B - Infection Database

These pages list all available infections that Spyware Doctor is capable of removing. Infections are presented by name, level of threat and a brief description and have been organised in alphabetical order by name.

On this page you can:

  • Browse through the infections by page or first letter.
  • Search for a specific infection using the Search field.
  • Click on an infection in the list below to view further details on a specific infection

Browse infections beginning with

All Infections | 0-9 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Displaying infections 851-900 of 2233 for "B" found.

Page 1 ... Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 ... Page 45

Name Threat Level Description
Backdoor.Penrox Elevated Backdoor.Penrox is a Backdoor Trojan that allows unauthorized access to a ...
Backdoor.Perlovga.B Elevated Backdoor.Perlovga.B runs silently in the background providing a backdoor ...
Backdoor.Pest Elevated Backdoor.Pest is the client part of a backdoor Trojan horse. This is the part ...
Backdoor.Pestdoor Elevated Backdoor.Pestdoor is a backdoor Trojan that allows a hacker to remotely control ...
Backdoor.Pfinet Elevated Backdoor.Pfinet is a Trojan horse that opens a back door on the compromised ...
Backdoor.Pharvest Elevated Backdoor.Pharvest is a detection for executable files infected by ...
Backdoor.Phoenix Elevated Backdoor.Phoenix is a Backdoor Trojan that gives an attacker unauthorized ...
Backdoor.Phoenix_Keylogger High Phoenix Keylogger is a PC activity monitoring tool. It records all keystrokes ...
Backdoor.PHP.C99Shell High Backdoor.PHP.C99Shell is a malicious PHP script that allows an attacker to gain ...
Backdoor.Ping Elevated Backdoor.Ping is a malicious application that runs in the background and allows ...
Backdoor.Pioneer Elevated Backdoor.Pioneer is a Trojan that allows a hacker to have remote access to ...
Backdoor.Platrash Elevated Backdoor.Platrash is a Trojan horse that can allow unauthorized access to an ...
Backdoor.Plunix High Backdoor.Plunix allows attackers unauthorized access to infected machines. ...
Backdoor.Poebot High Backdoor.Poebot is a backdoor trojan which allows attackers unauthorized access ...
Backdoor.Poebot.B High Poebot.B installs itself into the registry forcing it to load up with windows. ...
Backdoor.Poebot.F High Backdoor.Poebot.F installs itself into the registry forcing it to load up with ...
Backdoor.Pointex Elevated Backdoor.Pointex, which is a variant of Backdoor.Pointex, gives a hacker ...
Backdoor.Poison High Backdoor.Poison is a remote access trojan which allows attackers unauthorized ...
Backdoor.Poison.686 Medium ...
Backdoor.Poison.AMX High Backdoor.Poison.AMX is a remote access trojan which allows attackers ...
Backdoor.Poison.KOD High Backdoor.Poison.KOD is a malicious backdoor that acts as a server and executes ...
Backdoor.PoisonIvy Medium Backdoor.PoisonIvy is a threat that will provide a remote malicious user with ...
Backdoor.Poly Elevated Backdoor.Poly is a malicious application that runs in the background and allows ...
Backdoor.PolyDrop Elevated This Trojan horse gives no visual indication that you have been infected. When ...
Backdoor.Popwin Medium Backdoor.Popwin is a backdoor trojan which allows the attacker unauthorized ...
Backdoor.Portless Elevated Backdoor.Portless is a backdoor Trojan horse that allows unauthorized access to ...
Backdoor.Powerspider Elevated The Backdoor.Powerspider is a Microsoft Foundation Class (MFC) program that is ...
Backdoor.PPDoor High Backdoor.PPDoor opens a backdoor that allows an attacker to access a ...
Backdoor.PPdoor.BC High Backdoor.PPdoor.BC is a backdoor program which runs in stealth mode, opens ...
Backdoor.PPdoor.BP High Backdoor.PPdoor.BP opens a backdoor that allows an attacker to access a ...
Backdoor.PPdoor.BQ High Backdoor.PPdoor.BQ is a backdoor program which opens random ports on the ...
Backdoor.Priority High Backdoor.Priority opens ports and allows hackers to access the infected ...
Backdoor.Private Elevated Backdoor.Private is a Backdoor Trojan Horse that allows unauthorized access to ...
Backdoor.Pronclam Elevated Backdoor.Pronclam is a Trojan horse that opens a back door on the compromised ...
Backdoor.ProRat High Backdoor.ProRat is a remote administrative trojan. It allows an attacker to ...
Backdoor.ProRAT.K High Backdoor.ProRAT.K is a remote administrative trojan. It allows an attacker to ...
Backdoor.Prosiak Elevated Backdoor.Prosiak is the client software corresponding to the Backdoor.Prosiak ...
Backdoor.Prosti High Backdoor.Prosti is a trojan that opens a back door on the compromised comput. ...
Backdoor.Protector High Backdoor.Protector is a malicious backdoor trojan that runs in the background ...
Backdoor.Protux High Backdoor.Protux is a malicious program that runs in the background and allows ...
Backdoor.Protux.CJ Medium BackDoor.Protux.CJ is a threat that runs in the background and allows remote ...
Backdoor.Provder Elevated Backdoor.Provder is a malicious application that runs in the background and ...
Backdoor.Prysat Elevated Backdoor.Prysat is a back door Trojan horse that gives an attacker unauthorized ...
Backdoor.PSpider Elevated Backdoor.PSpider allows unauthorized access to your computer. This backdoor ...
Backdoor.Psychothug Elevated Backdoor.Psychothug is a malicious application that runs in the background and ...
Backdoor.Psychward Elevated Backdoor.Psychward is a Trojan horse program. When executed, the program ...
Backdoor.Ptakks Elevated Backdoor.Ptakks is a backdoor Trojan that gives an attacker unauthorized access ...
Backdoor.Ptsnoop Elevated Backdoor.Ptsnoop is a malicious application that runs in the background and ...
Backdoor.Pudorat Elevated Backdoor.Pudorat is a malicious application that runs in the background and ...
Backdoor.QD2 High QD2 allows Active-X controls from certain Web sites to be downloaded and ...

Page 1 ... Page 14 | Page 15 | Page 16 | Page 17 | Page 18 | Page 19 | Page 20 | Page 21 | Page 22 ... Page 45

Go to another page: MRC Home, Infection Database, Threat Levels, Glossary, Malware Dispute Form, Submit Spyware