt Elevated Backdoor.MSNCorrupt is a backdoor Trojan that uses MSN Messenger to connect to ...
Backdoor.MSNMaker.B High Backdoor.MSNMaker.B registers itself to start each time Windows starts up. It ...
Backdoor.Mtron Elevated Backdoor.Mtron is a backdoor Trojan that records financial activity and sends ...
Backdoor.Muharam.A High Backdoor.Muharam.A opens up a backdoor allowing a remote attacker control over ...
Backdoor.Muie Elevated Backdoor.Muie is a Trojan horse, similar to Netbus or Back Orifice. It enables ...
Backdoor.Mulim Elevated Backdoor.Mulim is a Trojan horse that opens a back door on the compromised ...
Backdoor.Muska Elevated Backdoor.Muska is a malicious application that runs in the background and ...
Backdoor.Mutny Elevated Backdoor.Mutny is a Backdoor Trojan horse that can steal passwords, log ...
Backdoor.Mutter High Backdoor.Mutter is a malicious application that runs in the background and ...
Backdoor.Mxsender Elevated Backdoor.Mxsender is a Backdoor Trojan Horse that gives an attacker ...
Backdoor.Mydopam Elevated Backdoor.Mydopam is a Trojan horse with back door capabilities that sends out ...
Backdoor.Myparty Elevated Backdoor.Myparty is a malicious application that runs in the background and ...
Backdoor.Naninf Elevated Backdoor.Naninf is a Trojan horse with back door capabilities that lowers ...
Backdoor.Nark High Backdoor.Nark allows attackers unauthorized access to infected machines via IRC ...
Backdoor.NBSpy Elevated Backdoor.NBSpy is a malicious application that runs in the background and ...
Backdoor.NCX Elevated Backdoor.NCX is a malicious application that runs in the background and allows ...
Backdoor.Ndad Elevated Backdoor.Ndad provides a graphical user interface to perform administrative ...
Backdoor.Nemesis Elevated Backdoor.Nemesis is a malicious application that runs in the background and ...
Backdoor.Nemog Elevated Backdoor.Nemog is a back door Trojan horse program that allows a compromised ...
Backdoor.Neodurk Elevated Backdoor.Neodurk is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Nepoe High Backdoor.Nepoe allows attackers unauthorized access to infected machin ...
Backdoor.Nerte Elevated Backdoor.Nerte is a backdoor Trojan that allows a hacker complete access your ...
Backdoor.Net_Pay_GmbH High Net Pay GmbH connects to various domain name registrars when installed on a ...
Backdoor.NetBus Elevated This is a variant of the well-known backdoor Trojan, Netbus. This variant ...
Backdoor.NetControle Elevated Backdoor.NetControle is a Trojan horse that allows a hacker to remotely control ...
Backdoor.NetCrack Elevated Backdoor.NetCrack is a Backdoor Trojan horse that gives an attacker ...
Backdoor.NetDevil Elevated Backdoor.NetDevil allows a hacker to remotely control an infected comp ...
Backdoor.Netdex Elevated Backdoor.Netdex consists of several components, including JavaScript (JS) ...
Backdoor.Netget Elevated Backdoor.Netget is a malicious application that runs in the background and ...
Backdoor.NetJoe Elevated Backdoor.NetJoe is a backdoor Trojan horse program that allows a remote ...
Backdoor.NetMetro Elevated Backdoor.NetMetro is a malicious application that runs in the background and ...
Backdoor.NetObserve High NetObserve is used to monitor and log the users activity without their ...
Backdoor.Netshadow Elevated Backdoor.Netshadow is a Trojan horse that opens a back door and allows a remote ...
Backdoor.Netsnake High Backdoor.Netsnake steals password information and sends them to a pre-defined ...
Backdoor.NetSnake.H High Backdoor.NetSnake.H steals cached passwords and e-mails them to a pre-defined ...
Backdoor.NetSnooper High Backdoor NetSnooper is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.NetSpy Elevated Backdoor.NetSpy is a malicious application that runs in the background and ...
Backdoor.NetTerrorist Elevated Backdoor.NetTerrorist is a malicious application that runs in the background ...
Backdoor.NetThief Elevated Backdoor.NetThief is a Backdoor Trojan that allows a hacker to remotely control ...
Backdoor.NetTrojan Elevated Backdoor.NetTrojan is a Backdoor Trojan Horse that allows unauthorized use of ...
Backdoor.Newfure Elevated Backdoor.Newfure is a malicious application that runs in the background and ...
Backdoor.NewRest High Backdoor.NewRest is a malicious backdoor trojan that may use rootkit technique ...
Backdoor.Nibu Elevated Backdoor.Nibu opens a back door Trojan horse on a compromised computer and ...
Backdoor.Nightmare Elevated Backdoor.Nightmare is a malicious application that runs in the background and ...
Backdoor.Niklaus Elevated Backdoor.Niklaus is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Niovadoor Elevated Backdoor.Niovadoor is a backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Nithsys Elevated Backdoor.Nithsys is a Trojan horse that opens a back door on the compromised ...
Backdoor.Nitmo Elevated Backdoor.Nitmo is a malicious application that runs in the background and ...

Page 1 ... Page 12 | Page 13 | Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware